Panel Discusses the Ongoing MOVEit Vulnerability Cyberattacks CVE-2023-34362
In this video, VerSprite's panel of security leaders will discuss the MOVEit vulnerability CVE-2023-34362 and what you to do if your company is affected.
On this VerSprite panel:
Marian Reed, Vice President, GRC
Andrew Stevens, SOC Manager, TIG
Joaquin (Wakko) Paredes, Director, OffSec
Want to learn more? Check out the blog:
versprite.com/blog/8-weeks-later-lessons-learned-from-the-moveit-vulnerability
// FIND VERSPRITE’S CYBERSECURITY TEAM ONLINE //
✦ VerSprite: https://versprite.com/
✦ LinkedIn: https://www.linkedin.com/versprite-llc/
✦ Twitter: https://twitter.com/versprite/
✦ YouTube: https://www.youtube.com/c/VerSprite
// ABOUT VERSPRITE //
VerSprite is a leader in risk-based cybersecurity services and PASTA threat modeling, enabling businesses to improve the protection of critical assets, ensure compliance, and manage risk. Our mission is to help you understand and improve your organization’s cybersecurity posture. With cyberattacks increasing in number and sophistication daily, it is essential to protect your organization’s assets, protect your clients, and maintain the same, excellent reputation and trust you have worked hard to build. We believe an integrated approach will result in better, more cost-effective security practices and business outcomes.
#moveit #vulnerability #cybersecurity
Видео Panel Discusses the Ongoing MOVEit Vulnerability Cyberattacks CVE-2023-34362 канала VerSprite
On this VerSprite panel:
Marian Reed, Vice President, GRC
Andrew Stevens, SOC Manager, TIG
Joaquin (Wakko) Paredes, Director, OffSec
Want to learn more? Check out the blog:
versprite.com/blog/8-weeks-later-lessons-learned-from-the-moveit-vulnerability
// FIND VERSPRITE’S CYBERSECURITY TEAM ONLINE //
✦ VerSprite: https://versprite.com/
✦ LinkedIn: https://www.linkedin.com/versprite-llc/
✦ Twitter: https://twitter.com/versprite/
✦ YouTube: https://www.youtube.com/c/VerSprite
// ABOUT VERSPRITE //
VerSprite is a leader in risk-based cybersecurity services and PASTA threat modeling, enabling businesses to improve the protection of critical assets, ensure compliance, and manage risk. Our mission is to help you understand and improve your organization’s cybersecurity posture. With cyberattacks increasing in number and sophistication daily, it is essential to protect your organization’s assets, protect your clients, and maintain the same, excellent reputation and trust you have worked hard to build. We believe an integrated approach will result in better, more cost-effective security practices and business outcomes.
#moveit #vulnerability #cybersecurity
Видео Panel Discusses the Ongoing MOVEit Vulnerability Cyberattacks CVE-2023-34362 канала VerSprite
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![DiDi Global gets Hit w/ Massive Fine - Data Privacy/ Cybersecurity Slap](https://i.ytimg.com/vi/0O4uraHTg1g/default.jpg)
![What is a vSOC? | Virtual Security Operations Center](https://i.ytimg.com/vi/niJGhrwFIVk/default.jpg)
![Insider Threat - A former Twitter Inc. employee was convicted of spying for Saudi Arabia](https://i.ytimg.com/vi/aT6kT2u0qYo/default.jpg)
![Cybersecurity Trends - Do You Know Your Orgnizations Threat Model? | Tony UV](https://i.ytimg.com/vi/-_tEnvVU3gU/default.jpg)
![Opto 22 PAC Basic Unpatched File Parsing Vulnerability Found | Zero-Day](https://i.ytimg.com/vi/nb4qXLG6sDo/default.jpg)
![REMOTE IT STAFF RECOMMENDATIONS FOR MORE SECURE NETWORKS | Cybersecurity for Remote Workers](https://i.ytimg.com/vi/aJTYsoIClQc/default.jpg)
![Job Search 2021: Standing Out to Job Recruiters](https://i.ytimg.com/vi/bsNb8DFU3YQ/default.jpg)
![PASTA Threat Modeling | Stage 5](https://i.ytimg.com/vi/1aAzRU8kk0w/default.jpg)
![Getting Your Security Program To Shift Left - Operationalizing Security Controls Via DevSecOps](https://i.ytimg.com/vi/ZY2GxeO1rsQ/default.jpg)
![How Does Cybersecurity Help Orgnizations?](https://i.ytimg.com/vi/e6hiDzGTreg/default.jpg)
![D3 SOAR Platform Testimonial | VerSprite CEO, Tony UV](https://i.ytimg.com/vi/P7rmElkQtfc/default.jpg)
![Cybersecurity Awareness & Hispanic Herritage Month | DirtySouth PodCast](https://i.ytimg.com/vi/KhguVYqh2U8/default.jpg)
![Cybersecurity Solutions for Businesses as Digital Interactions Increase and Expectations Rise](https://i.ytimg.com/vi/yvVa2rt035I/default.jpg)
![Remote WCF Exploitation: CVE-2019-8917](https://i.ytimg.com/vi/IE8LBmwZBgE/default.jpg)
![PASTA Threat Modeling | Stage 2](https://i.ytimg.com/vi/WdLOeUcvyjM/default.jpg)
![How D3 NextGen SOAR Helps Versprite CyberSecurity](https://i.ytimg.com/vi/aOhpUp9kMkg/default.jpg)
![OWASP AppSec | Build a Valid Threat Library for Cloud Based Applications](https://i.ytimg.com/vi/EymxtPF1xMo/default.jpg)
![How to Use Your Custom Threat Library | Process for Attack Simulation and Threat Analysis](https://i.ytimg.com/vi/rGFh5oFKtjE/default.jpg)
![Risk-Centric Threat Modeling via Software](https://i.ytimg.com/vi/vLBQdxtgstc/default.jpg)
![What is a Trusted Partner? | Client Success Manager Keith Anderson](https://i.ytimg.com/vi/8z-Kuew9FVo/default.jpg)
![PASTA Threat Modeling | Stage 6](https://i.ytimg.com/vi/CgW9oKH-76A/default.jpg)