Create a Post

CheckMates Go Cyber Security Podcast

cancel
Showing results for 
Search instead for 
Did you mean: 
CheckMates Go Cyber Security Podcast

Learn about Cyber Security topics through brief, informal conversations with experts from Check Point. Topics include: Incident Response, Customer Success Stories, Cyber Security Trends and Technologies. Subscribe via one of these services or add our RSS feed to your podcast app of choice!

PhoneBoy
Admin
Admin

An excerpt from our recent No Suit No Ties session from Incident Response called Vulnerabilities and Workarounds, where we explore a compelling case study in which attackers exploited vulnerabilities in an internet-facing device to gain initial access, escalate privileges, conduct reconnaissance, and infiltrate the internal network.

Read more...

Read more
0 1 300
PhoneBoy
Admin
Admin

PhoneBoy talks about a paper written by @AntoinetteHodes called Pay Now or Pay Later, understanding the costly consequences of neglecting OT/ICS Cybersecurity.

Read more...

Read more
0 0 117
PhoneBoy
Admin
Admin

PhoneBoy talks about the new features and functionality in the R82 release for Quantum Security Gateways and Management.

Read more...

Read more
5 2 1,095
PhoneBoy
Admin
Admin

An excerpt from a great TechTalk we did back in June on Threat Hunting with Memory Forensics given by Monnappa who also teaches Check Point's Threat Hunting Using Memory Forensics course.

Read more...

Read more
0 3 496
PhoneBoy
Admin
Admin

NO SUITS, NO TIES aims to shed light on how Check Point MDR and Incident Response Analysts play a pivotal role in proactively identifying and responding to these threats when they are least expected.

This is an an audio version of our first No Suits, No Ties session entitled Going Equipped To Compromise where we discuss real-world examples from real cases where ‘utilities’ were and are being used in compromise incidents.

The session will cover:

  • The type of tools being used and how they are leveraged
  • How to interpret detection events when these tools are deployed
  • How much time you might have to respond once the first event is seen
  • What visibility may be lost when ‘killer’ or ‘disruption’ tools are used
  • What response and containment activities to focus on where these tools have been observed
Read more...

Read more
0 1 1,298