Upcoming & On-Demand Webinars
Upcoming webinars and recordings of past CyCognito webinars.
38 minutes
Join GigaOm Analyst Chris Ray in a webinar dedicated to the potential and importance of Attack Surface Management (ASM) in strengthening cybersecurity defenses. The live event will delve into the GigaOm Radar Report on ASM, offering valuable insights for cybersecurity decision-makers on navigating the evolving digital threat landscape.
On-Demand Webinar (56 min)
Join Rob Gurzeev, Founder and CEO, of CyCognito, and Casey Ellis, Founder and Chief Strategy Officer, of Bugcrowd, as they discuss how the utilization of automation and external attack surface management (EASM) coupled with crowdsourced testing (including pen testing and bug bounty) work together to empower organizations to effectively address these challenges.
On-Demand Webinar (50 min)
Join Aviel Tzarfaty, Product Manager at CyCognito, as he explains how your Security team can create a plan to increase visibility into internet-facing cloud environments, run automated and continuous testing across all assets, and be made aware as soon as any security risks arise for any cloud-based assets.
On-Demand Webinar (31 min)
Join Anne Marie Zettlemoyer, Chief Security Officer at CyCognito, and Marc Rogers, Adjunct Senior Advisor at the Institute of Security and Technology, Member of the Ransomware Taskforce, and Head of Security for DEF CON, as they discuss the mindset of threat actors as they approach target organizations for ransom or even for sport.
On-Demand Webinar (23 min)
Join Eilon Bachar, Product Manager at CyCognito, as he explains how you can build an automated program that will scan known vulnerabilities lists such as CVE lists and CISA KEV for your team and help you prioritize which vulnerabilities represent the biggest threats to your company’s external attack surface for immediate remediation.
On-Demand Webinar (49 min)
Join Emma Zaballos, Product Marketing Manager at CyCognito, and Jonathan Keÿzer, Sales Engineer at CyCognito, as they discuss anonymized customer insights from CyCognito’s External Risk Insights Brief report.
On-Demand Webinar (30 min)
Join guest speakerJess Burn, Senior Analyst at Forrester Consulting, as she provides a deep dive analysis of the results of a recent online study commissioned by CyCognito with 304 security and IT operations professionals to evaluate risk management practices related to external assets.
On-Demand Webinar (52 min)
Join Ansh Patnaik, Chief Product Officer at CyCognito, as he explains how your Security team can build a modern threat intelligence program that can create more trustworthiness in your vulnerability data by focusing on the biggest risks to your organization, which will lead to faster mean-time-to-remediation and better remediation partnerships with IT.
On-Demand Webinar (30 min)
Join Anne Marie Zettlemoyer, Chief Security Officer at CyCognito, and Mike Johnson, Co-host of the CISO Series podcast, as they sit down for a fireside chat to discuss how you can build better remediation partnerships between your Security team and leaders from other key functions in your organization.
On-Demand Webinar (44 min)
Join Meir Asiskovich, VP of Product at CyCognito, as he demonstrates how your Security team can build a more streamlined and focused attack surface visibility program that eliminates this noise, prioritizing risks based on their business impact, discoverability, and exploitability intelligence.
On-Demand Webinar (52 min)
Join Rob Gurzeev, CEO of CyCognito, as he explains the top five requirements to launch a successful external attack surface management program.
On-Demand Webinar (39 min)
Our guest speakers Sam Sexton, Consultant, and Jessica Burn, Senior Analyst, from Forrester, share real CyCognito customer experiences and how a sample organization can benefit from the CyCognito platform
On-Demand Webinar (53 min)
Join Ed Amoroso, CEO and Founder at TAG Cyber, and Anne Marie Zettlemoyer, Chief Security Officer at CyCognito, as they discuss how Exploit Intelligence can fill the gap between the current suite of solutions' ability to diagnose the attack surface and an organization’s cybersecurity needs to operationalize remediation for its most mission critical threats.