The Waypoint
February '24 Edition

The Waypoint

In this month's edition of The Waypoint, fresh insights will guide you through the cybersecurity domain brought to you by GuidePoint Security. Let's get to it.


ROADMAP

  • Jam Sessions with Security Visionaries
  • Script Squad
  • R.S.V.P.
  • Contact Us


JAM SESSIONS WITH SECURITY VISIONARIES

2023 Annual GRIT Ransomware Report

The 2023 Annual GRIT Ransomware Report just launched. Unravel the complexities of threat group dynamics, uncovering quarterly trends, geographic impacts and industry targets. Discover pivotal events and innovations that defined cybersecurity in 2023.

Download the full report for a comprehensive analysis of 2023 and what to expect in 2024.

Co-authors: Drew Schmitt , Practice Lead, GRIT | Jason B. , Sr. Threat Intelligence Consultant | Nic Finn , Sr Threat Intelligence Consultant

DOWNLOAD

[ON-DEMAND TALK] A 2023 Ransomware Retrospective: Critical Insights Informing Expectations in '24

Our GuidePoint Research and Intelligence Team will examine ransomware developments and trends over the last year and the impact across all industry verticals in 2024. With this knowledge, cybersecurity leaders and analysts can make educated and prioritized decisions regarding how to defend their organizations.

WATCH ON-DEMAND

The ABCs of AppSec Animated Video: DAST

In our Scrabble-inspired journey, we move forward to explore Dynamic Application Security Testing (DAST). Just as Scrabble enthusiasts create meaningful words, we’ll meticulously explore both the benefits and hurdles of DAST. Dive into the depths of DAST strategy in the realm of AppSec.

WATCH NOW


SCRIPT SQUAD

[eBook] Call Sign: The State of Privileged Access Management

A personal narrative about one man’s quest to be a guardian of the skies, aligning his vigilance and dedication with the imperative role of safeguarding digital assets using Privileged Access Management. You are about to embark on a voyage of discovery, uncovering the shared principles of precision and vigilance in Black Hawk missions and Privileged Access Management.

Author: James Hauswirth , Director, Identity and Access Management, Privileged Access Management (PAM) ? Information Assurance

OPEN ITS PAGES

[BLOG] The CMMC Proposed Rule is Out – Now What?

The CMMC rule is a crucial aspect of the Department of Defense's (DoD) plan to protect sensitive information from cyber threats. The DoD has recognized that cybersecurity is a critical national defense priority, and the CMMC rule reflects this understanding. With the ever-growing sophistication of cyberattacks, it's imperative to stay ahead of potential threats by implementing robust cybersecurity measures.

READ


R.S.V.P.

[LIVE TALK] The Brick House: Balancing Privacy and Security in a Hyper Cyber World

On February 16 at 12pm ET, navigate the complexities of data governance, privacy and security with CISO, Gary Brickhouse and his panel of expert practitioners in this critical realm of GRC. Register today to strengthen your approach to data governance and tackle the intertwined challenges of privacy and security with confidence.

REGISTER


CONTACT US

GuidePoint Security

2201 Cooperative Way | Herndon, VA | 20171 | 877-889-0132

Talk to an Expert



要查看或添加评论,请登录

社区洞察

其他会员也浏览了