Big,Data.,Business,And,Digital,Technologies.,Data,Flow,In,A

Webinars to pollinate your perspective.

Upcoming Webinars
Identity Under Siege: Strategies for Detecting and Responding to Evolving Identity-Based Threats

Today's cybersecurity landscape is dominated by identity-focused attacks. Identity-driven threats have increased by 156% between 2023 and 2025, now representing 59% of all confirmed threat cases across the eSentire customer base.

In this webinar, James Hastings, Senior Product Manager at eSentire, shares new research from eSentire’s Threat Response Unit that explores how the cybersecurity threat landscape has transformed significantly with identity-based attacks emerging as one of the most dominant threat vectors. We will share how identity-based attacks have evolved from opportunistic attacks to significant Cybercrime-as-a-Service operations that allow attackers to target the foundation of an organization’s security architecture.

The session will explore:

· Observations from real world cases including Phishing-as-a-Service platforms such as Tycoon 2FA that MFA

· The industry sectors are the most exposed to advanced business email compromise phishing attacks

· The role info modern infostealers and malware such as Lumma Stealer play in targeting a range of credentials in SaaS applications, identity services, and browser-stored passwords

· Why traditional security measures can’t detect and respond effectively to these modern identity threats

· A 90-day plan for implementing MDR for Identity techniques to defend against identity-based threats that extend beyond traditional IAM

Read More ...
Scaling Zero Trust: Real-World Lessons and Practical Moves

Zero Trust is no longer just a CISO priority, it’s a team effort. Whether you're setting the strategy or executing the details, the challenge is the same: how do you apply Zero Trust without slowing the business down?

This webinar will share what it really takes to scale Zero Trust from aligning stakeholders to strengthening your security posture. We’ll cover how teams are tackling exposure across identities, devices, and data; managing configuration drift; and driving control improvements with the resources they already have. We’ll also show how Reach helps operationalize Zero Trust by prioritizing action, enforcing policy, and validating posture continuously.

Topics include:

  • Where to start: Mapping Zero Trust initiatives to business goals and technical realities
  • Security + usability: Enforcing policies without breaking workflows
  • Making it threat-informed: Adapting controls to evolving attack techniques, not just checklists
  • Posture and configuration: Continuously validating that Zero Trust controls are working as intended
  • Driving change: Overcoming resistance and delivering progress across teams

If you’re working to implement or scale Zero Trust in your organization, this session will help you connect strategy to execution.

Speaker:

Tommy Hui

Tommy Hui

VP of Global Sales Engineering, Reach Security

Tommy is a seasoned cybersecurity professional with extensive experience in helping organizations protect themselves from cyber threats. Currently, at Reach Security,Tommy focuses on empowering businesses to proactively harden their environment with a cutting-edge platform that reduces risk and exposures.

Before joining Reach Security,Tommy led Sales Engineering efforts at Dazz, specializing in unified vulnerability and application security posture management, ensuring organizations could effectively identify and remediate security risks. Prior to that, Tommy helped scale the Sales and Sales Engineering team at SentinelOne leading up to their IPO.

Earlier in his career,Tommy held roles that focused on Network DLP, Security Analytics, and also worked as a DoD employee supporting cryptographic modernization and cyber weapon system program offices. With a deep understanding of cybersecurity technologies and a passion for protecting organizations from emerging threats,Tommy continues to drive innovation and security excellence in the industry.

Read More ...