Videos · October 18, 2021Expel Detecting And Defending Against Ransomware
In this on-demand webcast, independent information security expert and author of the best-selling book Hacking For Dummies, Kevin Beaver, joins Expel to discuss this critical aspect of your information security program and what’s likely one of your greatest IT-related risks.
Videos · January 31, 2021Inside an investigation: compromised AWS access keys
Hear how we caught an attacker that used a developer’s machine to gain access to AWS.
Videos · January 20, 2021Stories from the SOC: Investigating a phishing attack
Expel’s Ray Pugh walks through a phishing investigation. Learn how our analyst determines if it was malicious, who has been compromised and how to get left of the threat.
Videos · November 19, 2020Fighting the Good Fight: Your 30min Guide to Threat Hunting
Expel’s Matthew Hosburgh and VMware Carbon Black’s Greg Foss, demystify threat hunting and chat about what you can do to keep your org secure.
Videos · October 15, 2020How to leverage security automation to identify malicious activity
Expel’s Anthony Randazzo and Exabeam’s Andrew Skrei talk about how you can gain visibility to determine what’s malicious and not - all while getting time back in your day.
Videos · August 12, 2020EXE Live | How to get started with a multi-cloud strategy
Expel's Andrew Pritchett and Lacework's Chris Pedigo help make sense of the gigantic security signals from the clouds and chat about some best practices.
Videos · July 15, 2020EXE Live | Finding contrails: How to track data access in the cloud
Mary Singh and Andrew Pritchett will walk through different ways to track data access in the cloud and share configuration tips.
Videos · July 1, 2020Conquering GCPs IAM hierarchy: Where to get started with Service Accounts
Andrew Pritchett and Peter Silberman walk through GCP Service Accounts best practices.
Videos · June 18, 2020Following the CloudTrail: Where to get started with AWS security monitoring
Expel's Matt Peters and Peter Silberman walk through how to use AWS capabilities as part of your detection and response strategy.
Videos · August 28, 2018Connecting network and endpoint data to find attackers
Watch this recorded webinar to see how to piece together evidence from endpoint & network detection and response tools -- like CarbonBlack and ProtectWise -- to tell the complete story of an incident.
Videos · August 28, 2018How to build a detection and response program
Listen in as Endgame and Expel chat about what an effective detection and response program looks like, key metrics to measure whether your program is effective, and how a managed endpoint detection and response program can help you.