Webinars
Journey to the Underground: Insights Into What’s Fueling Ransomware in 2024
This webinar breaks down the most important findings from The SpyCloud 2024 Malware and Ransomware Defense Report and what your organization can do to get ahead of emerging cyber threats.
Protect Customer Account Integrity & Reduce ATO Risk
This webinar shows how having insight into compromised customer darknet data can prevent account takeover, forecast targeted attacks, and predict fraud tied to malware.
Uncover Cybercriminals with SpyCloud Investigations
This demo/webinar shows how SpyCloud Investigations revolutionizes your analyst and investigators impact.
Consumer or Criminal? An inside look at SpyCloud’s Consumer Risk Protection for Financial Services
This demo/webinar shows how SpyCloud helps financial organizations safeguard consumer digital identities and stop high-risk attacks tied to malware.
Consumer or Criminal? An inside look at SpyCloud’s Consumer Risk Protection for eCommerce
This demo/webinar shows how SpyCloud helps eCommerce organizations safeguard consumer digital identities and stop high-risk attacks tied to malware.
The Missing Ingredient in Your Zero Trust Recipe
Learn how to address a common Zero Trust implementation gap that is leaving organizations vulnerable to targeted attacks: users’ stolen session cookies.
An Inside Look at Game-Changing Threats in 2024
In this webinar, we cover top trends from the SpyCloud 2024 Identity Exposure Report. Learn about the identity threats putting organizations everywhere at risk.
From Zero to Hero: What Your Security Team Can Unlock with Actionable Data
Learn how actionable data analytics from SpyCloud helps your security team scale, use resources more efficiently, and shorten investigation time.
The Illicit Chinese “Pantsless Data” Trade
Hear from SpyCloud Labs researchers how Chinese cybercriminals are accessing, exfiltrating, and trading vast amounts of PII, with international impact.
Ransomware Reality Check: The New Landscape
This webinar breaks down the most important findings from SpyCloud’s 2023 Ransomware Defense Report, and what your organization can do to get ahead of emerging cyber threats.
Access Granted – The reality of compromised credentials in a passwordless world
On-Demand Webinar: Explore the evolution of authentication and scrutinize common myths around passwordless technology.
Don’t Play Footsie with Cybercriminals
On-Demand Webinar: Unveil the top darknet exposure trends for London’s FTSE 100 companies, including insights on password reuse, stolen session cookies and cloud app exposures
Top Identity Exposure Trends from the Criminal Underground
On-Demand Webinar: We break down the latest trends related to identity exposure in the criminal underground and how this data puts organizations and consumers at risk of cybercrime.
Insane in the Membrane: Why Old Tactics Fail for Ransomware Prevention
On-Demand Webinar: Learn about a new, more complete and more effective approach to preventing ransomware called Post-Infection Remediation.
Shining a Light Into the Dark Web
On-Demand Webinar: Learn how stolen data makes its way from small circles of bad actors to the dark web and how to identify legitimate consumers interacting with your site vs. criminals leveraging stolen data.
Mind the Gap: Closing Ransomware Risk Visibility Gaps
On-Demand Webinar: Benchmark your ransomware preparedness & discover proactive strategies to solve your defense blindspots.
Combating Fraud from Stolen Cookies: Introducing SpyCloud Session Identity Protection
On-Demand Webinar: A detailed look at how anti-detect browsers + malware-stolen data put consumers at risk of fraud, and how Session Identity Protection helps protect your bottom line by offering early warning of malware-infected consumers with compromised web session cookies.
Surviving a Data Breach – On-Demand
Security leaders who have been through worst-case scenarios offer real-world advice for stronger breach prevention & response. Get the audio file or watch the panel webinar on-demand.
How Credential Stuffing Tools Are Made
Learn how credential stuffing works and get insights into the tools of the trade (including some very sophisticated custom Nintendo crimeware). Discover why stolen accounts that don’t have obvious monetary value can be profitable for cybercriminals.
I Put a Keylogger On You, and Now You’re Mine: What Cybercriminals See When They Infect a Host with Malware
See malware from the criminal perspective, including how the data collected from infected machines gets monetized. Learn how to shield your organization from the damage caused by credential-stealing malware.