etay Maor

Cybersecurity Master Class

Etay Maor, Sr. Director of Security Strategy at Cato Networks, is also an industry recognized cyber security researcher and keynote speaker. Previously, Etay served as the CSO for IntSights, Executive Security Advisor at IBM, and Head of RSA Security’s Cyber Threats Research Labs.

Featured In

Demonstrated cybersecurity
tools and best practices

Research and real-world
case studies

Top cybersecurity

Ep. 17  Network Threats: A Step-by-step Attack Demonstration

Join Cato’s Security Experts: Dolev Attiya, Staff Security Engineer; Matan Mittelman, Security Research Team Leader; and Etay Maor, Senior Director Security Strategy, as they explore the actions of threat actors on networks.

LP Diving Deep into the Dark Web

Ep. 16 HUMINT: Diving Deep into the Dark Web

In this session, cyber threat intelligence veterans Kobe Shwartz (CEO of Darknet Monitoring), and Etay Maor (Sr. Director Security Strategy at Cato Networks) dive into the dark web.

Becoming a Whitehat

Ep. 15 Becoming a White Hat : An interview with a former Black Hat

If the name Hector Monsegur does not ring a bell, perhaps Sabu of Lulzsec does. In this unique session, Etay Maor interviews Hector about how a young kid turns into blackhat and then turns into whitehat.

The Numbers Behind the Numbers

Ep. 14 The Numbers Behind the Numbers – Cost of a Data Breach

From working with law enforcement to preparation to top entry points for attackers – what affects the cost of a data breach the most? Join our webinar to find out more.


Ep. 13 Everything You Wanted To Know About AI Security But Were Afraid To Ask

There is no escaping the daily articles that hype AI or describe it as humanity’s impending doom, In this session, we will go beyond the hype and find out if and how AI impacts your cybersecurity strategy.


Ep. 12 The Best Defense Is ATT&CK: Applying MITRE ATT&CK To Your Organization

How can you use the MITRE ATT&CK Navigator for everything from adversary research to defense gap analysis and more? We are going to live demo this!

Ep. 11 Offensive and Defensive AI: Let’s chat(GPT) About It

How can threat actors use ChatGPT for everything from creating phishing emails, identifying vulnerabilities to writing malicious code? Check out this Masterclass and find out more.

Proactive Threat Hunting

Ep. 10 The Art of Cybersecurity Warfare: Proactive Threat Hunting & OSINT With Attack Surface Management Tools

In this special, cohosted Masterclass, join Etay Maor, Sr. Director of Security Strategy at Cato Networks, and Matt Lembright, Director of Federal Applications at Censys.

Ep. 9 The 3 Worst Breaches of 2022 (That You Probably Haven’t Heard Of)

Etay Maor will guide you through 2022’s worst, under-the-radar breaches: including how they happened, why they happened and how to prevent them.

How to set up a threat hunting and threat intelligence program

Ep. 8 How to set up a threat hunting and threat intelligence program

The masterclass will cover multiple aspects of the security program, including utilizing the MITRE ATT&CK framework, how teams approach the Pyramid of Pain, maturity models, and more.

Securing Industrial Control Systems

Ep. 7 Securing Industrial Control Systems

In this masterclass, Bradford Hegrat, Accenture’s Security Principal Director, and Etay Maor, Cato Networks Sr. Director Security Strategy discuss the threats, architectures, and security challenges for ICS.

Ep. 6 Ransomware Negotiations – Winning The Mind Game

Moti Cristal has 25 years of experience in negotiations, from hostage negotiations to diplomatic treaties and complex business…

Ep. 5 A CISO’s Perspective on Security

Join Deborah Wheeler, Delta Airlines CISO, and Etay Maor, Sr. Director Security Strategy at Cato Networks.

Ep. 4 Supply chain attacks & Critical infrastructure: CISA’s approach to resiliency

Join Ron Ford, Cyber Security Advisor at CISA/DHS (Cybersecurity and Infrastructure Security Agency / Department of Homeland Security)…

Ep. 3 From Disinformation to Deepfake

How can you identify and mitigate deepfake threats? By understanding the different tactics and techniques behind voice

Ep. 2 Ransomware: Attackers, Defenders, and FBI’s Perspective

Ransomware attacks are dominating the cyber threat landscape. As a low-risk, high-reward activity, we’re bound to see more…

EP:1 How (and Why) to Apply OSINT to Protect your Enterprise

What can you do about this? Sign up for our new master class series on cybersecurity. These classes…