Etay Maor, Sr. Director of Security Strategy at Cato Networks, is also an industry recognized cyber security researcher and keynote speaker. Previously, Etay served as the CSO for IntSights, Executive Security Advisor at IBM, and Head of RSA Security’s Cyber Threats Research Labs.
In this special, cohosted Masterclass, join Etay Maor, Sr. Director of Security Strategy at Cato Networks, Sam Curry, Chief Security Officer at Cybereason, and Ofer Maor, Chief Technology Officer at Mitiga.
tools and best practices
Research and real-world
What can you do about this? Sign up for our new master class series on cybersecurity. These classes…
Ransomware attacks are dominating the cyber threat landscape. As a low-risk, high-reward activity, we’re bound to see more…
How can you identify and mitigate deepfake threats? By understanding the different tactics and techniques behind voice
Join Ron Ford, Cyber Security Advisor at CISA/DHS (Cybersecurity and Infrastructure Security Agency / Department of Homeland Security)…
Join Deborah Wheeler, Delta Airlines CISO, and Etay Maor, Sr. Director Security Strategy at Cato Networks.
Moti Cristal has 25 years of experience in negotiations, from hostage negotiations to diplomatic treaties and complex business…
In this masterclass, Bradford Hegrat, Accenture’s Security Principal Director, and Etay Maor, Cato Networks Sr. Director Security Strategy discuss the threats, architectures, and security challenges for ICS.
The masterclass will cover multiple aspects of the security program, including utilizing the MITRE ATT&CK framework, how teams approach the Pyramid of Pain, maturity models, and more.
Etay Maor will guide you through 2022’s worst, under-the-radar breaches: including how they happened, why they happened and how to prevent them.
In this special, cohosted Masterclass, join Etay Maor, Sr. Director of Security Strategy at Cato Networks, and Matt Lembright, Director of Federal Applications at Censys.
How can threat actors use ChatGPT for everything from creating phishing emails, identifying vulnerabilities to writing malicious code? Check out this Masterclass and find out more.
How can you use the MITRE ATT&CK Navigator for everything from adversary research to defense gap analysis and more? We are going to live demo this!