Videos & Livestreams
Ready for Red Teaming?
Watch this session with Red Teaming experts Giles Inkson (Director, Red Team & Adversary Simulation) and Karl Fosaaen (VP of Research) to get their practical playbook on building scenarios.
How to Keep Your CISO Out of Jail
From technical guardians to potential legal lightning rods - learn what it really takes to stay out of the courtroom and in control of your cybersecurity program with this on-demand session.
Mastering CTEM: How CISOs Can Take Control of Continuous Threat Exposure Management
Get expert strategies from NetSPI CISOs to strengthen your cyber resilience and effectively implement a CTEM program.
Building a Proactive Security Playbook for Lasting Cyber Resilience
Join NetSPI and Sam Kirkman for an insightful webinar on creating a proactive security playbook. Discover actionable strategies to strengthen your cybersecurity posture and ensure lasting business resilience.
2025 Cybersecurity Trends: idk, AI I guess
Join NetSPI experts Patrick Sayler and Maril Vernon as they dive into our predictions for cyber in 2025, and offer suggestions for your business to stay ahead of these risks.
Everything You Wish You Didn’t Have to Know About Ransomware
Join NetSPI experts Ben Lister and Maril Vernon as they share actionable defense strategies you can employ now to stop ransomware before it starts.
Mainframe in the Spotlight: Regulatory Pressures and Real-World Attacks
Enhance your mainframe security knowledge and ensure a future-proof mainframe security posture with this on-demand session.
Mainframe in the Spotlight: Regulatory Pressures and Real-World Attacks – Thank You
Thank you for your interest in our on-demand webinar. We have also sent you an email with the resource. If your priority is to proactively secure your environment, then NetSPI is here to help. Request a demo and we’ll work together on a strategy to validate and improve your security posture.
Strategic Attack Surface Management: Piecing Together the Puzzle
Watch this on-demand session with NetSPI experts as they discuss integrating EASM & ExPens into a unified proactive security strategy.
CAASM Best Practices: Solve Your Challenges Around Internal Asset Risk
Watch this on-demand Hacker Valley Media webinar on Cyber Asset Attack Surface Management (CAASM) best practices. Learn how to solve challenges of identifying and monitoring internal assets and their interconnected risk.
CAASM Best Practices: Solve Your Challenges Around Internal Asset Risk – Thank You
Thank you for your interest in our on-demand webinar. We have also sent you an email with the resource. If your priority is to proactively secure your environment, then NetSPI is here to help. Request a demo and we’ll work together on a strategy to validate and improve your security posture.
EASM Best Practices: Secure Your Network from External Threats
Watch this on-demand Hacker Valley Media webinar on External Attack Surface Management (EASM) best practices. Learn how to secure your network from external threats.
EASM Best Practices: Secure Your Network from External Threats – Thank You
Thank you for your interest in our on-demand webinar. We have also sent you an email with the resource. If your priority is to proactively secure your environment, then NetSPI is here to help. Request a demo and we’ll work together on a strategy to validate and improve your security posture.
Hack Responsibly: The Hidden Hazards of CICS Application Testing
Understanding the need for comprehensive mainframe testing beyond individual risk assessments starts with this session on CICS and IMS app testing.
The Value of Full Attack Surface Management: Why You Need Both EASM and CAASM – Thank You
Thank you for your interest in our on-demand webinar. We have also sent you an email with the resource. If your priority is to proactively secure your environment, then NetSPI is here to help. Request a demo and we’ll work together on a strategy to validate and improve your security posture.
The Value of Full Attack Surface Management: Why You Need Both EASM and CAASM
Fundamentals of Attack Surface Management, both External Attack Surface Management (EASM) and Cyber Asset Attack Surface Management (CAASM) are essential.
BISO vs CISO: A Head-to-Head with Cyber Leaders Navigating Our Security Landscape
Aligning security needs of a business is a big feat for different security leaders. Watch this webinar with NetSPI’s CISO and Trimble’s BISO to learn how they do it.
Strategic Planning & ROI: How to Make the Most of Your Security Investments
Learn how to measure cybersecurity ROI and make the most of your security investments with NetSPI experts Nabil Hannan and Nick Walker.
Uncovering the Unseen: Real Stories of Asset Discovery
Securing your environment starts with knowing what you don’t know. Watch this webinar on-demand now for asset discovery stories from the front line.
NetSPI Extends Its Proactive Security Solutions with CAASM
Watch this on-demand webinar to learn more about NetSPI’s acquisition of Hubble and the importance of cyber asset attack surface management (CAASM) for proactive security.
NetSPI Extends Its Proactive Security Solutions with CAASM – Thank You
Thank you for your interest in our on-demand webinar. We have also sent you an email with the resource. If your priority is to proactively secure your environment, then NetSPI is here to help. Request a demo and we’ll work together on a strategy to validate and improve your security posture.
How to Navigate the Murky Waters of Attack Surface Management (ASM) with GigaOm – Thank You
Thank you for your interest in our on-demand webinar. We have also sent you an email with the resource. If your priority is to proactively secure your environment, then NetSPI is here to help. Request a demo and we’ll work together on a strategy to validate and improve your security posture.
How to Navigate the Murky Waters of Attack Surface Management (ASM) with GigaOm
GigaOm recently released their Attack Surface Management Radar to help navigate the murky waters of the market. Watch this on-demand webinar to determine which ASM solution is the best fit for you.
The New NetSPI Platform Demo: Welcome to Our New Era – Thank You
The New NetSPI Platform Demo: Welcome to Our New Era
Watch this NetSPI Platform webinar where we’re revealing our new platform functionalities that accelerate your proactive security journey.
SANS Institute Spring Cyber Solutions Fest 2024: Attack Surface & Vulnerability Management Track
Watch this video on attack surface and vulnerability management to learn how these solutions work together to better understand potential risk exposure.
NIST Security Framework Cheat Codes: A Proactive Security Mindset
Join NetSPI's experts Tim MalcomVetter and Beth Barach to decode NIST's updated Cybersecurity Framework.
Dynamic Duo: Empowering Underwriting with Proactive Cybersecurity
Hear from two cybersecurity industry pros, Nabil Hannan, Field CISO at NetSPI and Craig Guiliano, Head of Threat Intelligence and Policyholder Services Global Cyber at Chubb as they share perspectives on assessing policyholders and prospective policyholders for cyber risk.
Let’s Talk Proactive Security: NetSPI’s New Era
Hear from NetSPI’s leadership about the new NetSPI brand, the unified proactive security Platform, and where the cybersecurity industry is headed.
Product Pulse: Breach and Attack Custom Plays for Your SOC – Thank You
Let’s Talk Proactive Security: Are You Validating & Prioritizing the Right Critical Risks?
Gain practical guidance on validating and prioritizing risks in external attack surface management from NetSPI EVP of Strategy, Tim MalcomVetter.
Product Pulse: Breach and Attack Custom Plays for Your SOC
Watch NetSPI’s webinar focused on how Breach and Attack Simulation (BAS) benefits your SOC team at every level.
Hindsight’s 20/20: What Security Leaders Wish They Knew Before Implementing Generative AI
Hear from security leaders at Google and Verizon on lessons they’ve learned and best practices when implementing Generative AI.
NetSPI LinkedIn Live: Proactive Security with NetSPI’s Tim MalcomVetter
Dive into proactive security with NetSPI's Tim MalcomVetter. Explore red teaming, security testing maturity levels, and the evolution of pentesting!
Cloud Pentesting Uncovered: Real Stories, Practical Solutions
Strengthen your cloud security with expert pentesting. Identify vulnerabilities, remediate issues, and reduce risk. Watch our webinar for insights and real-world examples.
The Adversary is Using Artificial Intelligence. Why Aren’t You?
In this livestream, we explore the challenges of ransomware readiness and how AI can be your knight in shining armor. NetSPI's VP of Research Scott Sutherland, takes us through a unique three-phased approach to combat ransomware.
Product Pulse: How to Use Breach and Attack Simulation (BAS) to Improve Ransomware Detection
Join NetSPI BAS lead Derek Wilson and Solutions Architect Spencer McClain to explore how to use BAS to improve ransomware detections.
Innovation & Cyber Resiliency
This session will cover some new innovations that will help IT clear hurdles and explain how to keep innovation and resilience afloat at the same time.
NetSPI LinkedIn Live: HTTP/2 Rapid Reset
NetSPI discusses HTTP/2 Rapid Reset, a 0-day vulnerability that allows for widespread Distributed Denial of Service (DDoS) attacks.
What You Need to Know to Start Implementing the FDA’s New Medical Device Security Requirements
NetSPI Managing Director Ron Kuriscak and Abbott Senior Director of Cybersecurity Operations Steve Currie took an in-depth look at the new requirements and pulled together a clear and actionable summary of what you need to know to stay agile while preparing for compliance.
How AI and ML Help Evolve Cybersecurity
NetSPI security consultant Kurtis Shelton shares in this fireside chat with SmartBrief’s Susan Rush how AI and ML can evolve approaches to cybersecurity by accelerating coding and other rote tasks, freeing up human resources for creativity, research, and testing that advances the work of both attackers and defenders.
Azure Cloud Security Pentesting Skills
At Black Hat, NetSPI VP of Research Karl Fosaaen sat down with the host of the Cloud Security Podcast Ashish Rajan to discuss all things Azure penetration testing. Give the video a watch and then head over to NetSPI's Azure Penetration Testing service to learn more.
Cloud Pentesting Uncovered: Real Stories, Practical Solutions
Join Director of EMEA Services Sam Kirkman and Senior Cloud Security Consultant Nick Lynch to learn about identifying cloud vulnerabilities, assessing infrastructures, and fortifying cloud security.
Cloud Pentesting Uncovered: Real Stories, Practical Solutions – Thank You
Artificial Intelligence & ChatGPT
Watch Nick Landers join the SANS team to discuss the risks, vulnerabilities, and benefits of rapidly introducing machine learning and artificial intelligence globally at the AI & ChatGPT Solutions Forum.
Offensive vs. Defensive Security: Cyber Stories from the Field
Watch this webinar with NetSPI and Nuspire to hear pentesting stories from the perspectives of the pentester and the organization being pentested.
Get Your Head in the Game: How to Create a Winning Cybersecurity Playbook
In this webinar, security leaders from the world of sports will share their tips for creating a winning cybersecurity playbook, including incident response planning and identifying key KPIs for security program success.
Harsh Truths of Security Testing
Join NetSPI and SecureLink to discuss the “Harsh Truths of Security Testing.” Learn how you can use these findings to make a meaningful difference to your security, not just your budget.
Attack Surface Management: Identify and protect the unknown
Hear how NetSPI’s ASM platform and their global pentesting experts can detect and change known, unknown, and potentially vulnerable public-facing assets to your attack surface that may introduce risk.
An Inside Look at NetSPI’s Offensive Security Vision Report
NetSPI’s Cody Chamberlain and guests Ron Eddings and Chris Cochran from Hacker Valley Media discuss our 2023 Offensive Security Vision Report.
Keeping Up with Medical Device Cybersecurity: Q&A with Product Security Leaders at Medtronic, Abbott, and MITRE – Thank You
The Secret to an Effective Security Program: Establish Trust – Then Keep It
In this webinar, healthcare security experts will share tips on how to establish and maintain trust in your cybersecurity program, as well as how to build a risk-aware strategy that prioritizes next steps.
Emerging Cybersecurity Technologies with Jake Reynolds
NetSPI's Head of Emerging Technology, Jake Reynolds, teamed up with Hacker Valley Studios for a sponsored episode on Emerging Cybersecurity Technologies.
Keeping Up with Medical Device Cybersecurity: Q&A with Product Security Leaders at Medtronic, Abbott, and MITRE
Listen to medical device security leaders at Medtronic, Abbott, and MITRE share best practices for compliance, updatability, vulnerability management, and more.
Breach and Attack Simulation & Security Team Success
Join SANS Institute John Pescatore and NetSPI’s VP of Research Scott Sutherland for an engaging conversation on “Breach and Attack Simulation & Security Team Success” and explore critical findings that led to the development of NetSPI’s latest BAS updates.
Breaking Down External Attack Surface Management (EASM) Featuring Forrester Analyst Erik Nost – Thank You
Breaking Down External Attack Surface Management (EASM) Featuring Forrester Analyst Erik Nost
Guest speaker, Forrester senior analyst Erik Nost, joins NetSPI for a fireside chat, where we’ll dig deeper into their inaugural external attack surface management (EASM) landscape report.
Backdooring and Hijacking Azure AD Accounts by Abusing External Identities
This talk gives insight into the external identities concepts, into the technicalities that allowed these attacks to exist, and into ways to harden against these attacks and detect abuse of these vulnerabilities.
Persistence is Vital: Key Lessons Learned when Finding and Discovering CVE-2020-17049
NetSPI Managing Consultant Jake Karnes spoke at the CrestCon UK 2022 conference at the Royal College of Physicians. During this session, Jake described how he found and responsibly disclosed a serious Microsoft vulnerability: The Kerberos Bronze Bit Attack.
How to evaluate Active Directory SMB shares at scale
Vulnerability management programs often fail to identify excessive network share permissions, which can be a major security issue. In this webinar, we will discuss why certain security issues exist and how to identify and manage excessive share privileges.
Financial Services Cybersecurity Best Practices: Part 2 – Offensive Security – Thank You
Financial Services Cybersecurity Best Practices: Part 2 – Offensive Security
In this webinar, a former financial auditor and financial security leader explores best practices financial institutions can follow to improve their offensive security efforts.
Financial Services Cybersecurity Best Practices: Part 1 – Cyber Insurance – Thank You
Financial Services Cybersecurity Best Practices: Part 1 – Cyber Insurance
In this webinar, we sit down with Ethan Harrington, Founder and Principal at 221b Consulting and former H&R Block Director of Enterprise Risk Management and Security Insurance, and Mary Roop, a 15-year insurance and risk management veteran, to explore everything financial institutions should know about cybersecurity insurance.
FutureCon Omaha 2022: Cybersecurity Leaders Discuss Current Cyberthreats and Practices
NetSPI Managing Director Norman Kromberg moderated a panel of CISOs and cybersecurity leaders at FutureCon Omaha. During the “Omaha CISO Panel” they discussed the cyberthreats that security leaders face today and the practices they are implementing to address the threats, among other topics.
How Secure are ATM Machines? An ATM Penetration Testing Expert Explains – Thank You
How Secure are ATM Machines? An ATM Penetration Testing Expert Explains
In this webinar, ATM penetration testing expert Larry "Patch" Trowell explains the steps you can take to protect your ATM systems from a cyberattack.
Mastering the Art of Attack Surface Management
In this webinar, you'll learn from two of our ASM experts, Cody Chamberlain and Eric Gruber, on how to implement a human-first, continuous, risk-based approach to attack surface management.
Application Security In Depth: Understanding The Three Layers Of AppSec Testing
In this webinar, you’ll hear from three experts at each of the core security touchpoints within the Software Development Life Cycle (SDLC): at the code level, pre-deployment, and post-deployment.
2022 Cybersecurity Predictions:
What to Expect in the New Year
Watch our 2022 cybersecurity predictions webinar, where our panel will tackle some of the most debated topics of the past 365 days and predict how each will evolve in the new year and beyond.
How NOT to be the Weakest Link in the Supply Chain
In this webinar you’ll get two different viewpoints on supply chain security from two NetSPI Managing Directors: Nabil Hannan, who will explore the topic from the software development perspective, and Chad Peterson, who will approach it from a business risk perspective.
How to Build and Validate Ransomware Attack Detections – Thank You
Azure Pentesting: Extracting All the Azure Passwords
In this webinar, NetSPI’s Karl Fosaaen will be focusing on the password extraction functionality included in MicroBurst, reviewing many of the places that passwords can hide in Azure, and the ways to manually extract them, and much more.
How to Build and Validate Ransomware Attack Detections
In this webinar, NetSPI’s Scott Sutherland and Alexander Polce Leary will cover how ransomware works, ransomware trends to watch, best practices for prevention, and more. Participants will leave this webinar with actionable advice to ensure their organization is more resilient to ever-evolving ransomware attacks.
Understanding Modern EDR Tools: How They Work, How They Provide Value, and How to Bypass Them
Watch this webinar to explore the role that modern EDRs play and tips for evaluating vendors, review the latest defensive evasion techniques sophisticated adversaries deploy to bypass EDR tools, discover helpful resources for staying up to date with modern research and techniques, and learn how to effectively implement the defensive evasion techniques within your own red team operations.
The Evolution of Risk-Based Vulnerability Management
Watch our webinar with NetSPI's product team, Jake Reynolds and Cody Chamberlain to learn how risk has evolved in penetration testing, the role of risk scoring in intelligent prioritization of security activities, the factors that impact a risk score, the pragmatic steps to take after you receive a risk score, and more.
Healthcare Data Protection in a Pandemic-Driven World
Watch this on-demand presentation from the Cyber Security Digital Summit's online event for Healthcare and Life Sciences. In this session, NetSPI’s Nabil Hannan and RxMx’s Jesse Parente will explore the world of healthcare data management.
A Key Ingredient in a World Class Application Security Program: AppSec as a Service
In this presentation, NetSPI COO Charles Horton and Managing Director Nabil Hannan explore the evolution of “as a Service” offerings, and how these offerings are being applied successfully in application security programs.
AWS Penetration Testing: Common Entry Points and Escalations – Thank You
Vulnerability Management Best Practices for Mergers & Acquisitions – Thank You
Assessing The Threat Landscape And How To Protect Your Organization in 2021
Watch this on-demand presentation from the InfoSec Finance Connect virtual conference to hear expert insights on the current threat landscape and gain invaluable advice on how to protect your organization.
How to Streamline AppSec with Interactive Pentesting
Join presenters Jeff Williams, CTO and Co-founder at Contrast Security, and NetSPI's Managing Director, Nabil Hannan for an exclusive webinar called, "How to Streamline AppSec with Interactive Pentesting."
CVE-2020-17049: Kerberos Bronze Bit Attack – Explained and Exploited
NetSPI’s Jake Karnes explains the inner workings of CVE-2020-17049: The Kerberos Bronze Bit Attack.
Automated Social Engineering for the Antisocial Engineer
NetSPI's Patrick Sayler originally gave this presentation at BSides Portland, but don't miss this extended cut version!
The Adoption of Emerging AppSec Technology
Watch our on-demand session from Cyber Security Digital Summit, "The Adoption of Emerging AppSec Technology: A Possible Shift to the Right."
Getting Started on Application Security
Watch our webinar from Cyber Security Summit, "Getting Started on Application Security," by NetSPI's Managing Director, Nabil Hannan, on-demand now.
Extreme Makeover AppSec Edition
Did you miss Black Hat USA 2020? Watch our webinar, "Extreme Makeover: AppSec Edition," by NetSPI's Managing Director, Nabil Hannan, and Product Manager, Jake Reynolds, on-demand now.
Why zOS Mainframe Security Matters
Mainframes run the global economy and are at the heart of the many of the world’s largest financial organizations.
From Governance to Implementation to Results
In this webinar, we’ll discuss the building blocks of great security programs from governance, automation, implementation models, and more.
Host-Based Security: Staying Secure While Your Employees Work from Home
Watch this on-demand webinar to make sure you are vulnerability management program is covering the right bases to help mitigate some of the implicit risks associated with a remote workforce.
AWS Penetration Testing: Common Entry Points and Escalations
In this webinar, NetSPI's Cody Wass will cover some of the common vulnerabilities that can provide penetration testers with access to AWS environments and more.
Vulnerability Management Best Practices for Mergers & Acquisitions
During this on-demand webinar, NetSPI Managing Director, Nabil Hannan, will dive into critical vulnerability management considerations for your M&A activity.
SQL Server Hacking Tips for Active Directory Environments Webinar
During this presentation, NetSPI's Scott Sutherland covers common ways to target, exploit, and escalate domain privileges through SQL Servers in Active Directory environments.
Securing The Cloud: Top Down and Bottom Up
As organizations continue to move to the cloud for hosting applications and development, security teams must protect multiple attack surfaces, including the applications and cloud infrastructure.
Attacking SQL Server CLR Assemblies
Watch this on-demand webinar on Attacking SQL Server CLR Assemblies with NetSPI’s Scott Sutherland.
Adventures in Azure Privilege Escalation Webinar
During this webinar, NetSPI’s Karl Fosaaen will cover some of the common initial Azure access vectors, along with a handful of escalation paths for getting full control over an Azure tenant.
Scaling Your Security Program with Penetration Testing as a Service
Your organization is always-on and your security should be too. Learn how Penetration Testing as a Service scales and operationalizes continuous pentesting in an ongoing, consumable fashion.
Best Practices to Protect Your Organization’s Cloud Assets
Nearly every organization is talking about moving to the Cloud, developing a strategy to move to the Cloud, moving to the Cloud, or already all in on the Cloud. Join two of NetSPI’s cloud security experts, Practice Director Karl Fosaaen and CISO/Managing Director Bill Carver to learn if your cloud assets are as protected as you think.
Attacking Modern Environments through SQL Server with PowerUpSQL
Learn about one of the open source projects from the NetSPI toolbox called PowerUpSQL. PowerUpSQL can be used to blindly inventory SQL Servers, audit them for common security misconfigurations, and exploit identified vulnerabilities during pentests and red teams operations.
Threat & Vulnerability Management: Where Do You Rank?
Are you working to improve your organization’s security maturity level, but not sure where to start? Want to ensure you can answer that middle-of-the-night text with steps you are taking to avoid the Spectre Meltdown? Learn how NetSPI can help.
Intro to Cloud Penetration Testing
Experts in pen testing cloud apps & infrastructure for vulnerabilities & misconfiguration. Learn about cloud pen testing and common cloud security gaps in this video now.