Search

Cross-Border Reality: What FBI/CISA and Canada’s Cyber Centre Agree On About “Scattered Spider”

Cross-Border-Reality-What-FBI-CISA-and-Canada’s-Cyber-Centre-Agree-On-About-Scattered Spider

This fall, SecTor returns to Toronto, bringing together cybersecurity practitioners from both sides of the border to share insights on fast-moving threats and the playbooks that actually work in the wild. Few topics warrant that cross-border lens more than Scattered Spider, a financially motivated threat collective whose evolving tactics in social engineering and identity abuse continue to challenge defenders.

For Your Eyes Only: Why Critical Alerts and Threat Feeds Must Go Out of Band

Why-Energy-Companie-Move-Critical-Alerts-and-Threat-Feeds-Out-of-Band

With rising threats to operational technology (OT) environments, energy companies are rethinking how they deliver their most sensitive cybersecurity alerts and threat intelligence feeds. When conventional communication pathways are compromised—or even just suspected to be—out-of-band communication can mean the difference between staying ahead of an incident and losing critical time.

How to Safely Engage External Advisors During Cyber Incidents

How-to-Safely-Engage-External-Advisors-During-Cyber-Incidents

Today’s digital world is constantly changing, with cyber threats becoming more complex and evolving rapidly. This presents significant challenges for businesses in all sectors, especially those operating within critical infrastructure. These threats don’t just affect the technical aspects; they also impact how an organization operates, its legal responsibilities, and its overall strategy.

Search