Past Cybersecurity Webinar

Defending the Digital Perimeter with Effective Blue Teaming Tactics

Technology > Cybersecurity5/16/2025 1:30 PM

Go to Registration Page

Join EC-Council's webinar on proactive cyber defense methods. Learn to build effective blue team strategies. Learn more on WebinarCafe.

Cybersecurity Webinar Benefits

bstract- In the current threat landscape, where cyber threats are evolving rapidly, proactive network security is desperately needed to prevent and reduce the impact of cyber incidents. Blue teaming and cyber defense incorporate how organizations identify, detect, prevent, and mitigate cyber threats and vulnerabilities. While traditional approaches to security operations have been reactive to threats, the ever-changing nature of the threat landscape requires that organizations shift to more proactive methods. This webinar series is dedicated to understanding proactive cyber defense strategies and how to build an effective blue team program. In today’s session, we will understand the fundamental elements of a cyber defense program, learn the difference between detective and preventative controls and how they function together, learn how Governance, Risk, and Compliance (GRC) can guide program objectives, and learn how to gain critical buy-in and support from senior leadership when establishing a security program.

Speaker: Andrew "AJ"​ Jarrett, Director, Cyber Monitoring & Incident Response, Depository Trust & Clearing Corporation (DTCC)  

Comments

Rate This Webinar

community rating (0 votes): 
Rate or Review This Webinar

Publisher

EC-Council

EC-Council

EC-Council is a global leader in cybersecurity education. They offer a wide range of certifications and training programs to empower professionals to reach their cybersecurity career goals. Their certifications cover various areas of cybersecurity, including ethical hacking, network security, incident handling, and more. With a focus on hands-on skill development and real-world scenarios, EC-Council aims to equip cybersecurity professionals with the knowledge and skills needed to protect systems, networks, and critical data from malicious hackers. Visit their website for more information and to explore their training programs.