CSIS

The Hub

Welcome to the Hub!
Access our multimedia content here.

Recorded Webinars

November 24, 2022

Exclusive Preview of the Threat Matrix H1 2022

April 20, 2022

Cybersecurity Brief Ukraine Crisis and the Latest Threat Matrix Report

February 1, 2022

Cyber Defence Feed

January 19, 2022

Cyber threat predictions for 2022

April 20, 2021

Exclusive Preview of the Threat Matrix H2 2020

April 14, 2021

The Bagsu banker case - journey into a carding operation

Cyber threat predictions for 2021: What to expect from the coming year?

How to build an excellent SIEM with CSIS Managed Detection & Response

Exclusive Preview of the Threat Matrix H1 2020

How compromised O365 accounts lead to financial loss

Insecure About Web Security

COVID-19 Threat Landscape Update

Inside the Threat Matrix Latest Malware Trends Real-World Scenarios

COVID-19 Update On The Threat Landscape

The Magecart Phenomenon

Business Email Compromise: Understand it, Detect it, Prevent it

View more

Copenhagen Cybercrime Conference 2022

October 26, 2022

Ransomware Attacks: The Power of Uniting Technical & Negotiation Efforts

Threat Matrix Report

Threat Matrix Report H1 2022

Threat Matrix Report H1 2022

Threat Matrix Report H2 2021

Threat Matrix Report H2 2021

Threat Matrix Report H1 2021

Threat Matrix Report H1 2021

Threat Matrix Report H2 2020

Threat Matrix Report H2 2020

Case studies

Case study MDR

Case study MDR

CSIS prevents a high-severity incident from becoming a complete crisis scenario.

Case study Chronos

Case study Chronos

Leveraging its proprietary Chronos platform, CSIS delivers best-in-class Incident Response services and minimizes damage caused by a major ransomware attack.

Case study CIRK

Case study CIRK

CSIS's remote forensics tool helps a lading UK bank prevent fraud.

Case study MDR

Case study MDR

A leading Danish digitization company leverages CSIS's MDR Services to maintain a best-in-class security posture.

Products and services videos

Leveraging Threat Intelligence and Machine Learning in Cyber

Compromise Assessment

Compromise Assessment

How can you be sure your network hasn’t been breached by hackers? Find out why you need to undertake periodic compromise assessments.

Newsletter

Cyber Bytes, October 2022

Cyber Bytes, October 2022

Cyber Bytes, September 2022

Cyber Bytes, September 2022

Cyber Bytes, August 2022

Cyber Bytes, August 2022

Cyber Bytes, July 2022

Cyber Bytes, July 2022

Cyber Bytes, June 2022

Cyber Bytes, June 2022

Cyber Bytes, May 2022

Cyber Bytes, May 2022

Cyber Bytes, April 2022

Cyber Bytes, April 2022

Cyber Bytes, March 2022

Cyber Bytes, March 2022

Cyber Bytes, February 2022

Cyber Bytes, February 2022

Cyber Bytes, January 2022

Cyber Bytes, January 2022

Cyber Bytes, December 2021

Cyber Bytes, December 2021

Cyber Bytes, November 2021

Cyber Bytes, November 2021

Cyber Bytes, October 2021

Cyber Bytes, October 2021

Cyber Bytes, September 2021

Cyber Bytes, September 2021

Cyber Bytes, August 2021

Cyber Bytes, August 2021

Cyber Bytes, July 2021

Cyber Bytes, July 2021

Cyber Bytes, June 2021

Cyber Bytes, June 2021

Cyber Bytes, May 2021

Cyber Bytes, May 2021

Cyber Bytes, April 2021

Cyber Bytes, April 2021

Cyber Bytes, March 2021

Cyber Bytes, March 2021

Cyber Bytes, February 2021

Cyber Bytes, February 2021

Cyber Bytes, January 2021

Cyber Bytes, January 2021

Cyber Bytes, December 2020

Cyber Bytes, December 2020

Cyber Bytes, November 2020

Cyber Bytes, November 2020

Cyber Bytes, October 2020

Cyber Bytes, October 2020

Cyber Bytes, September 2020

Cyber Bytes, September 2020

Cyber Bytes, August 2020

Cyber Bytes, August 2020

Cyber Bytes, July 2020

Cyber Bytes, July 2020

Cyber Bytes, June 2020

Cyber Bytes, June 2020

View more

Release Notes

Release Notes, September 2022

Release Notes, September 2022

Release Notes, August 2022

Release Notes, August 2022

Release Notes, July 2022

Release Notes, July 2022

Release Notes, June 2022

Release Notes, June 2022

Release Notes, May 2022

Release Notes, May 2022

Release Notes, April 2022

Release Notes, April 2022

Release Notes, March 2022

Release Notes, March 2022

View more

CSIS Tech Blog

CSIS Tech Blog

CSIS Tech Blog

Newsletter

Sign up

Stay informed.
Get our Cyber Bytes!