- 115
- 114 491
BitLyft
United States
เข้าร่วมเมื่อ 16 พ.ย. 2016
We believe you deserve to have your technology protected from cyber threats. We help keep your organization safe by illuminating and eliminating cyber threats before they have time to harm you or your customers. We are a passionate and innovative security operation center (SOC) team that comes alongside your organization to help you tackle your cybersecurity challenges. We utilize our BitLyft AIR platform to supercharge security analysts with advanced detection and automated threat remediation.
Critical Cybersecurity for Water Utilities: Protecting Legacy Systems, Phishing, and APT Threats
In this fireside chat, Jason Miller (Founder and CEO of BitLyft) and Noah Hoag (SOC Director) discuss the top cybersecurity concerns facing water utilities today. From the dangers of phishing attacks to protecting legacy systems like SCADA, this conversation dives into practical strategies to defend critical infrastructure.
Key topics include:
- Phishing Attacks: The top threat facing water utilities and why email security should be a top priority.
- Advanced Persistent Threats (APTs): Why APTs, though less common, are a serious concern for water companies, especially with state-sponsored actors targeting critical infrastructure.
- Real-world Incident: An example of a remote access breach at a water treatment plant and the lessons water utilities should take from it.
- Protecting Legacy Systems: Effective strategies for securing older infrastructure, including network segmentation, limiting remote access, and implementing network monitoring tools.
Stay ahead of emerging cyber threats and ensure your water utility is prepared with the right defenses in place.
Like, share, and subscribe to learn more about how BitLyft can help protect your critical infrastructure!
Key topics include:
- Phishing Attacks: The top threat facing water utilities and why email security should be a top priority.
- Advanced Persistent Threats (APTs): Why APTs, though less common, are a serious concern for water companies, especially with state-sponsored actors targeting critical infrastructure.
- Real-world Incident: An example of a remote access breach at a water treatment plant and the lessons water utilities should take from it.
- Protecting Legacy Systems: Effective strategies for securing older infrastructure, including network segmentation, limiting remote access, and implementing network monitoring tools.
Stay ahead of emerging cyber threats and ensure your water utility is prepared with the right defenses in place.
Like, share, and subscribe to learn more about how BitLyft can help protect your critical infrastructure!
มุมมอง: 45
วีดีโอ
CISOs' Nightmares: Concerns, Blindspots and Importance of Log Retention.
มุมมอง 6283 หลายเดือนก่อน
BitLyft’s Founder & CEO, Jason Miller was recently joined by Michelle Hollis, for a fireside chat to explore - Why all MDR providers are not the same - The importance of log retention - NIST and MITRE ATT&CK Frameworks - CISO’s biggest concerns and blind spots As you think about your own security strategy, consider: are you prepared for the threats you haven't seen yet? Join the discussion with...
Security That Doesn't Suck: The MSPs No-BS Guide to Finding the Right Cybersecurity Solution Replay
มุมมอง 77ปีที่แล้ว
Are you tired of sifting through cybersecurity buzzwords and still getting nowhere? We feel you. It’s time for the unfiltered truth. Join industry frontrunners Jason Miller, Founder and CEO of BitLyft Cybersecurity, and Val King, CEO of Whitehat Virtual Technologies and Ascent Portal, as they delve into a candid conversation designed to guide MSPs directly to the solutions they need. In this no...
BitLyft AIR® Central Threat Intelligence Overview
มุมมอง 94ปีที่แล้ว
Dive into the world of threat intelligence as BitLyft's Director of Operations unpacks the integral role it plays within BitLyft AIR®. This video will spotlight how our unique high-touch service intersects with real-time threat insights to fortify your defenses. Experience firsthand how BitLyft AIR® is not just about identifying threats but also understanding and proactively countering them. St...
BitLyft AIR® Security Automation Overview
มุมมอง 96ปีที่แล้ว
Join BitLyft's Founder and CEO, Jason Miller, as he discusses the security automation component of BitLyft AIR®. Through this video, uncover how we're elevating cybersecurity by merging advanced automation with our distinct high-touch service. Learn how our unique blend ensures faster, smarter, and more personalized protection for your organization. With BitLyft AIR®, see the future of seamless...
BitLyft AIR® Security Operations Center Overview
มุมมอง 157ปีที่แล้ว
Get an exclusive look at BitLyft's Security Operations Center (SOC) with the company's Director of Operations. In this video, discover how our 100% USA-based team combines high-tech capabilities with our signature high-touch service to offer a uniquely personal approach to cybersecurity. Our SOC not only boasts SOC 2 Type 2 Compliance but also exemplifies our commitment to excellence and our de...
BitLyft AIR® SIEM Overview
มุมมอง 102ปีที่แล้ว
Join BitLyft's SOC Director as he dives deep into the Security Information and Event Management (SIEM) component of BitLyft AIR®. Learn how BitLyft integrates cutting-edge SIEM capabilities with our signature high-touch service. This video reveals how our dedicated team and advanced technology join forces, ensuring that with the SIEM aspect of BitLyft AIR®, you're not just implementing a featur...
BitLyft AIR® Overview
มุมมอง 219ปีที่แล้ว
At BitLyft, we prioritize service, blending our dedicated team with advanced security tools to provide a managed detection and response solution that's both comprehensive and personal. Discover how our cutting-edge technology and steadfast support collaborate to ensure that with BitLyft AIR®, you're not just adopting another tool, but partnering with a team genuinely dedicated to your security....
Conference Chat: FutureCon Cybersecurity Conference - Dan Lohrmann, Presidio
มุมมอง 257ปีที่แล้ว
Jason Miller, Founder and CEO of BitLyft Cybersecurity interviews Dan Lohrmann, CISO of Presidio, at the FutureCon Cybersecurity Conference in Detroit. Connect with BitLyft on Social Media LinkedIn: www.linkedin.com/company/bitlyft Twitter: BitLyft Facebook: BitLyft/ Subscribe to our weekly newsletter: go.bitlyft.com/bitlyft-brew-newsletter-sign-up #cybersecurity #techn...
Conference Chat: FutureCon Cybersecurity Conference Detroit
มุมมอง 347ปีที่แล้ว
Jason Miller, Founder and CEO of BitLyft Cybersecurity interviews Tim Savage, Senior Director of Inside Sales at Conceal Connect with BitLyft on Social Media LinkedIn: www.linkedin.com/company/bitlyft Twitter: BitLyft Facebook: BitLyft/ Subscribe to our weekly newsletter: go.bitlyft.com/bitlyft-brew-newsletter-sign-up #cybersecurityconference #technology #cybersecurity
Customer Testimonial | UMBRAGROUP Trade Compliance Officer | BitLyft Cybersecurity
มุมมอง 65ปีที่แล้ว
Wendy Cunningham, Trade Compliance Officer at UMBRAGROUP, shares her experience with BitLyft's managed detection and response services. Connect with BitLyft on Social Media LinkedIn: www.linkedin.com/company/bitlyft Twitter: BitLyft Facebook: BitLyft/ Subscribe to our weekly newsletter: go.bitlyft.com/bitlyft-brew-newsletter-sign-up #cybersecurity #tech #testimonial
Customer Testimonial | Higher Education | BitLyft Cybersecurity
มุมมอง 21ปีที่แล้ว
BitLyft provides managed detection and response services to numerous colleges and universities across the country. Listen in as one of our higher education clients share their experience. Connect with BitLyft on Social Media LinkedIn: www.linkedin.com/company/bitlyft Twitter: BitLyft Facebook: BitLyft/ Subscribe to our weekly newsletter: go.bitlyft.com/bitlyft-brew-news...
Customer Testimonial | UMBRAGROUP General Manager | BitLyft Cybersecurity
มุมมอง 27ปีที่แล้ว
Kyle Smith, General Manager at UMBRAGROUP, shares his experience with BitLyft's managed detection and response services. Connect with BitLyft on Social Media LinkedIn: www.linkedin.com/company/bitlyft Twitter: BitLyft Facebook: BitLyft/ Subscribe to our weekly newsletter: go.bitlyft.com/bitlyft-brew-newsletter-sign-up #cybersecurity #technology #review
Customer Testimonial | Managed Detection and Response | BitLyft Cybersecurity
มุมมอง 62ปีที่แล้ว
BitLyft provides managed detection and response services to numerous colleges and universities across the country. Listen in as one of our higher education clients share their experience working with BitLyft. Connect with BitLyft on Social Media LinkedIn: www.linkedin.com/company/bitlyft Twitter: BitLyft Facebook: BitLyft/ Subscribe to our weekly newsletter: go.bitlyft....
Customer Testimonial | UMBRAGROUP US Director of IT | BitLyft Cybersecurity
มุมมอง 690ปีที่แล้ว
Joe Sheridan, US Director of IT at UMBRAGROUP, shares his experience with BitLyft's managed detection and response services. Connect with BitLyft on Social Media LinkedIn: www.linkedin.com/company/bitlyft Twitter: BitLyft Facebook: BitLyft/ Subscribe to our weekly newsletter: go.bitlyft.com/bitlyft-brew-newsletter-sign-up #cybersecurity #tech #review
Webinar: Understanding Extended Detection and Response
มุมมอง 89ปีที่แล้ว
Webinar: Understanding Extended Detection and Response
Company Culture at BitLyft Cybersecurity
มุมมอง 305ปีที่แล้ว
Company Culture at BitLyft Cybersecurity
Webinar: Cybersecurity Survival for Small Security Teams
มุมมอง 168ปีที่แล้ว
Webinar: Cybersecurity Survival for Small Security Teams
BitLyft Cybersecurity Celebrates Grand Opening in St. Johns, MI
มุมมอง 552 ปีที่แล้ว
BitLyft Cybersecurity Celebrates Grand Opening in St. Johns, MI
Working with BitLyft: The Onboarding Process
มุมมอง 6822 ปีที่แล้ว
Working with BitLyft: The Onboarding Process
Tech Topics in Teslas - Episode 101 - Autonomous Driving
มุมมอง 352 ปีที่แล้ว
Tech Topics in Teslas - Episode 101 - Autonomous Driving
What to Look For in Your NextGen Firewall
มุมมอง 592 ปีที่แล้ว
What to Look For in Your NextGen Firewall
Webinar: Optimize Your Security Posture by Combining the Power of Automation With Human Intervention
มุมมอง 902 ปีที่แล้ว
Webinar: Optimize Your Security Posture by Combining the Power of Automation With Human Intervention
BitLyft Cybersecurity Partners with UMBRAGROUP: A Defense Supplier Success Story
มุมมอง 2092 ปีที่แล้ว
BitLyft Cybersecurity Partners with UMBRAGROUP: A Defense Supplier Success Story
Microsoft Office 365 Best Practices for Security
มุมมอง 8552 ปีที่แล้ว
Microsoft Office 365 Best Practices for Security
The Top 6 Cyber Security Tools You Need for 2022 and Beyond
มุมมอง 1.5K2 ปีที่แล้ว
The Top 6 Cyber Security Tools You Need for 2022 and Beyond
How to Communicate the Value of Cybersecurity to Leadership
มุมมอง 3482 ปีที่แล้ว
How to Communicate the Value of Cybersecurity to Leadership
7 Steps You Need to Take to Maximize Securonix SIEM
มุมมอง 2832 ปีที่แล้ว
7 Steps You Need to Take to Maximize Securonix SIEM
Great content!
Apex bed to look into this
If OS can matching router synchronization relate to certain Iindicent or entanglement phenomenon in LAN , WAN , WWW and domain mapping and store in a certain pattern to keep dependable routers list separate from questionable IP and location to ID mobile threats if possible
nice, thank you! :)
Thanks for sharing great video . Do you have any open position for entry level cyber security analyst position? If so whats the expectation criteria ? Many aspiring cyber security people out there who willing to enter this field and learn as they grow but couldn't find path to enter.
Please help me! I need to know which Certifications you require to be able to obtain a Security Analyst position with your company. =)
if you are able to win CTF's, see this field as a hobby or more a passion, aslong you try out the latest stuff and always learn & and if you can provide prove of experience in that field, you good
'Promo sm' 🙈
I'd love to screen this video at my workplace, but I'm afraid the aggravating background music would make them too irritated to listen. ugh.
this
someone has stolen all my intellectual property all my photo's and all even my name is there anything I can do?
Could use a better explanation on the ideal RDP setup.
RDP setup for security needs to be in place a PAM, privileged access manager, so if any administrator wants to connect to any machine, they have a monitored connection. some others functions can apply to T0 within Microsoft tiering security model
How did you get 7 people for a 24x7 operations?
thank you
Thank you..
Absolutely amazing!!
Grandma’s favorite IT GUY!!!!! 😂😂😂😂
SIEM stand for Security Information and Event Management NOT Security Incident and Event Management
Is wab se kya hota hai
Thank you
Thanks for breaking this down. Hopefully people are becoming more aware of these dangers to their business
For all our sakes, we hope so too. It starts with individual users learning how to spot and recognize these tactics.
I am interested in cyber security which degree is helpfull for me
Computer Science is a great place to start. Many colleges and universities are now offering specific cyber security degrees.
This is amazing👍
We need Tariffs on China .
Good information Brother
Beware of scammers i have been scammed 3 times because i was trying to know if my husband was cheating until i met this hacker named; (cyberghosthacker09@gmail.com) who helped me hack into my spouse phone for real this great hacker hacked into my spouse whats-app messages,Facebook messages.text messages,call logs,deleted text messages,bitcoin account and many more i was impressed with his job and he brought me results under 24 hours believe me he is real and his services are cheap and affordable. whatsapp him on +1 (213) 802-5137
First like, first comment 😀
You forgot to mention "malicious singers". They exist too you know lol
Very good point. Threats are always evolving and we need to stay on the lookout for new avenues of attack!
Huh. I use Tor to troll phishing scammers :D
what's with that unnecessary bg music, a movie teaser or what! dude just keep it educational, could you?
@FarhaanIts a documentary? ok😂
🤣😂🤣🤣😂🤣😂🤣😂🤣
i absolutely loved the music to be honest.
Aren't security analysts the new James Bonds of our age? Don't they deserve epic background music?
@@2centspodcast901 me too