Giles Inkson
Certifications earned CSTL, CTL infrastructure, CISSP, CCSP, AZ-500, MS-500, CCNP, MCSE.
WP_Query Object ( [query] => Array ( [post_type] => Array ( [0] => post [1] => webinars ) [posts_per_page] => -1 [post_status] => publish [meta_query] => Array ( [relation] => OR [0] => Array ( [key] => new_authors [value] => "184" [compare] => LIKE ) [1] => Array ( [key] => new_presenters [value] => "184" [compare] => LIKE ) ) ) [query_vars] => Array ( [post_type] => Array ( [0] => post [1] => webinars ) [posts_per_page] => -1 [post_status] => publish [meta_query] => Array ( [relation] => OR [0] => Array ( [key] => new_authors [value] => "184" [compare] => LIKE ) [1] => Array ( [key] => new_presenters [value] => "184" [compare] => LIKE ) ) [error] => [m] => [p] => 0 [post_parent] => [subpost] => [subpost_id] => [attachment] => [attachment_id] => 0 [name] => [pagename] => [page_id] => 0 [second] => [minute] => [hour] => [day] => 0 [monthnum] => 0 [year] => 0 [w] => 0 [category_name] => [tag] => [cat] => [tag_id] => [author] => [author_name] => [feed] => [tb] => [paged] => 0 [meta_key] => [meta_value] => [preview] => [s] => [sentence] => [title] => [fields] => [menu_order] => [embed] => [category__in] => Array ( ) [category__not_in] => Array ( ) [category__and] => Array ( ) [post__in] => Array ( ) [post__not_in] => Array ( ) [post_name__in] => Array ( ) [tag__in] => Array ( ) [tag__not_in] => Array ( ) [tag__and] => Array ( ) [tag_slug__in] => Array ( ) [tag_slug__and] => Array ( ) [post_parent__in] => Array ( ) [post_parent__not_in] => Array ( ) [author__in] => Array ( ) [author__not_in] => Array ( ) [search_columns] => Array ( ) [ignore_sticky_posts] => [suppress_filters] => [cache_results] => 1 [update_post_term_cache] => 1 [update_menu_item_cache] => [lazy_load_term_meta] => 1 [update_post_meta_cache] => 1 [nopaging] => 1 [comments_per_page] => 50 [no_found_rows] => [order] => DESC ) [tax_query] => WP_Tax_Query Object ( [queries] => Array ( ) [relation] => AND [table_aliases:protected] => Array ( ) [queried_terms] => Array ( ) [primary_table] => wp_posts [primary_id_column] => ID ) [meta_query] => WP_Meta_Query Object ( [queries] => Array ( [0] => Array ( [key] => new_authors [value] => "184" [compare] => LIKE ) [1] => Array ( [key] => new_presenters [value] => "184" [compare] => LIKE ) [relation] => OR ) [relation] => OR [meta_table] => wp_postmeta [meta_id_column] => post_id [primary_table] => wp_posts [primary_id_column] => ID [table_aliases:protected] => Array ( [0] => wp_postmeta ) [clauses:protected] => Array ( [wp_postmeta] => Array ( [key] => new_authors [value] => "184" [compare] => LIKE [compare_key] => = [alias] => wp_postmeta [cast] => CHAR ) [wp_postmeta-1] => Array ( [key] => new_presenters [value] => "184" [compare] => LIKE [compare_key] => = [alias] => wp_postmeta [cast] => CHAR ) ) [has_or_relation:protected] => 1 ) [date_query] => [request] => SELECT wp_posts.ID FROM wp_posts INNER JOIN wp_postmeta ON ( wp_posts.ID = wp_postmeta.post_id ) WHERE 1=1 AND ( ( wp_postmeta.meta_key = 'new_authors' AND wp_postmeta.meta_value LIKE '{cba24614729e642ca994fe7475347c03fda3459bcbc219d1bc7cea05b69b5686}\"184\"{cba24614729e642ca994fe7475347c03fda3459bcbc219d1bc7cea05b69b5686}' ) OR ( wp_postmeta.meta_key = 'new_presenters' AND wp_postmeta.meta_value LIKE '{cba24614729e642ca994fe7475347c03fda3459bcbc219d1bc7cea05b69b5686}\"184\"{cba24614729e642ca994fe7475347c03fda3459bcbc219d1bc7cea05b69b5686}' ) ) AND wp_posts.post_type IN ('post', 'webinars') AND ((wp_posts.post_status = 'publish')) GROUP BY wp_posts.ID ORDER BY wp_posts.post_date DESC [posts] => Array ( [0] => WP_Post Object ( [ID] => 32127 [post_author] => 53 [post_date] => 2024-03-15 16:05:08 [post_date_gmt] => 2024-03-15 21:05:08 [post_content] =>Security validation tools are gaining traction as organizations increasingly look to test their security controls against real-world threat vectors.
According to Gartner, through 2026, more than 40% of organizations, including two-thirds of midsize enterprises, will rely on consolidated platforms to run cybersecurity validation assessments. Breach and attack simulation tools are being used for this purpose.
See how NetSPI BAS helps customers consolidate their cybersecurity validation assessments. During this webinar we'll cover:
- How to build custom plays that can be used to create unique tests specific to your environment.
- Addressing time and resource constraints and setting your SOC team up for success
- Confirming security readiness and security posture
Watch the webinar and learn more about NetSPI’s proactive security solutions.
[post_title] => Product Pulse: Breach and Attack Custom Plays for Your SOC [post_excerpt] => [post_status] => publish [comment_status] => closed [ping_status] => closed [post_password] => [post_name] => breach-and-attack-custom-plays-for-soc [to_ping] => [pinged] => [post_modified] => 2024-04-03 12:21:00 [post_modified_gmt] => 2024-04-03 17:21:00 [post_content_filtered] => [post_parent] => 0 [guid] => https://www.netspi.com/?post_type=webinars&p=32127 [menu_order] => 1 [post_type] => webinars [post_mime_type] => [comment_count] => 0 [filter] => raw ) ) [post_count] => 1 [current_post] => -1 [before_loop] => 1 [in_the_loop] => [post] => WP_Post Object ( [ID] => 32127 [post_author] => 53 [post_date] => 2024-03-15 16:05:08 [post_date_gmt] => 2024-03-15 21:05:08 [post_content] =>Security validation tools are gaining traction as organizations increasingly look to test their security controls against real-world threat vectors.
According to Gartner, through 2026, more than 40% of organizations, including two-thirds of midsize enterprises, will rely on consolidated platforms to run cybersecurity validation assessments. Breach and attack simulation tools are being used for this purpose.
See how NetSPI BAS helps customers consolidate their cybersecurity validation assessments. During this webinar we'll cover:
- How to build custom plays that can be used to create unique tests specific to your environment.
- Addressing time and resource constraints and setting your SOC team up for success
- Confirming security readiness and security posture
Watch the webinar and learn more about NetSPI’s proactive security solutions.
[post_title] => Product Pulse: Breach and Attack Custom Plays for Your SOC [post_excerpt] => [post_status] => publish [comment_status] => closed [ping_status] => closed [post_password] => [post_name] => breach-and-attack-custom-plays-for-soc [to_ping] => [pinged] => [post_modified] => 2024-04-03 12:21:00 [post_modified_gmt] => 2024-04-03 17:21:00 [post_content_filtered] => [post_parent] => 0 [guid] => https://www.netspi.com/?post_type=webinars&p=32127 [menu_order] => 1 [post_type] => webinars [post_mime_type] => [comment_count] => 0 [filter] => raw ) [comment_count] => 0 [current_comment] => -1 [found_posts] => 1 [max_num_pages] => 0 [max_num_comment_pages] => 0 [is_single] => [is_preview] => [is_page] => [is_archive] => [is_date] => [is_year] => [is_month] => [is_day] => [is_time] => [is_author] => [is_category] => [is_tag] => [is_tax] => [is_search] => [is_feed] => [is_comment_feed] => [is_trackback] => [is_home] => 1 [is_privacy_policy] => [is_404] => [is_embed] => [is_paged] => [is_admin] => [is_attachment] => [is_singular] => [is_robots] => [is_favicon] => [is_posts_page] => [is_post_type_archive] => [query_vars_hash:WP_Query:private] => 26b12462ebc33d444b2f0f8aa96bd892 [query_vars_changed:WP_Query:private] => [thumbnails_cached] => [allow_query_attachment_by_filename:protected] => [stopwords:WP_Query:private] => [compat_fields:WP_Query:private] => Array ( [0] => query_vars_hash [1] => query_vars_changed ) [compat_methods:WP_Query:private] => Array ( [0] => init_query_flags [1] => parse_tax_query ) )