Driving Smarter Cybersecurity Decisions with Exposure Validation | Insights from CISOs
Picus Security
Driving Smarter Cybersecurity Decisions with Exposure Validation | Insights from CISOs
46:25
How to Prioritize Vulnerabilities Using Adversarial Exposure Validation | Real-World Case
Picus Security
How to Prioritize Vulnerabilities Using Adversarial Exposure Validation | Real-World Case
20:43
[DEMO] How to Operationalize Exposure Validation with Picus Security
Picus Security
[DEMO] How to Operationalize Exposure Validation with Picus Security
13:10
Exposure Validation Explained: Stop Chasing Every CVE | Volkan Erturk, Picus CTO
Picus Security
Exposure Validation Explained: Stop Chasing Every CVE | Volkan Erturk, Picus CTO
31:02
[Gartner Keynote] Why Adversarial Exposure Validation (AEV) is the Future of Security | Eric Ahlm
Picus Security
[Gartner Keynote] Why Adversarial Exposure Validation (AEV) is the Future of Security | Eric Ahlm
34:40
How Picus Helps India’s Public Sector Validate Cybersecurity Effectiveness
Picus Security
How Picus Helps India’s Public Sector Validate Cybersecurity Effectiveness
3:07
Why Continuous Validation is Key to Modern Security Operations | Picus Security with Kapil Awasthi
Picus Security
Why Continuous Validation is Key to Modern Security Operations | Picus Security with Kapil Awasthi
20:46
2024’te Kimlik Hırsızlığı Neden 3 Kat Arttı? Red Report 2025 Açıklıyor
Picus Security
2024’te Kimlik Hırsızlığı Neden 3 Kat Arttı? Red Report 2025 Açıklıyor
1:01:12
Infostealer Attacks Explained: Detect, Validate, and Stop Credential Theft Before It Spreads
Picus Security
Infostealer Attacks Explained: Detect, Validate, and Stop Credential Theft Before It Spreads
57:09
Which Security Testing Approach is Right for You: BAS, Automated Penetration Testing, or Both?
Picus Security
Which Security Testing Approach is Right for You: BAS, Automated Penetration Testing, or Both?
1:07:46
93% of cyberattacks use these 10 ATT&CK techniques – we put them to the test.
Picus Security
93% of cyberattacks use these 10 ATT&CK techniques – we put them to the test.
12:09
[Webinar On-demand] Protect Your Business from Infostealers – Ridge IT & Picus Security
Picus Security
[Webinar On-demand] Protect Your Business from Infostealers – Ridge IT & Picus Security
56:45
The Top 10 MITRE ATT&CK Techniques Behind 93% of Cyberattacks | Red Report 2025 Webinar
Picus Security
The Top 10 MITRE ATT&CK Techniques Behind 93% of Cyberattacks | Red Report 2025 Webinar
41:56
Path to Impact: How to validate high-risk threats in your network
Picus Security
Path to Impact: How to validate high-risk threats in your network
1:57
Detect and Stop Credential Exploits Before They Escalate
Picus Security
Detect and Stop Credential Exploits Before They Escalate
8:24
Rethinking Automated Penetration Testing: Be Stealthy and Risk-Free
Picus Security
Rethinking Automated Penetration Testing: Be Stealthy and Risk-Free
59:47
Breach and Attack Simulation (BAS) in India: Adoption & Trends
Picus Security
Breach and Attack Simulation (BAS) in India: Adoption & Trends
5:48
Palo Alto PAN-OS Vulnerabilities Explained: CVE-2024-0012 & CVE-2024-9474
Picus Security
Palo Alto PAN-OS Vulnerabilities Explained: CVE-2024-0012 & CVE-2024-9474
2:31
Transforming Cyber Maturity in Indonesia: Zane Lim at IndoSec
Picus Security
Transforming Cyber Maturity in Indonesia: Zane Lim at IndoSec
3:28
Be Digital Operational Resilience (DORA) Ready: Expert Insights for Compliance
Picus Security
Be Digital Operational Resilience (DORA) Ready: Expert Insights for Compliance
51:05
Validate your Zero Trust program with Breach and Attack Simulation
Picus Security
Validate your Zero Trust program with Breach and Attack Simulation
1:00
Why "Assume Breach" is the future of cybersecurity
Picus Security
Why "Assume Breach" is the future of cybersecurity
1:13
Zero Trust Security model explained
Picus Security
Zero Trust Security model explained
1:16
Picus CISO Briefing: Defining the Future of Exposure Validation
Picus Security
Picus CISO Briefing: Defining the Future of Exposure Validation
0:49
Securing Active Directory: How Attackers Exploit Weaknesses to Compromise Domain
Picus Security
Securing Active Directory: How Attackers Exploit Weaknesses to Compromise Domain
8:28
Why We Need to Move Beyond Vulnerability Management
Picus Security
Why We Need to Move Beyond Vulnerability Management
1:27
Why Vulnerability Management is Still a Growing Challenge: Insights from Cecil Pineda
Picus Security
Why Vulnerability Management is Still a Growing Challenge: Insights from Cecil Pineda
1:09
Why Traditional Vulnerability Management is Outdated
Picus Security
Why Traditional Vulnerability Management is Outdated
1:07
CTEM & Asset Management: The Evolving Challenge of Discovery and Ownership
Picus Security
CTEM & Asset Management: The Evolving Challenge of Discovery and Ownership
1:35
Exposure Validation Explained: Focus on What Matters Most
Picus Security
Exposure Validation Explained: Focus on What Matters Most
0:52
Assessing Your Zero Trust Program with "Assume Breach" Mindset
Picus Security
Assessing Your Zero Trust Program with "Assume Breach" Mindset
1:00:04
Reduce Cyber Risk with Threat Exposure Management | CEO of Picus Security Explains
Picus Security
Reduce Cyber Risk with Threat Exposure Management | CEO of Picus Security Explains
15:22
Is Your AWS Cloud Secure? Learn Proven Tactics to Strengthen Your Defenses
Picus Security
Is Your AWS Cloud Secure? Learn Proven Tactics to Strengthen Your Defenses
58:28
You’ve Heard of CTEM, But What About Exposure Validation? Find Out Now!
Picus Security
You’ve Heard of CTEM, But What About Exposure Validation? Find Out Now!
40:33
It’s Picus: Behind the Scenes with the Picus Team
Picus Security
It’s Picus: Behind the Scenes with the Picus Team
0:19
Accent Challenge: Different Words, Same Picus!
Picus Security
Accent Challenge: Different Words, Same Picus!
1:10
You’ve Been Saying Picus Wrong! Here’s the Right Way
Picus Security
You’ve Been Saying Picus Wrong! Here’s the Right Way
0:45
Take control of your cyber exposures with CTEM | Join us for virtual briefing
Picus Security
Take control of your cyber exposures with CTEM | Join us for virtual briefing
1:03
Vulnerability Management Isn’t Enough:  What’s Next?
Picus Security
Vulnerability Management Isn’t Enough: What’s Next?
10:30
Exposure Validation Briefing - Mark Your Calendars 🚨
Picus Security
Exposure Validation Briefing - Mark Your Calendars 🚨
1:08
Crack the password safely before hackers do
Picus Security
Crack the password safely before hackers do
7:05
Validación Automática de Seguridad con Picus | Demo
Picus Security
Validación Automática de Seguridad con Picus | Demo
37:21
Continuous Threat Exposure Management: Navigating Cybersecurity Tradeoffs | Picus Security Webinar
Picus Security
Continuous Threat Exposure Management: Navigating Cybersecurity Tradeoffs | Picus Security Webinar
58:23
Cybersecurity in Financial Services: Strategies for Enhancing Operational Resilience
Picus Security
Cybersecurity in Financial Services: Strategies for Enhancing Operational Resilience
1:01:32
Top Ten ATT&CK Techniques: The Rise of ‘Hunter-Killer’ Malware - Picus Security Webinar
Picus Security
Top Ten ATT&CK Techniques: The Rise of ‘Hunter-Killer’ Malware - Picus Security Webinar
57:12
Understanding Lateral Movement Attacks and Proactive Defense Strategies
Picus Security
Understanding Lateral Movement Attacks and Proactive Defense Strategies
1:06:30
Picus | Revolutionize automated pentest with a few clicks
Picus Security
Picus | Revolutionize automated pentest with a few clicks
5:21
Discover Actionable Threat Intelligence: CTI-Led Security Validation Tutorial
Picus Security
Discover Actionable Threat Intelligence: CTI-Led Security Validation Tutorial
3:06
Black Basta Ransomware Explained - CISA Alert AA24-131A
Picus Security
Black Basta Ransomware Explained - CISA Alert AA24-131A
2:03
How Modern Malware Evades Your SIEM and EDR Controls | Picus & SANS Webinar
Picus Security
How Modern Malware Evades Your SIEM and EDR Controls | Picus & SANS Webinar
1:06:36
Security Validation at RSA 2024 | Interview with Volkan Ertürk -  Co-founder of Picus Security
Picus Security
Security Validation at RSA 2024 | Interview with Volkan Ertürk - Co-founder of Picus Security
16:24
[On-Demand] Maximizing Cybersecurity with GenAI
Picus Security
[On-Demand] Maximizing Cybersecurity with GenAI
58:46
PAN-OS Command Injection Vulnerability Explained - CVE-2024-3400
Picus Security
PAN-OS Command Injection Vulnerability Explained - CVE-2024-3400
1:59
XZ Utils Backdoor Explained - CVE-2024-3094
Picus Security
XZ Utils Backdoor Explained - CVE-2024-3094
2:02
Validating Your Security Against Hunter-Killer Malware | A Picus Platform Demo
Picus Security
Validating Your Security Against Hunter-Killer Malware | A Picus Platform Demo
20:46
Picus Security and CrowdStrike Integration Demo - Creating Indicators of Attack
Picus Security
Picus Security and CrowdStrike Integration Demo - Creating Indicators of Attack
1:35
Picus Attack Surface Validation Demo: Navigating Cyber Risk with Enhanced Attack Surface Validation
Picus Security
Picus Attack Surface Validation Demo: Navigating Cyber Risk with Enhanced Attack Surface Validation
1:34
Reduce Your Cyber Risk: The Power of Automated Security Validation with Picus
Picus Security
Reduce Your Cyber Risk: The Power of Automated Security Validation with Picus
7:24
Optimizing SIEM & SOC Productivity: A Proactive Approach with Picus Security
Picus Security
Optimizing SIEM & SOC Productivity: A Proactive Approach with Picus Security
11:03
How MSSPs Leverage Picus for Optimal Defense
Picus Security
How MSSPs Leverage Picus for Optimal Defense
8:10
Looney Tunables Linux Privesc CVE-2023-4911 Attack Simulation & Mitigation with Picus
Picus Security
Looney Tunables Linux Privesc CVE-2023-4911 Attack Simulation & Mitigation with Picus
1:52
Rhysida Ransomware Attack Simulation & Mitigation with Picus
Picus Security
Rhysida Ransomware Attack Simulation & Mitigation with Picus
1:54
Black Hat USA 2023: Sektör Liderleriyle İçgörüler ve Deneyimler
Picus Security
Black Hat USA 2023: Sektör Liderleriyle İçgörüler ve Deneyimler
12:05
Picus Security at Black Hat USA 2023: Top Gun Mission Recap!
Picus Security
Picus Security at Black Hat USA 2023: Top Gun Mission Recap!
0:54
Proactive Threat Simulations | Interview with Picus Security APAC Regional Sales Director
Picus Security
Proactive Threat Simulations | Interview with Picus Security APAC Regional Sales Director
4:55
Level Up Your Cybersecurity Defense with Picus Security | Black Hat 2023
Picus Security
Level Up Your Cybersecurity Defense with Picus Security | Black Hat 2023
1:24
Join Picus Security at Black Hat USA 2023 - Engage, Learn, Win!
Picus Security
Join Picus Security at Black Hat USA 2023 - Engage, Learn, Win!
1:25
Favorite Features of Picus: Customer Insights at the Cyber Risk Summit Istanbul
Picus Security
Favorite Features of Picus: Customer Insights at the Cyber Risk Summit Istanbul
3:14
Transforming Operations with Picus: Insights from Our Customers at the Cyber Risk Summit Istanbul
Picus Security
Transforming Operations with Picus: Insights from Our Customers at the Cyber Risk Summit Istanbul
2:37
Choosing Picus - Insights from Aygaz, Dogus Technology, and Isbank at the Cyber Risk Summit Istanbul
Picus Security
Choosing Picus - Insights from Aygaz, Dogus Technology, and Isbank at the Cyber Risk Summit Istanbul
1:39
Unleashing Security Control Validation: Identifying the "Unknown Unknowns"
Picus Security
Unleashing Security Control Validation: Identifying the "Unknown Unknowns"
18:26
Simulating Top 10 Attacks: A Demonstration using The Picus Complete Security Validation Platform
Picus Security
Simulating Top 10 Attacks: A Demonstration using The Picus Complete Security Validation Platform
4:36
Cyber Risk Summit Istanbul 2023 Highlights: Uniting Leaders in Cybersecurity
Picus Security
Cyber Risk Summit Istanbul 2023 Highlights: Uniting Leaders in Cybersecurity
0:45
Picus Security - Cyprus 2022 Get Away
Picus Security
Picus Security - Cyprus 2022 Get Away
1:01
Picus Security CTID Adoption Spotlight - Top MITRE ATT&CK Techniques
Picus Security
Picus Security CTID Adoption Spotlight - Top MITRE ATT&CK Techniques
5:14
How Picus Works?
Picus Security
How Picus Works?
3:55
Validate your Security Controls with The Picus Complete Security Control Validation Platform
Picus Security
Validate your Security Controls with The Picus Complete Security Control Validation Platform
1:30
What is Log4Shell Vulnerability? Check 4-Step Immediate Mitigation for Log4j Attacks
Picus Security
What is Log4Shell Vulnerability? Check 4-Step Immediate Mitigation for Log4j Attacks
5:23
Operationalizing the MITRE ATT&CK Framework for Security Operations Centers (SOCs) Course
Picus Security
Operationalizing the MITRE ATT&CK Framework for Security Operations Centers (SOCs) Course
5:16
Rethinking Validation Strategies Achieving Security Optimization & Effectiveness in the New Normal
Picus Security
Rethinking Validation Strategies Achieving Security Optimization & Effectiveness in the New Normal
4:51