On Demand Webinars & Podcasts

Trends and Topics on Vulnerability Management & Penetration Testing

These webinars/podcasts can help you leverage the features and functionality of Unified VRM and give you insight into penetration testing. Webinars are available on-demand after the live broadcast.


Webinar/Podcast NamePresented byDate of Recording
Best Practices on Risk-Based Vulnerability ManagementSteve Finegan05/20/2021
Cybersecurity for Technology and Financial ServicesLisa Xu & Betty Moon1/31/2021
Webinar: The State of Vulnerability Risk Management ReportMichelangelo Sidagni12/10/2020
Unified VRM is in the CrowdStrike StoreNopSec & CrowdStrike Team11/12/2020
Webinar: Managed RBVMDr. Torsten George10/01/2020
Webinar Series: Global Cybersecurity Programs in Portfolio ManagementMarvin Larry07/30/2020
Webinar: Unified VRM Program Intelligence ModuleParag Baxi07/09/2020
Webinar: Analysis of Verizon 2020 DBIR Report – Vulnerability Management ImplicationsMichelangelo Sidagni06/25/2020
Webinar Series: Vulnerability Management in Investment ManagementBala Rajagopalan06/18/2020
Webinar Series: Vulnerability Management in DefenseLuis Arzu 06/11/2020
Webinar Series: Vulnerability Management in Financial ServicesTunde Oni-Daniel06/04/2020
Joint Webinar – Best Practices: Managed Vulnerability ManagementNopSec & Align Team
Alex Bazay
Webinar Series: Vulnerability Management in HealthcareRussell Burrows05/21/2020
Board Engagement in Cyber Risk ManagementLisa Xu04/29/2020
Novel Application Vulnerabilities That You Should Fix Immediately!Michelangelo Sidagni04/16/2020
How To Easily Manage Your Vulnerabilities with Unified VRMJordan Farkas03/31/2020
SMB Tools with Shawn EvansShawn Evans03/05/2020
10 vulnerabilities that you should fix in your network immediately!Michelangelo Sidagni03/03/2020
A CrowdStrike Store ‘How To’: Vulnerability Risk ManagementNopSec & CrowdStrike Team01/29/2020
Custom Reports in Vulnerability ManagementNiki Nichols01/16/2020
Importance of Network Contextual Info & Mitigating Controls In Prioritizing VulnerabilitiesMichelangelo Sidagni12/05/2019
Offensive Security in Vulnerability ManagementMichelangelo Sidagni09/26/2019
Asset Prioritization RecommendationParag Baxi08/22/2019
Discovering the Value of Using Trending Metrics in Vulnerability ManagementNiki Nichols07/30/2019
How NopSec is One Pane of Glass for Vuln ManagementNiki Nichols06/13/2019
Password PlaygroundShawn Evans05/30/2019
NopSec Risk ScoreNiki Nichols05/23/2019
How to Dedupe Vulnerabilities More AccuratelyParag Baxi05/02/2019
How to Make Vuln Management Easy From UX Perspective?Niki Nichols04/18/2019
Machine Learning in CybersecuritySanja Nedic03/21/2019
Time is Money: Best Practices on Vulnerability Management MetricsParag Baxi03/14/2019
Time is Money: Automate CVE to KB Parag Baxi02/28/2019
Time is Money: Vulnerability Ownership Parag Baxi02/14/2019
Evolutionary Neural Network Encoder of Shenanigans (ENNEoS) Drew Kirkpartrick02/14/2019
2019 Vulnerability Management PredictionsMichelangelo Sidagni
Parag Baxi
Time is Money: Simplifying Vulnerability Analysis with Machine LearningAdrian Sanabria01/17/2019
Attack Surface DetectorDrew Kirkpartrick12/13/2018
What works in Penetration Testing, Same as it Ever Was?Shawn Evans12/06/2018
Pentest Tricks:
Out with Powershell, In with C#
Michelangelo Sidagni11/01/2018
Bash Tricks for PentestersShawn Evans10/18/2018