CSIS

The Hub

Welcome to the Hub!
Access our multimedia content here.

Upcoming events

CONFERENCE: Copenhagen Cybercrime Conference

CONFERENCE: Copenhagen Cybercrime Conference

September 12-13, 2023, Full day

Recorded Webinars

April 19, 2023

Threat Matrix Report H2 2022

January 23, 2023

Cybercrime Predictions for 2023

November 24, 2022

Exclusive Preview of the Threat Matrix H1 2022

April 20, 2022

Cybersecurity Brief Ukraine Crisis and the Latest Threat Matrix Report

February 1, 2022

Cyber Defence Feed

January 19, 2022

Cyber threat predictions for 2022

April 20, 2021

Exclusive Preview of the Threat Matrix H2 2020

April 14, 2021

The Bagsu banker case - journey into a carding operation

Cyber threat predictions for 2021: What to expect from the coming year?

How to build an excellent SIEM with CSIS Managed Detection & Response

Exclusive Preview of the Threat Matrix H1 2020

How compromised O365 accounts lead to financial loss

Insecure About Web Security

COVID-19 Threat Landscape Update

Inside the Threat Matrix Latest Malware Trends Real-World Scenarios

COVID-19 Update On The Threat Landscape

The Magecart Phenomenon

Business Email Compromise: Understand it, Detect it, Prevent it

View more

Copenhagen Cybercrime Conference 2022

October 26, 2022

Ransomware Attacks: The Power of Uniting Technical & Negotiation Efforts

Case studies

Case study MDR

Case study MDR

CSIS prevents a high-severity incident from becoming a complete crisis scenario.

Case study Chronos

Case study Chronos

Leveraging its proprietary Chronos platform, CSIS delivers best-in-class Incident Response services and minimizes damage caused by a major ransomware attack.

Case study CIRK

Case study CIRK

CSIS's remote forensics tool helps a lading UK bank prevent fraud.

Case study MDR

Case study MDR

A leading Danish digitization company leverages CSIS's MDR Services to maintain a best-in-class security posture.

Incident cases

Exploitation of CVE-2023-23397 Incident

Exploitation of CVE-2023-23397 Incident

Microsoft Outlook Elevation of Privilege Vulnerability against customer: detection, analysis, escalation and resolution.

MDR Vidar Incident Case

MDR Vidar Incident Case

Info-stealer attack against a leading expert in Microsoft Dynamics 365, Cloud & Data technologies.

MDR Incident case

MDR Incident case

CSIS detected and fully resolved the phishing attack incident in less than an hour.

Threat Matrix Report

Threat Matrix Report H2 2022

Threat Matrix Report H2 2022

Threat Matrix Report H1 2022

Threat Matrix Report H1 2022

Threat Matrix Report H2 2021

Threat Matrix Report H2 2021

Threat Matrix Report H1 2021

Threat Matrix Report H1 2021

Products and services videos

Leveraging Threat Intelligence and Machine Learning in Cyber

Compromise Assessment

Compromise Assessment

How can you be sure your network hasn’t been breached by hackers? Find out why you need to undertake periodic compromise assessments.

Newsletter

Cyber Bytes, March 2023

Cyber Bytes, March 2023

Cyber Bytes, February 2023

Cyber Bytes, February 2023

Cyber Bytes, January 2023

Cyber Bytes, January 2023

Cyber Bytes, December 2022

Cyber Bytes, December 2022

Cyber Bytes, November 2022

Cyber Bytes, November 2022

Cyber Bytes, October 2022

Cyber Bytes, October 2022

Cyber Bytes, September 2022

Cyber Bytes, September 2022

Cyber Bytes, August 2022

Cyber Bytes, August 2022

Cyber Bytes, July 2022

Cyber Bytes, July 2022

Cyber Bytes, June 2022

Cyber Bytes, June 2022

Cyber Bytes, May 2022

Cyber Bytes, May 2022

Cyber Bytes, April 2022

Cyber Bytes, April 2022

Cyber Bytes, March 2022

Cyber Bytes, March 2022

Cyber Bytes, February 2022

Cyber Bytes, February 2022

Cyber Bytes, January 2022

Cyber Bytes, January 2022

Cyber Bytes, December 2021

Cyber Bytes, December 2021

Cyber Bytes, November 2021

Cyber Bytes, November 2021

Cyber Bytes, October 2021

Cyber Bytes, October 2021

Cyber Bytes, September 2021

Cyber Bytes, September 2021

Cyber Bytes, August 2021

Cyber Bytes, August 2021

Cyber Bytes, July 2021

Cyber Bytes, July 2021

Cyber Bytes, June 2021

Cyber Bytes, June 2021

Cyber Bytes, May 2021

Cyber Bytes, May 2021

Cyber Bytes, April 2021

Cyber Bytes, April 2021

Cyber Bytes, March 2021

Cyber Bytes, March 2021

Cyber Bytes, February 2021

Cyber Bytes, February 2021

Cyber Bytes, January 2021

Cyber Bytes, January 2021

Cyber Bytes, December 2020

Cyber Bytes, December 2020

Cyber Bytes, November 2020

Cyber Bytes, November 2020

Cyber Bytes, October 2020

Cyber Bytes, October 2020

Cyber Bytes, September 2020

Cyber Bytes, September 2020

Cyber Bytes, August 2020

Cyber Bytes, August 2020

Cyber Bytes, July 2020

Cyber Bytes, July 2020

Cyber Bytes, June 2020

Cyber Bytes, June 2020

View more

Release Notes

Release Notes, June 2023

Release Notes, June 2023

Release Notes, May 2023

Release Notes, May 2023

Release Notes, April 2023

Release Notes, April 2023

Release Notes, March 2023

Release Notes, March 2023

Release Notes, February 2023

Release Notes, February 2023

Release Notes, January 2023

Release Notes, January 2023

View more

CSIS Tech Blog

CSIS RESEARCH - Weakness in Microsoft Defender for Endpoint identified

CSIS RESEARCH - Weakness in Microsoft Defender for Endpoint identified

Newsletter

Sign up

Stay informed.
Get our Cyber Bytes!