June 4, 2021
2021 Verizon DBIR Roundtable Discussion

Security professionals always look forward to Verizon’s analysis of the past year’s data breach activity. The 2021 Data Breach Investigations Report (DBIR) doesn’t disappoint. It details more than 79,635 security incidents from 88 countries, including over 5,258 confirmed breaches.

Watch our in-depth panel discussion as we break down this coveted report. Our experts will reveal key data breach findings, and threats faced by organizations in all industries.

During the panel, we discussed:

  • Key Takeaways
  • Ransomware
  • Web App Attacks
  • Credential Abuse
  • Social Engineering
  • Actionable Recommendations

Available On-Demand

Speakers

Chris Burrows | CISO – Rock Central
Shaun Bertrand | SVP, Security Programs – CBI
Reid Brosko | Red Team Manager – CBI

About the Authors
Shaun Bertrand
Shaun Bertrand
Chief Services Officer
Shaun Bertrand is the Chief Services Officer at Converge. Shaun brings over 20 years of experience in the information security field with a core focus on providing penetration testing and vulnerability assessment services to enterprise organizations. Shaun has been CISSP certified since 2004 and is proficient in several technical services including AV obfuscation, social engineering, exploit development, critical systems protection, endpoint security, event management, incident response, intrusion detection, ICS/SCADA, and malware prevention. Shaun has taught security classes at the University of Michigan and Eastern Michigan University and is a frequent speaker at security conferences and local hacking groups.
Reid Brosko
Reid Brosko
Associate Director, Cybersecurity Professional Resources
Reid Brosko serves as Converge's associate director of cybersecurity professional resources. Reid’s core responsibilities include penetration testing, vulnerability assessments, and social engineering assessments for organizations ranging from enterprise to state level. Reid has proven expertise with phishing, lock picking, “trade craft” techniques, and other physical penetration testing skills. He has performed numerous social engineering engagements, which have resulted in successful breaches on physical and digital layers, including many engagements at Fortune 100 organizations.
I Need To...