CINXE.COM
Resource Library | Trustwave
<!doctype html><html lang="en-us"><head> <meta charset="utf-8"> <title>Resource Library | Trustwave</title> <link rel="shortcut icon" href="https://www.trustwave.com/hubfs/Trustwave_Icon_Color-2.svg"> <meta name="description" content=""> <style> @font-face { font-family: "Inter"; font-weight: 100; font-style: normal; font-display: swap; src: url("/_hcms/googlefonts/Inter/100.woff2") format("woff2"), url("/_hcms/googlefonts/Inter/100.woff") format("woff"); } @font-face { font-family: "Inter"; font-weight: 300; font-style: normal; font-display: swap; src: url("/_hcms/googlefonts/Inter/300.woff2") format("woff2"), url("/_hcms/googlefonts/Inter/300.woff") format("woff"); } body { font-family: 'Inter', Arial, sans-serif; font-weight: 300; line-height: 150%; letter-spacing: 0; } </style> <!-- Page CSS Starts Required v2 --> <!-- Standard Header Includes --> <meta name="viewport" content="width=device-width, initial-scale=1"> <meta property="og:description" content=""> <meta property="og:title" content="Resource Library | Trustwave"> <meta name="twitter:description" content=""> <meta name="twitter:title" content="Resource Library | Trustwave"> <link rel="stylesheet" href="https://www.trustwave.com/hs-fs/hubfs/hub_generated/template_assets/1/81597466170/1738839906186/template_main.min.css" position="head"> <link rel="stylesheet" href="https://www.trustwave.com/hs-fs/hubfs/hub_generated/template_assets/1/82152213034/1738964647022/template_child.min.css" position="head"> <style> a.cta_button{-moz-box-sizing:content-box !important;-webkit-box-sizing:content-box !important;box-sizing:content-box !important;vertical-align:middle}.hs-breadcrumb-menu{list-style-type:none;margin:0px 0px 0px 0px;padding:0px 0px 0px 0px}.hs-breadcrumb-menu-item{float:left;padding:10px 0px 10px 10px}.hs-breadcrumb-menu-divider:before{content:'›';padding-left:10px}.hs-featured-image-link{border:0}.hs-featured-image{float:right;margin:0 0 20px 20px;max-width:50%}@media (max-width: 568px){.hs-featured-image{float:none;margin:0;width:100%;max-width:100%}}.hs-screen-reader-text{clip:rect(1px, 1px, 1px, 1px);height:1px;overflow:hidden;position:absolute !important;width:1px} </style> <link class="hs-async-css" rel="preload" href="https://www.trustwave.com/hs-fs/hubfs/hub_generated/module_assets/1/128102279083/1738779860605/module_Global-Header.min.css" as="style" onload="this.onload=null;this.rel='stylesheet'"> <noscript><link rel="stylesheet" href="https://www.trustwave.com/hs-fs/hubfs/hub_generated/module_assets/1/128102279083/1738779860605/module_Global-Header.min.css"></noscript> <style> .header-section, .incidence-section, .login-section, .search-bg, .search-data, .megamenuRepeat { visibility: hidden } </style> <link rel="stylesheet" href="https://www.trustwave.com/hubfs/hub_generated/module_assets/1/182409662493/1735317532635/module_resource-library-js.min.css"> <link class="hs-async-css" rel="preload" href="https://www.trustwave.com/hs-fs/hubfs/hub_generated/module_assets/1/128101228672/1736859569667/module_Global-Footer.min.css" as="style" onload="this.onload=null;this.rel='stylesheet'"> <noscript><link rel="stylesheet" href="https://www.trustwave.com/hs-fs/hubfs/hub_generated/module_assets/1/128101228672/1736859569667/module_Global-Footer.min.css"></noscript> <style> @font-face { font-family: "Inter"; font-weight: 200; font-style: normal; font-display: swap; src: url("/_hcms/googlefonts/Inter/200.woff2") format("woff2"), url("/_hcms/googlefonts/Inter/200.woff") format("woff"); } @font-face { font-family: "Inter"; font-weight: 500; font-style: normal; font-display: swap; src: url("/_hcms/googlefonts/Inter/500.woff2") format("woff2"), url("/_hcms/googlefonts/Inter/500.woff") format("woff"); } @font-face { font-family: "Inter"; font-weight: 400; font-style: normal; font-display: swap; src: url("/_hcms/googlefonts/Inter/regular.woff2") format("woff2"), url("/_hcms/googlefonts/Inter/regular.woff") format("woff"); } @font-face { font-family: "Inter"; font-weight: 700; font-style: normal; font-display: swap; src: url("/_hcms/googlefonts/Inter/700.woff2") format("woff2"), url("/_hcms/googlefonts/Inter/700.woff") format("woff"); } </style> <!-- Editor Styles --> <style id="hs_editor_style" type="text/css"> .dnd_area-row-0-max-width-section-centering > .row-fluid { max-width: 800px !important; margin-left: auto !important; margin-right: auto !important; } /* HubSpot Non-stacked Media Query Styles */ @media (min-width:768px) { .cell_17110500074786-row-0-vertical-alignment > .row-fluid { display: -ms-flexbox !important; -ms-flex-direction: row; display: flex !important; flex-direction: row; } .module_171105000747812-vertical-alignment { display: -ms-flexbox !important; -ms-flex-direction: column !important; -ms-flex-pack: center !important; display: flex !important; flex-direction: column !important; justify-content: center !important; } .module_171105000747812-vertical-alignment > div { flex-shrink: 0 !important; } } /* HubSpot Styles (default) */ .dnd_area-row-0-padding { padding-top: 160px !important; } .dnd_area-row-0-background-layers { background-image: url('https://www.trustwave.com/hubfs/trustwave.azureedge.net-59433960294482760.jpg') !important; background-position: center center !important; background-size: cover !important; background-repeat: no-repeat !important; } .dnd_area-row-1-background-layers { background-image: linear-gradient(rgba(250, 250, 250, 1), rgba(250, 250, 250, 1)) !important; background-position: left top !important; background-size: auto !important; background-repeat: no-repeat !important; } /* HubSpot Styles (mobile) */ @media (max-width:767px) { .dnd_area-row-0-padding { padding-top: 98px !important; padding-bottom: 48px !important; } } </style> <script> // Global Variables: var hubDB = [{"hs_child_table_id":0,"hs_created_at":1739284318995,"hs_created_by_user_id":63911226,"hs_deleted_at":0,"hs_id":186026210737,"hs_initial_published_at":1739284844608,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1739284775765,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/Essential-Eight-Control-Effectiveness-Assessment-cover.jpg","altText":"Essential-Eight-Control-Effectiveness-Assessment-cover","fileId":186026916464,"height":544,"type":"image","width":420},"industry":{"createdAt":1730396680025,"createdByUserId":60505637,"id":3,"isHubspotDefined":false,"label":"Government","labelTranslations":{},"name":"government","order":2,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1731443056321,"createdByUserId":60505637,"id":15,"isHubspotDefined":false,"label":"Compliance","labelTranslations":{},"name":"compliance","order":1,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Essential Eight Control Effectiveness Assessment","url":"https://www.trustwave.com/en-us/resources/library/documents/essential-eight-control-effectiveness-assessment/"},{"hs_child_table_id":0,"hs_created_at":1739283875476,"hs_created_by_user_id":63911226,"hs_deleted_at":0,"hs_id":186026210577,"hs_initial_published_at":1739284844608,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1739284760012,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/IRAP_cover.png","altText":"IRAP_cover","fileId":186024534172,"height":896,"type":"image","width":697},"industry":{"createdAt":1730396680025,"createdByUserId":60505637,"id":3,"isHubspotDefined":false,"label":"Government","labelTranslations":{},"name":"government","order":2,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1731443056321,"createdByUserId":60505637,"id":15,"isHubspotDefined":false,"label":"Compliance","labelTranslations":{},"name":"compliance","order":1,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"IRAP Assessments in a Changing Threat Landscape","url":"https://www.trustwave.com/en-us/resources/library/documents/irap-assessments-in-a-changing-threat-landscape/"},{"hs_child_table_id":0,"hs_created_at":1739279452729,"hs_created_by_user_id":63911226,"hs_deleted_at":0,"hs_id":186023575624,"hs_initial_published_at":1739279680602,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1739279498823,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/Energy-Ransomware-Threat-Groups-Social-Meta-Hero.jpg","altText":"Energy-Ransomware-Threat-Groups-Social-Meta-Hero","fileId":186023032943,"height":630,"type":"image","width":1200},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Energy","labelTranslations":{},"name":"energy","order":7,"type":"option","updatedAt":1734701670779,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"The Ransomware Playbook: Tactics of Top Threat Groups in Energy & Utilities","url":"https://www.trustwave.com/en-us/resources/library/webinars/the-ransomware-playbook-tactics-of-top-threat-groups-in-energy-and-utilities/"},{"hs_child_table_id":0,"hs_created_at":1738863586705,"hs_created_by_user_id":76261326,"hs_deleted_at":0,"hs_id":185849213339,"hs_initial_published_at":1738863685600,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1738863678857,"hs_updated_by_user_id":76261326,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/Ransomware-Trends-Energy25.webp","altText":"Ransomware-Trends-Energy25","fileId":185849170951,"height":450,"type":"image","width":945},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Energy","labelTranslations":{},"name":"energy","order":7,"type":"option","updatedAt":1734701670779,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Ransomware Surge: What’s Behind the Growing Threat to Energy & Utilities","url":"https://www.trustwave.com/en-us/resources/library/webinars/ransomware-surge-whats-behind-the-growing-threat-to-energy-and-utilities/"},{"hs_child_table_id":0,"hs_created_at":1738758499424,"hs_created_by_user_id":63911226,"hs_deleted_at":0,"hs_id":185790891888,"hs_initial_published_at":1738758672632,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1738863651971,"hs_updated_by_user_id":76261326,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/Energy-Overaching-Webinar-Social-Meta-Web-1.jpg","altText":"Energy-Overaching-Webinar-Social-Meta-Web-1","fileId":185767005480,"height":630,"type":"image","width":1200},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Energy","labelTranslations":{},"name":"energy","order":7,"type":"option","updatedAt":1734701670779,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Protecting Critical Infrastructure: The 2025 Trustwave Risk Radar for Energy & Utilities","url":"https://www.trustwave.com/en-us/resources/library/webinars/protecting-critical-infrastructure-the-2025-trustwave-risk-radar-for-energy-and-utilities/"},{"hs_child_table_id":0,"hs_created_at":1738586737630,"hs_created_by_user_id":63911226,"hs_deleted_at":0,"hs_id":185710615163,"hs_initial_published_at":1738586794617,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1738587134079,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/Automotive_Case_Study_cover.png","altText":"Automotive_Case_Study_cover","fileId":185573957216,"height":544,"type":"image","width":420},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":7,"isHubspotDefined":false,"label":"Manufacturing","labelTranslations":{},"name":"manufacturing","order":6,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":11,"isHubspotDefined":false,"label":"SIEM/SOC","labelTranslations":{},"name":"siem_soc","order":11,"type":"option","updatedAt":1731443103341,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":18,"isHubspotDefined":false,"label":"Microsoft","labelTranslations":{},"name":"microsoft","order":8,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Automotive Firm Transforms Its Security with Trustwave MDR and SIEM","url":"https://www.trustwave.com/en-us/resources/library/documents/automotive-firm-transforms-its-security-with-trustwave-mdr-and-siem/"},{"hs_child_table_id":0,"hs_created_at":1738586684488,"hs_created_by_user_id":63911226,"hs_deleted_at":0,"hs_id":185710615161,"hs_initial_published_at":1738586794617,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1738587318719,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/SOC-Gov-Agency-Case-Study-cover.png","altText":"SOC-Gov-Agency-Case-Study-cover","fileId":185575271999,"height":544,"type":"image","width":420},"industry":{"createdAt":1730396680025,"createdByUserId":60505637,"id":3,"isHubspotDefined":false,"label":"Government","labelTranslations":{},"name":"government","order":2,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":11,"isHubspotDefined":false,"label":"SIEM/SOC","labelTranslations":{},"name":"siem_soc","order":11,"type":"option","updatedAt":1731443103341,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave Transforms SOC Operations for a Major Government Client","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-transforms-soc-operations-for-a-major-government-client/"},{"hs_child_table_id":0,"hs_created_at":1738599516317,"hs_created_by_user_id":63911226,"hs_deleted_at":0,"hs_id":185714886277,"hs_initial_published_at":1738599596996,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1738599573841,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/UK_Financial_Firm_Case_Study_cover.png","altText":"UK_Financial_Firm_Case_Study_cover","fileId":185577518762,"height":544,"type":"image","width":420},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":4,"isHubspotDefined":false,"label":"Financial Services","labelTranslations":{},"name":"financial_services","order":1,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":11,"isHubspotDefined":false,"label":"SIEM/SOC","labelTranslations":{},"name":"siem_soc","order":11,"type":"option","updatedAt":1731443103341,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Leading UK Financial Firm Strengthens Cybersecurity with Trustwave Co-Managed SOC and Penetration Testing","url":"https://www.trustwave.com/en-us/resources/library/documents/leading-uk-financial-firm-strengthens-cybersecurity-with-trustwave-co-managed-soc-and-penetration-testing/"},{"hs_child_table_id":0,"hs_created_at":1737554065949,"hs_created_by_user_id":63911226,"hs_deleted_at":0,"hs_id":185235773793,"hs_initial_published_at":1737554402105,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1737554185579,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/Risk%20Radar%20Energy-2025-Combined-Cover.jpg","altText":"Risk Radar Energy-2025-Combined-Cover","fileId":184937113441,"height":544,"type":"image","width":420},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Energy","labelTranslations":{},"name":"energy","order":7,"type":"option","updatedAt":1734701670779,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Research Report","labelTranslations":{},"name":"research report","order":7,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave SpiderLabs Research: Cybersecurity Challenges for Energy and Utilities in 2025","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-spiderlabs-research-cybersecurity-challenges-for-energy-and-utilities-in-2025/"},{"hs_child_table_id":0,"hs_created_at":1736257728801,"hs_created_by_user_id":63911226,"hs_deleted_at":0,"hs_id":184616941372,"hs_initial_published_at":1736258396485,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1736257822991,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/Gartner_4_ways_Generative_AI_cover.png","altText":"Gartner_4_ways_Generative_AI_cover","fileId":184506650204,"height":1082,"type":"image","width":900},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":2,"isHubspotDefined":false,"label":"Analyst Report","labelTranslations":{},"name":"analyst report","order":0,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1731443056321,"createdByUserId":60505637,"id":19,"isHubspotDefined":false,"label":"Artificial Intelligence","labelTranslations":{},"name":"artificial_intelligence","order":0,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Gartner® Report: 4 Ways Generative AI Will Impact CISOs and Their Teams","url":"https://www.trustwave.com/en-us/resources/library/documents/gartner-report-4-ways-generative-ai-will-impact-cisos-and-their-teams/"},{"hs_child_table_id":0,"hs_created_at":1734721304242,"hs_deleted_at":0,"hs_id":184128305995,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1735230696663,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/IDC%20Merger-cover.jpg","altText":"","fileId":183819883188,"height":544,"type":"image","width":420},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":2,"isHubspotDefined":false,"label":"Analyst Report","labelTranslations":{},"name":"analyst report","order":0,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"DFIR","labelTranslations":{},"name":"dfir","order":4,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"IDC's Breakdown of the Trustwave-Cybereason Merger","url":"https://www.trustwave.com/en-us/resources/library/documents/idcs-breakdown-of-the-trustwave-cybereason-merger/ "},{"hs_child_table_id":0,"hs_created_at":1734721304241,"hs_deleted_at":0,"hs_id":184128305994,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304241,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/Energy_Company_Cover.jpg","altText":"","fileId":183778892295,"height":783,"type":"image","width":606},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Energy","labelTranslations":{},"name":"energy","order":7,"type":"option","updatedAt":1734701670779,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":11,"isHubspotDefined":false,"label":"SIEM/SOC","labelTranslations":{},"name":"siem_soc","order":11,"type":"option","updatedAt":1731443103341,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"DFIR","labelTranslations":{},"name":"dfir","order":4,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":18,"isHubspotDefined":false,"label":"Microsoft","labelTranslations":{},"name":"microsoft","order":8,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"How Trustwave Helped a Leading Energy Company Remain Secure 24/7 With Microsoft E5 Solutions","url":"https://www.trustwave.com/en-us/resources/library/documents/how-trustwave-helped-a-leading-energy-company-remain-secure-24-7-with-microsoft-e5-solutions/"},{"hs_child_table_id":0,"hs_created_at":1734721304240,"hs_deleted_at":0,"hs_id":184128305993,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304240,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/Major_Financial_Institution_Cover.jpg","altText":"","fileId":183776353721,"height":780,"type":"image","width":606},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":4,"isHubspotDefined":false,"label":"Financial Services","labelTranslations":{},"name":"financial_services","order":1,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":18,"isHubspotDefined":false,"label":"Microsoft","labelTranslations":{},"name":"microsoft","order":8,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Major Financial Institution Chooses Trustwave for Microsoft-First Security Approach","url":"https://www.trustwave.com/en-us/resources/library/documents/major-financial-institution-chooses-trustwave-for-microsoft-first-security-approach/"},{"hs_child_table_id":0,"hs_created_at":1734721304239,"hs_deleted_at":0,"hs_id":184128305992,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304239,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/Trustwave_Chosen_MSSP_Construction.jpg","altText":"","fileId":183775982406,"height":777,"type":"image","width":607},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":7,"isHubspotDefined":false,"label":"Manufacturing","labelTranslations":{},"name":"manufacturing","order":6,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":18,"isHubspotDefined":false,"label":"Microsoft","labelTranslations":{},"name":"microsoft","order":8,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Why Trustwave Was Chosen as the Managed Security Services Provider for a Global Construction Company","url":"https://www.trustwave.com/en-us/resources/library/documents/why-trustwave-was-chosen-as-the-managed-security-services-provider-for-a-global-construction-company/"},{"hs_child_table_id":0,"hs_created_at":1734721304238,"hs_deleted_at":0,"hs_id":184128305991,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304238,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/Logistics_firm.jpg","altText":"","fileId":183774512973,"height":883,"type":"image","width":764},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Professional Services","labelTranslations":{},"name":"professional_services","order":8,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Logistics Firm Modernizes Its Email Security with Trustwave MailMarshal","url":"https://www.trustwave.com/en-us/resources/library/documents/logistics-firm-modernizes-its-email-security-with-trustwave-mailmarshal/"},{"hs_child_table_id":0,"hs_created_at":1734721304237,"hs_deleted_at":0,"hs_id":184128305990,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304237,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/IDC_Marketscape_Cloud_Security.jpg","altText":"","fileId":183098692003,"height":854,"type":"image","width":709},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":2,"isHubspotDefined":false,"label":"Analyst Report","labelTranslations":{},"name":"analyst report","order":0,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":18,"isHubspotDefined":false,"label":"Microsoft","labelTranslations":{},"name":"microsoft","order":8,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":19,"isHubspotDefined":false,"label":"Artificial Intelligence","labelTranslations":{},"name":"artificial_intelligence","order":0,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"IDC MarketScape: Worldwide Cloud Security Services in the AI Era 2024-2025","url":"https://www.trustwave.com/en-us/resources/library/documents/idc-marketscape-worldwide-cloud-security-services-in-the-ai-era-2024-2025-vendor-assessment/"},{"hs_child_table_id":0,"hs_created_at":1734721304236,"hs_deleted_at":0,"hs_id":184128305989,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304236,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/GrowingThreat-Retail-2024-Webinar-Social-Meta-Web.jpg","altText":"","fileId":183030768416,"height":630,"type":"image","width":1200},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Retail","labelTranslations":{},"name":"retail","order":9,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Fraud Targeting Retailers: A Growing Threat","url":"https://www.trustwave.com/en-us/resources/library/webinars/fraud-targeting-retailers-a-growing-threat/"},{"hs_child_table_id":0,"hs_created_at":1734721304235,"hs_deleted_at":0,"hs_id":184128305988,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304235,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/DeepDive-Retail-2024-Social-Meta-Web.jpg","altText":"","fileId":182977678859,"height":630,"type":"image","width":1200},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Retail","labelTranslations":{},"name":"retail","order":9,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"Data Breach","labelTranslations":{},"name":"data_breach","order":2,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"A Deep Dive into Threats and Strategies for Protecting E-Commerce Data","url":"https://www.trustwave.com/en-us/resources/library/webinars/a-deep-dive-into-threats-and-strategies-for-protecting-e-commerce-data/"},{"hs_child_table_id":0,"hs_created_at":1734721304234,"hs_deleted_at":0,"hs_id":184128305987,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304234,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/RR-Retail-WebinarSocial-Meta-Web.jpg","altText":"","fileId":182978521888,"height":630,"type":"image","width":1200},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Retail","labelTranslations":{},"name":"retail","order":9,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Risk Radar: A 360-Degree View of Threats in Retail","url":"https://www.trustwave.com/en-us/resources/library/webinars/risk-radar-a-360-degree-view-of-threats-in-retail/"},{"hs_child_table_id":0,"hs_created_at":1734721304233,"hs_deleted_at":0,"hs_id":184128305986,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304233,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Imported%20images/IDC%20MarketScape%20Asia%20Pacific%20Professional%20Security%20Services%202024%20Vendor%20Assessment-Cover.jpg","altText":"","fileId":182928843643,"height":544,"type":"image","width":420},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":2,"isHubspotDefined":false,"label":"Analyst Report","labelTranslations":{},"name":"analyst report","order":0,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":19,"isHubspotDefined":false,"label":"Artificial Intelligence","labelTranslations":{},"name":"artificial_intelligence","order":0,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"IDC MarketScape: Asia/Pacific Professional Security Services 2024","url":"https://www.trustwave.com/en-us/resources/library/documents/idc-marketscape-asia-pacific-professional-security-services-2024-vendor-assessment/ "},{"hs_child_table_id":0,"hs_created_at":1734721304232,"hs_deleted_at":0,"hs_id":184128305985,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304232,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Imported%20images/IDC%20MarketScape%20Asia%20Pacific%20Managed%20Security%20Services%202024%20Vendor%20Assessment-Cover.jpg","altText":"","fileId":182928928914,"height":544,"type":"image","width":420},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":2,"isHubspotDefined":false,"label":"Analyst Report","labelTranslations":{},"name":"analyst report","order":0,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":19,"isHubspotDefined":false,"label":"Artificial Intelligence","labelTranslations":{},"name":"artificial_intelligence","order":0,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"IDC MarketScape: Asia/Pacific Managed Security Services 2024","url":"https://www.trustwave.com/en-us/resources/library/documents/idc-marketscape-asia-pacific-managed-security-services-2024-vendor-assessment/"},{"hs_child_table_id":0,"hs_created_at":1734721304231,"hs_deleted_at":0,"hs_id":184128305984,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304231,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/RetailSector-24TR-Combined-Cover.jpg","altText":"181885112121","height":544,"type":"image","width":420},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Retail","labelTranslations":{},"name":"retail","order":9,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Research Report","labelTranslations":{},"name":"research report","order":7,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave SpiderLabs Research: Defending the Retail Sector in 2024","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-spiderlabs-research-defending-the-retail-sector-in-2024/"},{"hs_child_table_id":0,"hs_created_at":1734721304230,"hs_deleted_at":0,"hs_id":184128305983,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304230,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/Temple%20Health%20CaseStudy-cover.png","altText":"","fileId":181461213476,"height":544,"type":"image","width":420},"industry":{"createdAt":1730396680025,"createdByUserId":60505637,"id":1,"isHubspotDefined":false,"label":"Healthcare","labelTranslations":{},"name":"healthcare","order":3,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":11,"isHubspotDefined":false,"label":"SIEM/SOC","labelTranslations":{},"name":"siem_soc","order":11,"type":"option","updatedAt":1731443103341,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":18,"isHubspotDefined":false,"label":"Microsoft","labelTranslations":{},"name":"microsoft","order":8,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Temple Health Partners with Trustwave for Robust Microsoft E5 Cybersecurity Transition","url":"https://www.trustwave.com/en-us/resources/library/documents/temple-health-partners-with-trustwave-for-robust-microsoft-e5-cybersecurity-transition/"},{"hs_child_table_id":0,"hs_created_at":1734721304229,"hs_deleted_at":0,"hs_id":184128305982,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304229,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/Channel-Funnel-Webinar-Social-Meta-Web.jpg","altText":"","fileId":180685159201,"height":630,"type":"image","width":1200},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Increase Your Funnel & Bookings with Trustwave Cyber Security Solutions","url":"https://www.trustwave.com/en-us/resources/library/webinars/increase-your-funnel-and-bookings-with-trustwave-cyber-security-solutions/"},{"hs_child_table_id":0,"hs_created_at":1734721304228,"hs_deleted_at":0,"hs_id":184128305981,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304228,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/RiskRadarWebinar-FInServ-2024-Social-Meta-Web.jpg","altText":"","fileId":179976500853,"height":630,"type":"image","width":1200},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":4,"isHubspotDefined":false,"label":"Financial Services","labelTranslations":{},"name":"financial_services","order":1,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Risk Radar: A 360-Degree View of Financial Sector Threats","url":"https://www.trustwave.com/en-us/resources/library/webinars/risk-radar-a-360-degree-view-of-financial-sector-threats/ "},{"hs_child_table_id":0,"hs_created_at":1734721304227,"hs_deleted_at":0,"hs_id":184128305980,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304227,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/PaaS-FInServ-2024-Social-Meta-Web.jpg","altText":"","fileId":179978137425,"height":630,"type":"image","width":1200},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":4,"isHubspotDefined":false,"label":"Financial Services","labelTranslations":{},"name":"financial_services","order":1,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Phishing-as-a-Service: Evolving Tactics and Countermeasures","url":"https://www.trustwave.com/en-us/resources/library/webinars/phishing-as-a-service-evolving-tactics-and-countermeasures/ "},{"hs_child_table_id":0,"hs_created_at":1734721304226,"hs_deleted_at":0,"hs_id":184128305979,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304226,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/InsiderThreat-FInServ-2024-Social-Meta-Web.jpg","altText":"","fileId":179982817148,"height":630,"type":"image","width":1200},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":4,"isHubspotDefined":false,"label":"Financial Services","labelTranslations":{},"name":"financial_services","order":1,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Insider Threats: Protecting Against the Enemy Within","url":"https://www.trustwave.com/en-us/resources/library/webinars/insider-threats-protecting-against-the-enemy-within/ "},{"hs_child_table_id":0,"hs_created_at":1734721304225,"hs_deleted_at":0,"hs_id":184128305978,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304225,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/VirtualFortKnox_CaseStudy-cover.jpg","altText":"","fileId":179416379416,"height":544,"type":"image","width":420},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":4,"isHubspotDefined":false,"label":"Financial Services","labelTranslations":{},"name":"financial_services","order":1,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Creating a Virtual Fort Knox","url":"https://www.trustwave.com/en-us/resources/library/documents/creating-a-virtual-fort-knox-case-study/"},{"hs_child_table_id":0,"hs_created_at":1734721304224,"hs_deleted_at":0,"hs_id":184128305977,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304224,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/RiskRadar-FInServ-2024-Cover.jpg","altText":"","fileId":177650033324,"height":544,"type":"image","width":420},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":4,"isHubspotDefined":false,"label":"Financial Services","labelTranslations":{},"name":"financial_services","order":1,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Research Report","labelTranslations":{},"name":"research report","order":7,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"2024 Trustwave Risk Radar Report: Financial Services Sector","url":"https://www.trustwave.com/en-us/resources/library/documents/2024-trustwave-risk-radar-report-financial-services-sector/ "},{"hs_child_table_id":0,"hs_created_at":1734721304223,"hs_deleted_at":0,"hs_id":184128305976,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304223,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/PaaS-FInServ-2024-Cover.jpg","altText":"","fileId":177680995445,"height":544,"type":"image","width":420},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":4,"isHubspotDefined":false,"label":"Financial Services","labelTranslations":{},"name":"financial_services","order":1,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Research Report","labelTranslations":{},"name":"research report","order":7,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Financial Services Deep Dive: Phishing-as-a-Service","url":"https://www.trustwave.com/en-us/resources/library/documents/financial-services-deep-dive-phishing-as-a-service/ "},{"hs_child_table_id":0,"hs_created_at":1734721304222,"hs_deleted_at":0,"hs_id":184128305975,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304222,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/InsiderThreat-FInServ-2024-Cover.jpg","altText":"","fileId":177682543898,"height":544,"type":"image","width":420},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":4,"isHubspotDefined":false,"label":"Financial Services","labelTranslations":{},"name":"financial_services","order":1,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Research Report","labelTranslations":{},"name":"research report","order":7,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Financial Services Deep Dive: Insider Threat","url":"https://www.trustwave.com/en-us/resources/library/documents/financial-services-deep-dive-insider-threat/ "},{"hs_child_table_id":0,"hs_created_at":1734721304221,"hs_deleted_at":0,"hs_id":184128305974,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304221,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/2024_COY_FS.jpg","altText":"","fileId":177432123964,"height":838,"type":"image","width":591},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":2,"isHubspotDefined":false,"label":"Analyst Report","labelTranslations":{},"name":"analyst report","order":0,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"2024 Frost & Sullivan Company of the Year: MSS Market Excellence in Best Practices","url":"https://www.trustwave.com/en-us/resources/library/documents/2024-frost-sullivan-company-of-the-year-the-americas-managed-security-services-market-excellence-in-best-practices/"},{"hs_child_table_id":0,"hs_created_at":1734721304220,"hs_deleted_at":0,"hs_id":184128305973,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304220,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/Adventure-Cybersecurity-Social-Meta-Web.jpg","altText":"","fileId":177462200151,"height":630,"type":"image","width":1200},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":18,"isHubspotDefined":false,"label":"Microsoft","labelTranslations":{},"name":"microsoft","order":8,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":19,"isHubspotDefined":false,"label":"Artificial Intelligence","labelTranslations":{},"name":"artificial_intelligence","order":0,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Adventures in Cybersecurity: Trustwave and Microsoft","url":"https://www.trustwave.com/en-us/resources/library/webinars/adventures-in-cybersecurity-trustwave-and-microsoft/"},{"hs_child_table_id":0,"hs_created_at":1734721304219,"hs_deleted_at":0,"hs_id":184128305972,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304219,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/APAC-GovAgency_CaseStudy-cover.png","altText":"","fileId":177454246791,"height":544,"type":"image","width":420},"industry":{"createdAt":1730396680025,"createdByUserId":60505637,"id":3,"isHubspotDefined":false,"label":"Government","labelTranslations":{},"name":"government","order":2,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1731443056321,"createdByUserId":60505637,"id":18,"isHubspotDefined":false,"label":"Microsoft","labelTranslations":{},"name":"microsoft","order":8,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave Boosts Local Government Agency's Security With Microsoft","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-boosts-local-government-agencys-security-with-microsoft/"},{"hs_child_table_id":0,"hs_created_at":1734721304218,"hs_deleted_at":0,"hs_id":184128305971,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304218,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/Correction_Facilities_CaseStudy-cover.png","altText":"","fileId":177452725092,"height":544,"type":"image","width":420},"industry":{"createdAt":1730396680025,"createdByUserId":60505637,"id":3,"isHubspotDefined":false,"label":"Government","labelTranslations":{},"name":"government","order":2,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave MailMarshal Improves Inmate Communication for Correctional Facilities","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-mailmarshal-improves-inmate-communication-for-correctional-facilities/"},{"hs_child_table_id":0,"hs_created_at":1734721304217,"hs_deleted_at":0,"hs_id":184128305970,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304217,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/FR-MSS-24-AMS-cover.png","altText":"","fileId":176449639182,"height":544,"type":"image","width":420},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":2,"isHubspotDefined":false,"label":"Analyst Report","labelTranslations":{},"name":"analyst report","order":0,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Frost Radar: Managed Security Services in the Americas, 2024","url":"https://www.trustwave.com/en-us/resources/library/documents/frost-radar-managed-security-services-in-the-americas-2024/"},{"hs_child_table_id":0,"hs_created_at":1734721304216,"hs_deleted_at":0,"hs_id":184128305969,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304216,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/FR-MSS-24-EMEA-cover.png","altText":"","fileId":176448643192,"height":544,"type":"image","width":420},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":2,"isHubspotDefined":false,"label":"Analyst Report","labelTranslations":{},"name":"analyst report","order":0,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Frost Radar: Managed Security Services in Europe, 2024","url":"https://www.trustwave.com/en-us/resources/library/documents/frost-radar-managed-security-services-in-europe-2024/"},{"hs_child_table_id":0,"hs_created_at":1734721304215,"hs_deleted_at":0,"hs_id":184128305968,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304215,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/ISGPL-SOCMM-24-Cover.jpg","altText":"","fileId":175870573479,"height":544,"type":"image","width":420},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":2,"isHubspotDefined":false,"label":"Analyst Report","labelTranslations":{},"name":"analyst report","order":0,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":11,"isHubspotDefined":false,"label":"SIEM/SOC","labelTranslations":{},"name":"siem_soc","order":11,"type":"option","updatedAt":1731443103341,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"2024 ISG Provider Lens: Cybersecurity – Managed Security Services – SOC (US Midmarket)","url":"https://www.trustwave.com/en-us/resources/library/documents/2024-isg-provider-lens-cybersecurity-managed-security-services-soc-us-midmarket/"},{"hs_child_table_id":0,"hs_created_at":1734721304214,"hs_deleted_at":0,"hs_id":184128305967,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304214,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/ISGPL-SOCMM-24-Cover.jpg","altText":"","fileId":175870573479,"height":544,"type":"image","width":420},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":2,"isHubspotDefined":false,"label":"Analyst Report","labelTranslations":{},"name":"analyst report","order":0,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":11,"isHubspotDefined":false,"label":"SIEM/SOC","labelTranslations":{},"name":"siem_soc","order":11,"type":"option","updatedAt":1731443103341,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"2024 ISG Provider Lens: Cybersecurity – Managed Security Services – SOC (UK Midmarket)","url":"https://www.trustwave.com/en-us/resources/library/documents/2024-isg-provider-lens-cybersecurity-managed-security-services-soc-uk-midmarket/"},{"hs_child_table_id":0,"hs_created_at":1734721304213,"hs_deleted_at":0,"hs_id":184128305966,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304213,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/Malvertising_Research_part_2-cover.png","altText":"","fileId":174120364616,"height":544,"type":"image","width":420},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Research Report","labelTranslations":{},"name":"research report","order":7,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Facebook Malvertising Epidemic – Unraveling a Persistent Threat: SYS01 - Part 2","url":"https://www.trustwave.com/en-us/resources/library/documents/facebook-malvertising-epidemic-unraveling-a-persistent-threat-sys01-part-2/"},{"hs_child_table_id":0,"hs_created_at":1734721304212,"hs_deleted_at":0,"hs_id":184128305965,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304212,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/MSFT-Webinar-5-Social-Meta-BLANK.jpg","altText":"","fileId":174031197208,"height":630,"type":"image","width":1200},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":11,"isHubspotDefined":false,"label":"SIEM/SOC","labelTranslations":{},"name":"siem_soc","order":11,"type":"option","updatedAt":1731443103341,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":18,"isHubspotDefined":false,"label":"Microsoft","labelTranslations":{},"name":"microsoft","order":8,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Accelerating Value for Microsoft Defender XDR, Copilot, and Sentinel","url":"https://www.trustwave.com/en-us/resources/library/webinars/accelerating-value-for-microsoft-defender-xdr-copilot-and-sentinel/"},{"hs_child_table_id":0,"hs_created_at":1734721304211,"hs_deleted_at":0,"hs_id":184128305964,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304211,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/Gartner-DFIR-MG-2024-cover-OFFICIAL-FINAL.png","altText":"","fileId":173903813430,"height":544,"type":"image","width":420},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":2,"isHubspotDefined":false,"label":"Analyst Report","labelTranslations":{},"name":"analyst report","order":0,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"DFIR","labelTranslations":{},"name":"dfir","order":4,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"2024 Gartner® Market Guide for Digital Forensics and Incident Response Retainer Services","url":"https://www.trustwave.com/en-us/resources/library/documents/2024-gartner-market-guide-for-digital-forensics-and-incident-response-retainer-services/"},{"hs_child_table_id":0,"hs_created_at":1734721304210,"hs_deleted_at":0,"hs_id":184128305963,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304210,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/MSFT-Webinar-4-Social-Meta-Blank.jpg","altText":"","fileId":173773576282,"height":630,"type":"image","width":1200},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1731443056321,"createdByUserId":60505637,"id":18,"isHubspotDefined":false,"label":"Microsoft","labelTranslations":{},"name":"microsoft","order":8,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":19,"isHubspotDefined":false,"label":"Artificial Intelligence","labelTranslations":{},"name":"artificial_intelligence","order":0,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Getting Started with Microsoft Copilot for Security","url":"https://www.trustwave.com/en-us/resources/library/webinars/getting-started-with-microsoft-copilot-for-security/"},{"hs_child_table_id":0,"hs_created_at":1734721304209,"hs_deleted_at":0,"hs_id":184128305962,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304209,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/Gartner-MG-MDR-24-cover.png","altText":"","fileId":172816856988,"height":544,"type":"image","width":420},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":2,"isHubspotDefined":false,"label":"Analyst Report","labelTranslations":{},"name":"analyst report","order":0,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"2024 Gartner® Market Guide for Managed Detection and Response Services","url":"https://www.trustwave.com/en-us/resources/library/documents/2024-gartner-market-guide-for-managed-detection-and-response/"},{"hs_child_table_id":0,"hs_created_at":1734721304208,"hs_deleted_at":0,"hs_id":184128305961,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304208,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/MSFT-Webinar-3-Social-Meta%20(1).jpg","altText":"","fileId":173147887798,"height":630,"type":"image","width":1200},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1731443056321,"createdByUserId":60505637,"id":18,"isHubspotDefined":false,"label":"Microsoft","labelTranslations":{},"name":"microsoft","order":8,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"CISO Debrief: Lessons Learned Moving to Microsoft E5","url":"https://www.trustwave.com/en-us/resources/library/webinars/ciso-debrief-lessons-learned-moving-to-microsoft-e5/"},{"hs_child_table_id":0,"hs_created_at":1734721304207,"hs_deleted_at":0,"hs_id":184128305960,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304207,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/Malvertising%20Research-cover.png","altText":"","fileId":170351830084,"height":544,"type":"image","width":420},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Research Report","labelTranslations":{},"name":"research report","order":7,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Facebook Malvertising Epidemic – Unraveling a Persistent Threat: SYS01","url":"https://www.trustwave.com/en-us/resources/library/documents/facebook-malvertising-epidemic-unraveling-a-persistent-threat-sys01/"},{"hs_child_table_id":0,"hs_created_at":1734721304206,"hs_deleted_at":0,"hs_id":184128305959,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304206,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/MSFT-Webinar-2-Social-Meta-blank.jpg","altText":"","fileId":171922195248,"height":630,"type":"image","width":1200},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1731443056321,"createdByUserId":60505637,"id":18,"isHubspotDefined":false,"label":"Microsoft","labelTranslations":{},"name":"microsoft","order":8,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"5 Steps to Maximizing a Microsoft E5 License","url":"https://www.trustwave.com/en-us/resources/library/webinars/five-steps-to-maximizing-a-microsoft-e5-license/"},{"hs_child_table_id":0,"hs_created_at":1734721304205,"hs_deleted_at":0,"hs_id":184128305958,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304205,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/2024-ProfServ-TL-Social-Meta-watch.jpg","altText":"","fileId":170802865165,"height":630,"type":"image","width":1200},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Professional Services","labelTranslations":{},"name":"professional_services","order":8,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Future-Proof Your Firm: Actionable Cybersecurity for Professional & Legal Services","url":"https://www.trustwave.com/en-us/resources/library/webinars/future-proof-your-firm-actionable-cybersecurity-for-professional-and-legal-services/ "},{"hs_child_table_id":0,"hs_created_at":1734721304204,"hs_deleted_at":0,"hs_id":184128305957,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304204,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/2024-ProfServ-TL-cover.jpg","altText":"","fileId":170677802797,"height":544,"type":"image","width":420},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Professional Services","labelTranslations":{},"name":"professional_services","order":8,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Research Report","labelTranslations":{},"name":"research report","order":7,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"2024 Professional Services Threat Intelligence Briefing and Mitigation Strategies","url":"https://www.trustwave.com/en-us/resources/library/documents/professional-services-threat-briefing-and-mitigation-strategies/ "},{"hs_child_table_id":0,"hs_created_at":1734721304203,"hs_deleted_at":0,"hs_id":184128305956,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304203,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/MSFT-Webinar-1-Social-Meta.jpg","altText":"","fileId":173172405329,"height":630,"type":"image","width":1200},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1731443056321,"createdByUserId":60505637,"id":18,"isHubspotDefined":false,"label":"Microsoft","labelTranslations":{},"name":"microsoft","order":8,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Top Considerations When Transitioning from Microsoft E3 to E5","url":"https://www.trustwave.com/en-us/resources/library/webinars/top-considerations-when-transitioning-from-microsoft-e3-to-e5/"},{"hs_child_table_id":0,"hs_created_at":1734721304202,"hs_deleted_at":0,"hs_id":184128305955,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304202,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/8Experts-OffSec-cover.png","altText":"","fileId":170120449721,"height":544,"type":"image","width":420},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":4,"isHubspotDefined":false,"label":"eBook","labelTranslations":{},"name":"ebook","order":3,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"8 Experts on Offensive Security","url":"https://www.trustwave.com/en-us/resources/library/documents/8-experts-on-offensive-security/ "},{"hs_child_table_id":0,"hs_created_at":1734721304201,"hs_deleted_at":0,"hs_id":184128305954,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304201,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/Accelerators%20for%20Microsoft%20Security_Cover.png","altText":"","fileId":169293845928,"height":544,"type":"image","width":420},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1731443056321,"createdByUserId":60505637,"id":18,"isHubspotDefined":false,"label":"Microsoft","labelTranslations":{},"name":"microsoft","order":8,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Accelerators for Microsoft Security","url":"https://www.trustwave.com/en-us/resources/library/documents/accelerators-for-microsoft/"},{"hs_child_table_id":0,"hs_created_at":1734721304200,"hs_deleted_at":0,"hs_id":184128305953,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304200,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/MXDR_for_Microsoft_cover.png","altText":"","fileId":168860438101,"height":544,"type":"image","width":420},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":18,"isHubspotDefined":false,"label":"Microsoft","labelTranslations":{},"name":"microsoft","order":8,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave MXDR for Microsoft","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-mxdr-for-microsoft/"},{"hs_child_table_id":0,"hs_created_at":1734721304199,"hs_deleted_at":0,"hs_id":184128305952,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304199,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/Decode-CyberTesting-Social-Meta-BLANK.jpg","altText":"","fileId":167637411918,"height":630,"type":"image","width":1200},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Decoding Cybersecurity Testing: Navigating Vulnerability Scanning to Purple Teaming","url":"https://www.trustwave.com/en-us/resources/library/webinars/decoding-cybersecurity-testing-navigating-vulnerability-scanning-to-purple-teaming/"},{"hs_child_table_id":0,"hs_created_at":1734721304198,"hs_deleted_at":0,"hs_id":184128305951,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304198,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Social/General/PublicSector-TR-Social-Meta-BLANK.jpg","altText":"","fileId":166664071593,"height":630,"type":"image","width":1200},"industry":{"createdAt":1730396680025,"createdByUserId":60505637,"id":3,"isHubspotDefined":false,"label":"Government","labelTranslations":{},"name":"government","order":2,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Securing the Public Sector: Trustwave’s Actionable Threat Briefing for a Complex Landscape","url":"https://www.trustwave.com/en-us/resources/library/webinars/securing-the-public-sector-trustwaves-actionable-threat-briefing-for-a-complex-landscape/"},{"hs_child_table_id":0,"hs_created_at":1734721304197,"hs_deleted_at":0,"hs_id":184128305950,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304197,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/PublicSector-TR-Cover.png","altText":"","fileId":166871569029,"height":544,"type":"image","width":420},"industry":{"createdAt":1730396680025,"createdByUserId":60505637,"id":3,"isHubspotDefined":false,"label":"Government","labelTranslations":{},"name":"government","order":2,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Research Report","labelTranslations":{},"name":"research report","order":7,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"2024 Public Sector Threat Intelligence Briefing and Mitigation Strategies","url":"https://www.trustwave.com/en-us/resources/library/documents/public-sector-threat-briefing-and-mitigation-strategies/ "},{"hs_child_table_id":0,"hs_created_at":1734721304196,"hs_deleted_at":0,"hs_id":184128305949,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304196,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/IDC-MS-Emerg-MDR-cover.png","altText":"","fileId":165329070453,"height":544,"type":"image","width":420},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":2,"isHubspotDefined":false,"label":"Analyst Report","labelTranslations":{},"name":"analyst report","order":0,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"IDC MarketScape: Worldwide Emerging MDR Services 2024 Vendor Assessment","url":"https://www.trustwave.com/en-us/resources/library/documents/idc-marketscape-worldwide-emerging-managed-detection-and-response-2024-vendor-assessment/"},{"hs_child_table_id":0,"hs_created_at":1734721304195,"hs_deleted_at":0,"hs_id":184128305948,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304195,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/Radicati-Email-MQ-24-cover.jpg","altText":"","fileId":164627621176,"height":544,"type":"image","width":420},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":2,"isHubspotDefined":false,"label":"Analyst Report","labelTranslations":{},"name":"analyst report","order":0,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Radicati Group Secure Email Market Quadrant, 2024","url":"https://www.trustwave.com/en-us/resources/library/documents/radicati-group-secure-email-market-quadrant-2024/ "},{"hs_child_table_id":0,"hs_created_at":1734721304194,"hs_deleted_at":0,"hs_id":184128305947,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304194,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/IDC-24-WW-Consulting-cover.webp","altText":"","fileId":163087843425,"height":544,"type":"image","width":420},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Professional Services","labelTranslations":{},"name":"professional_services","order":8,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":2,"isHubspotDefined":false,"label":"Analyst Report","labelTranslations":{},"name":"analyst report","order":0,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"IDC Marketscape: Worldwide Cybersecurity Consulting Services 2024 Vendor Assessment","url":"https://www.trustwave.com/en-us/resources/library/documents/idc-marketscape-worldwide-cybersecurity-consulting-services-2024-vendor-assessment/"},{"hs_child_table_id":0,"hs_created_at":1734721304193,"hs_deleted_at":0,"hs_id":184128305946,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304193,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/TIaaS_Offering_Overview_Cover.png","altText":"","fileId":162429638795,"height":544,"type":"image","width":420},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Threat Intelligence as a Service","url":"https://www.trustwave.com/en-us/resources/library/documents/threat-inteligence-as-a-service/"},{"hs_child_table_id":0,"hs_created_at":1734721304192,"hs_deleted_at":0,"hs_id":184128305945,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304192,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/Prevent-TakingFlight-Social-Meta-BLANK.jpg","altText":"","fileId":161229405539,"height":630,"type":"image","width":1200},"industry":{"createdAt":1734701670779,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Transportation","labelTranslations":{},"name":"transportation","order":11,"type":"option","updatedAt":1734701670779,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Prevent Cyber Attacks from Taking Flight in Your Organization","url":"https://www.trustwave.com/en-us/resources/library/webinars/prevent-cyber-attacks-from-taking-flight-in-your-organization/ "},{"hs_child_table_id":0,"hs_created_at":1734721304191,"hs_deleted_at":0,"hs_id":184128305944,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304191,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/2024-Tech-TL-Social-Meta-BLANK%20(1).jpg","altText":"","fileId":161525307707,"height":630,"type":"image","width":1200},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":11,"isHubspotDefined":false,"label":"Technology","labelTranslations":{},"name":"technology","order":10,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Decoding Cybersecurity in Tech: Trustwave’s Actionable Vertical Threat Briefing Webinar","url":"https://www.trustwave.com/en-us/resources/library/webinars/decoding-cybersecurity-in-tech-trustwaves-actionable-vertical-threat-briefing/ "},{"hs_child_table_id":0,"hs_created_at":1734721304190,"hs_deleted_at":0,"hs_id":184128305943,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304190,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/2024-Tech-TL-cover%20(1).jpg","altText":"","fileId":161748731907,"height":415,"type":"image","width":399},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":11,"isHubspotDefined":false,"label":"Technology","labelTranslations":{},"name":"technology","order":10,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Research Report","labelTranslations":{},"name":"research report","order":7,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"2024 Technology Threat Intelligence Briefing and Mitigation Strategies","url":"https://www.trustwave.com/en-us/en-us/resources/library/documents/2024-technology-threat-briefing-and-mitigation-strategies/ "},{"hs_child_table_id":0,"hs_created_at":1734721304189,"hs_deleted_at":0,"hs_id":184128305942,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304189,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/DC-Gov-PSS-cover.png","altText":"","fileId":167064633369,"height":544,"type":"image","width":420},"industry":{"createdAt":1730396680025,"createdByUserId":60505637,"id":3,"isHubspotDefined":false,"label":"Government","labelTranslations":{},"name":"government","order":2,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":2,"isHubspotDefined":false,"label":"Analyst Report","labelTranslations":{},"name":"analyst report","order":0,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"IDC MarketScape: US National Civilian Government Professional Security Services 2024 Vendor Assessment","url":"https://www.trustwave.com/en-us/en-us/resources/library/documents/idc-marketscape-us-national-government-professional-security-services-2024-vendor-assessment/"},{"hs_child_table_id":0,"hs_created_at":1734721304188,"hs_deleted_at":0,"hs_id":184128305941,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304188,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/Gartner-CoManagedSOC-R2-Cover.png","altText":"","fileId":160610235658,"height":544,"type":"image","width":420},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":2,"isHubspotDefined":false,"label":"Analyst Report","labelTranslations":{},"name":"analyst report","order":0,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":11,"isHubspotDefined":false,"label":"SIEM/SOC","labelTranslations":{},"name":"siem_soc","order":11,"type":"option","updatedAt":1731443103341,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"2024 Gartner® Market Guide for Co-Managed Security Services","url":"https://www.trustwave.com/en-us/resources/library/documents/2024-gartner-market-guide-for-co-managed-security-services/"},{"hs_child_table_id":0,"hs_created_at":1734721304187,"hs_deleted_at":0,"hs_id":184128305940,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304187,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/F&S-MDR-cover-1.webp","altText":"","fileId":161751203661,"height":544,"type":"image","width":420},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":2,"isHubspotDefined":false,"label":"Analyst Report","labelTranslations":{},"name":"analyst report","order":0,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Frost Radar: Global Managed Detection and Response Market, 2024","url":"https://www.trustwave.com/en-us/resources/library/documents/frost-radar-global-managed-detection-and-response-market-2024/"},{"hs_child_table_id":0,"hs_created_at":1734721304186,"hs_deleted_at":0,"hs_id":184128305939,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304186,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/Web/Webinars/2024-Education-TL-Social-Meta-BLANK.jpg","altText":"","type":"image"},"industry":{"createdAt":1730396680025,"createdByUserId":60505637,"id":2,"isHubspotDefined":false,"label":"Education","labelTranslations":{},"name":"education","order":0,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"A+ Cybersecurity: Trustwave’s Actionable Education Vertical Threat Briefing","url":"https://www.trustwave.com/en-us/resources/library/webinars/education-vertical-threat-briefing/ "},{"hs_child_table_id":0,"hs_created_at":1734721304185,"hs_deleted_at":0,"hs_id":184128305938,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304185,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/Web/Document_Images/Melbourne_Airport_CaseStudy-cover.png","altText":"","type":"image"},"industry":{"createdAt":1734701670779,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Transportation","labelTranslations":{},"name":"transportation","order":11,"type":"option","updatedAt":1734701670779,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave Managed Security Services Raises Melbourne Airport’s Cybersecurity Maturity","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-managed-security-services-raises-melbourne-airports-cybersecurity-maturity/"},{"hs_child_table_id":0,"hs_created_at":1734721304184,"hs_deleted_at":0,"hs_id":184128305937,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304184,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/Web/Document_Images/2024-Education-TL-cover.jpg","altText":"","type":"image"},"industry":{"createdAt":1730396680025,"createdByUserId":60505637,"id":2,"isHubspotDefined":false,"label":"Education","labelTranslations":{},"name":"education","order":0,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Research Report","labelTranslations":{},"name":"research report","order":7,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"2024 Education Threat Intelligence Briefing and Mitigation Strategies","url":"https://www.trustwave.com/en-us/resources/library/documents/2024-education-threat-briefing-and-mitigation-strategies/ "},{"hs_child_table_id":0,"hs_created_at":1734721304183,"hs_deleted_at":0,"hs_id":184128305936,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304183,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/Web/Document_Images/FaceBook_Ad_Spreads_Novel_Malware-cover.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Research Report","labelTranslations":{},"name":"research report","order":7,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Facebook Advertising Spreads Novel Malware Variant","url":"https://www.trustwave.com/en-us/resources/library/documents/facebook-advertising-spreads-novel-malware-variant/ "},{"hs_child_table_id":0,"hs_created_at":1734721304182,"hs_deleted_at":0,"hs_id":184128305935,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304182,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/Web/Webinars/Decrypting2024-Social-Meta-BLANK-1.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Decrypting the Future: Trustwave’s 2024 Cybersecurity Predictions","url":"https://www.trustwave.com/en-us/resources/library/webinars/decrypting-the-future-trustwave-2024-cybesecurity-predictions "},{"hs_child_table_id":0,"hs_created_at":1734721304181,"hs_deleted_at":0,"hs_id":184128305934,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304181,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/Web/Document_Images/IDC_Market_Note_Cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":2,"isHubspotDefined":false,"label":"Analyst Report","labelTranslations":{},"name":"analyst report","order":0,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":11,"isHubspotDefined":false,"label":"SIEM/SOC","labelTranslations":{},"name":"siem_soc","order":11,"type":"option","updatedAt":1731443103341,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"IDC Market Note: Trustwave Reemerges with a Promising Future and Partner","url":"https://www.trustwave.com/en-us/resources/library/documents/idc-market-note-trustwave-reemerges-with-a-promising-future-and-partner/ "},{"hs_child_table_id":0,"hs_created_at":1734721304180,"hs_deleted_at":0,"hs_id":184128305933,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304180,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/Web/Webinars/Manufacturing-TR-Webinar_Image.jpg","altText":"","type":"image"},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":7,"isHubspotDefined":false,"label":"Manufacturing","labelTranslations":{},"name":"manufacturing","order":6,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Factories on the Frontlines: Trustwave’s Actionable Manufacturing Vertical Threat Briefing","url":"https://www.trustwave.com/en-us/resources/library/webinars/trustwaves-actionable-manufacturing-vertical-threat-briefing/ "},{"hs_child_table_id":0,"hs_created_at":1734721304179,"hs_deleted_at":0,"hs_id":184128305932,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304179,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/Web/Document_Images/2023_Manufacturing_Threat_Landscape-cover.jpg","altText":"","type":"image"},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":7,"isHubspotDefined":false,"label":"Manufacturing","labelTranslations":{},"name":"manufacturing","order":6,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Research Report","labelTranslations":{},"name":"research report","order":7,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"2023 Manufacturing Threat Intelligence Briefing and Mitigation Strategies","url":"https://www.trustwave.com/en-us/resources/library/documents/2023-manufacturing-threat-briefing-and-mitigation-strategies/ "},{"hs_child_table_id":0,"hs_created_at":1734721304178,"hs_deleted_at":0,"hs_id":184128305931,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304178,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/Web/Webinars/Retail-Social-Meta-BLANK.jpg","altText":"","type":"image"},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Retail","labelTranslations":{},"name":"retail","order":9,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Retail Resilience: Trustwave’s Actionable Retail Vertical Threat Briefing","url":"https://www.trustwave.com/en-us/resources/library/webinars/retail-resilience-trustwaves-actionable-retail-vertical-threat-briefing/ "},{"hs_child_table_id":0,"hs_created_at":1734721304177,"hs_deleted_at":0,"hs_id":184128305930,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304177,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/Web/Document_Images/2023-Retail-TL-cover.png","altText":"","type":"image"},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Retail","labelTranslations":{},"name":"retail","order":9,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Research Report","labelTranslations":{},"name":"research report","order":7,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":19,"isHubspotDefined":false,"label":"Artificial Intelligence","labelTranslations":{},"name":"artificial_intelligence","order":0,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"2023 Retail Sector Threat Briefing and Mitigation Strategies","url":"https://www.trustwave.com/en-us/resources/library/documents/2023-retail-sector-threat-briefing-and-mitigation-strategies/ "},{"hs_child_table_id":0,"hs_created_at":1734721304176,"hs_deleted_at":0,"hs_id":184128305929,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304176,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/Web/Webinars/Unbreakable-DB-Social-Meta-BLANK.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Unbreakable: Real Time Database Protection in Action","url":"https://www.trustwave.com/en-us/resources/library/webinars/unbreakable-real-time-database-protection-in-action/"},{"hs_child_table_id":0,"hs_created_at":1734721304175,"hs_deleted_at":0,"hs_id":184128305928,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304175,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/SLTR-FinServ-300x200-2.jpg","altText":"","type":"image"},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":4,"isHubspotDefined":false,"label":"Financial Services","labelTranslations":{},"name":"financial_services","order":1,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Guarding the Vault: Trustwave’s Actionable Financial Services Threat Briefing","url":"https://www.trustwave.com/en-us/resources/library/webinars/financial-services-threat-briefing/ "},{"hs_child_table_id":0,"hs_created_at":1734721304174,"hs_deleted_at":0,"hs_id":184128305927,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304174,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/Web/Document_Images/2024_Education_Threat_Landscape-infographic-cover.png","altText":"","type":"image"},"industry":{"createdAt":1730396680025,"createdByUserId":60505637,"id":2,"isHubspotDefined":false,"label":"Education","labelTranslations":{},"name":"education","order":0,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":5,"isHubspotDefined":false,"label":"Infographic","labelTranslations":{},"name":"infographic","order":6,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"2024 Education Sector Threat Landscape","url":"https://www.trustwave.com/en-us/resources/library/documents/2024-education-sector-threat-landscape/ "},{"hs_child_table_id":0,"hs_created_at":1734721304173,"hs_deleted_at":0,"hs_id":184128305926,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304173,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/Web/Document_Images/Managed_SIEM_for_Sentinel_Cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":11,"isHubspotDefined":false,"label":"SIEM/SOC","labelTranslations":{},"name":"siem_soc","order":11,"type":"option","updatedAt":1731443103341,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":18,"isHubspotDefined":false,"label":"Microsoft","labelTranslations":{},"name":"microsoft","order":8,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave Managed SIEM for Microsoft Sentinel","url":"https://www.trustwave.com/en-us/resources/library/documents/managed-siem-for-microsoft-sentinel-overview/"},{"hs_child_table_id":0,"hs_created_at":1734721304172,"hs_deleted_at":0,"hs_id":184128305925,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304172,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/Web/Document_Images/Microsoft-Sentinel-3-Ways-Cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":11,"isHubspotDefined":false,"label":"SIEM/SOC","labelTranslations":{},"name":"siem_soc","order":11,"type":"option","updatedAt":1731443103341,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":18,"isHubspotDefined":false,"label":"Microsoft","labelTranslations":{},"name":"microsoft","order":8,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Three Ways We Can Amplify Your Defense Against Evolving Cyberthreats With Microsoft Sentinel","url":"https://www.trustwave.com/en-us/resources/library/documents/three-ways-we-can-amplify-your-defense-against-evolving-cyberthreats-with-microsoft-sentinel/"},{"hs_child_table_id":0,"hs_created_at":1734721304171,"hs_deleted_at":0,"hs_id":184128305924,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304171,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/Web/Document_Images/ebook_Micorosft_Sentinel_Trustwave_Managed_SIEM-Cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":4,"isHubspotDefined":false,"label":"eBook","labelTranslations":{},"name":"ebook","order":3,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":11,"isHubspotDefined":false,"label":"SIEM/SOC","labelTranslations":{},"name":"siem_soc","order":11,"type":"option","updatedAt":1731443103341,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":18,"isHubspotDefined":false,"label":"Microsoft","labelTranslations":{},"name":"microsoft","order":8,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Transform Your Security Operations Center with Microsoft Sentinel","url":"https://www.trustwave.com/en-us/resources/library/documents/transform-your-security-operations-center-with-microsoft-sentinel/ "},{"hs_child_table_id":0,"hs_created_at":1734721304170,"hs_deleted_at":0,"hs_id":184128305923,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304170,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/Web/Document_Images/2023_Manufacturing_Threat_Landscape-infographic-cover.png","altText":"","type":"image"},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":7,"isHubspotDefined":false,"label":"Manufacturing","labelTranslations":{},"name":"manufacturing","order":6,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":5,"isHubspotDefined":false,"label":"Infographic","labelTranslations":{},"name":"infographic","order":6,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"2023 Manufacturing Sector Threat Landscape","url":"https://www.trustwave.com/en-us/resources/library/documents/2023-manufacturing-sector-threat-landscape/ "},{"hs_child_table_id":0,"hs_created_at":1734721304169,"hs_deleted_at":0,"hs_id":184128305922,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304169,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/Web/Document_Images/Cybersecurity-FinServ-Sector-cover.png","altText":"","type":"image"},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":4,"isHubspotDefined":false,"label":"Financial Services","labelTranslations":{},"name":"financial_services","order":1,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Research Report","labelTranslations":{},"name":"research report","order":7,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":19,"isHubspotDefined":false,"label":"Artificial Intelligence","labelTranslations":{},"name":"artificial_intelligence","order":0,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"2023 Financial Services Sector Threat Briefing and Mitigation Strategies","url":"https://www.trustwave.com/en-us/resources/library/documents/2023-financial-services-sector-threat-briefing-and-mitigation-strategies/ "},{"hs_child_table_id":0,"hs_created_at":1734721304168,"hs_deleted_at":0,"hs_id":184128305921,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304168,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/Web/Document_Images/MSFT-Sentinel-Workshop-cover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":11,"isHubspotDefined":false,"label":"SIEM/SOC","labelTranslations":{},"name":"siem_soc","order":11,"type":"option","updatedAt":1731443103341,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":18,"isHubspotDefined":false,"label":"Microsoft","labelTranslations":{},"name":"microsoft","order":8,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Microsoft Sentinel Workshop Offered by Trustwave","url":"https://www.trustwave.com/en-us/resources/library/documents/microsoft-sentinel-workshop-offered-by-trustwave/"},{"hs_child_table_id":0,"hs_created_at":1734721304167,"hs_deleted_at":0,"hs_id":184128305920,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304167,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/Web/Document_Images/MSFT-Threat%20Protection%20Engagement-cover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":18,"isHubspotDefined":false,"label":"Microsoft","labelTranslations":{},"name":"microsoft","order":8,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Threat Protection Engagement Powered by Trustwave","url":"https://www.trustwave.com/en-us/resources/library/documents/threat-protection-engagement-powered-by-trustwave/ "},{"hs_child_table_id":0,"hs_created_at":1734721304166,"hs_deleted_at":0,"hs_id":184128305849,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304166,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/Web/Document_Images/2023_Retail_Threat_Landscape-infographic-cover.png","altText":"","type":"image"},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Retail","labelTranslations":{},"name":"retail","order":9,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":5,"isHubspotDefined":false,"label":"Infographic","labelTranslations":{},"name":"infographic","order":6,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":19,"isHubspotDefined":false,"label":"Artificial Intelligence","labelTranslations":{},"name":"artificial_intelligence","order":0,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"2023 Retail Sector Threat Landscape","url":"https://www.trustwave.com/en-us/resources/library/documents/2023-retail-sector-threat-landscape/ "},{"hs_child_table_id":0,"hs_created_at":1734721304165,"hs_deleted_at":0,"hs_id":184128305848,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304165,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/Web/Webinars/Hospitality-ThreatBrief-Webinar-Social-Meta-BLANK.webp","altText":"","type":"image"},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":5,"isHubspotDefined":false,"label":"Hospitality","labelTranslations":{},"name":"hospitality","order":4,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Cybersecurity Wake-Up Call: Threat Briefing for the Hospitality Industry","url":"https://www.trustwave.com/en-us/resources/library/webinars/threat-briefing-for-the-hospitality-industry/ "},{"hs_child_table_id":0,"hs_created_at":1734721304164,"hs_deleted_at":0,"hs_id":184128305847,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304164,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/Cybersecurity-Hospitality-Cover-1.png","altText":"","type":"image"},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":5,"isHubspotDefined":false,"label":"Hospitality","labelTranslations":{},"name":"hospitality","order":4,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Research Report","labelTranslations":{},"name":"research report","order":7,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"2023 Hospitality Sector Threat Landscape: Trustwave Threat Intelligence Briefing and Mitigation Strategies","url":"https://www.trustwave.com/en-us/resources/library/documents/2023-hospitality-sector-threat-landscape-trustwave-threat-intelligence-briefing-and-mitigation-strategies/ "},{"hs_child_table_id":0,"hs_created_at":1734721304163,"hs_deleted_at":0,"hs_id":184128305846,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304163,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/Web/Document_Images/2023_FinServ_Sector_Threat_Landscape-cover.png","altText":"","type":"image"},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":4,"isHubspotDefined":false,"label":"Financial Services","labelTranslations":{},"name":"financial_services","order":1,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":5,"isHubspotDefined":false,"label":"Infographic","labelTranslations":{},"name":"infographic","order":6,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"2023 Financial Services Sector Threat Landscape","url":"https://www.trustwave.com/en-us/en-us/resources/library/documents/2023-financial-services-sector-threat-landscape/ "},{"hs_child_table_id":0,"hs_created_at":1734721304162,"hs_deleted_at":0,"hs_id":184128305845,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304162,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/Web/Document_Images/CMMC_Cover.webp","altText":"","type":"image"},"industry":{"createdAt":1730396680025,"createdByUserId":60505637,"id":3,"isHubspotDefined":false,"label":"Government","labelTranslations":{},"name":"government","order":2,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1731443056321,"createdByUserId":60505637,"id":15,"isHubspotDefined":false,"label":"Compliance","labelTranslations":{},"name":"compliance","order":1,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Cybersecurity Maturity Model Certification (CMMC)","url":"https://www.trustwave.com/en-us/resources/library/documents/cybersecurity-maturity-model-certification/"},{"hs_child_table_id":0,"hs_created_at":1734721304161,"hs_deleted_at":0,"hs_id":184128305844,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304161,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/Web/Webinars/Gen-AI-Face-Social-Meta-BLANK-1.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":19,"isHubspotDefined":false,"label":"Artificial Intelligence","labelTranslations":{},"name":"artificial_intelligence","order":0,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"ChatGPT Update: How Generative AI Models are Changing the Face of Information Security","url":"https://www.trustwave.com/en-us/resources/library/webinars/chatgpt-update-how-generative-ai-models-are-changing-the-face-of-information-security/ "},{"hs_child_table_id":0,"hs_created_at":1734721304160,"hs_deleted_at":0,"hs_id":184128305843,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304160,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/Web/Software_Trials/16045_webmarshal-release_cover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":6,"isHubspotDefined":false,"label":"Guide","labelTranslations":{},"name":"guide","order":5,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"WebMarshal Release Notes","url":"https://www.trustwave.com/en-us/resources/library/documents/webmarshal-release-notes/ "},{"hs_child_table_id":0,"hs_created_at":1734721304159,"hs_deleted_at":0,"hs_id":184128305842,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304159,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/Web/Document_Images/16046_webmarshal-userguide_cover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":6,"isHubspotDefined":false,"label":"Guide","labelTranslations":{},"name":"guide","order":5,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave WebMarshal User Guide","url":"https://www.trustwave.com/en-us/resources/library/documents/webmarshal-user-guide/"},{"hs_child_table_id":0,"hs_created_at":1734721304158,"hs_deleted_at":0,"hs_id":184128305841,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304158,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/Web/Document_Images/17853_mm-userguide-softwave_cover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":6,"isHubspotDefined":false,"label":"Guide","labelTranslations":{},"name":"guide","order":5,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave MailMarshal User Guide","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-mailmarshal-user-guide/"},{"hs_child_table_id":0,"hs_created_at":1734721304157,"hs_deleted_at":0,"hs_id":184128305840,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304157,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/Web/Software_Trials/17854_mm-releasenotes-softwave_cover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":6,"isHubspotDefined":false,"label":"Guide","labelTranslations":{},"name":"guide","order":5,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave MailMarshal Release Notes","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-mailmarshal-release-notes/"},{"hs_child_table_id":0,"hs_created_at":1734721304156,"hs_deleted_at":0,"hs_id":184128305839,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304156,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/Web/Document_Images/17859_mm-evalguide-softwave_cover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":6,"isHubspotDefined":false,"label":"Guide","labelTranslations":{},"name":"guide","order":5,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave MailMarshal Evaluation Guide","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-mailmarshal-evaluation-guide/"},{"hs_child_table_id":0,"hs_created_at":1734721304155,"hs_deleted_at":0,"hs_id":184128305838,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304155,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/Web/Document_Images/Higgins-CaseStudy_cover.webp","altText":"","type":"image"},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":7,"isHubspotDefined":false,"label":"Manufacturing","labelTranslations":{},"name":"manufacturing","order":6,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":11,"isHubspotDefined":false,"label":"SIEM/SOC","labelTranslations":{},"name":"siem_soc","order":11,"type":"option","updatedAt":1731443103341,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Higgins Coatings Leverages Trustwave’s SIEM and SOC Experts to Transform their Security Operations","url":"https://www.trustwave.com/en-us/resources/library/documents/higgins-coatings-leverages-trustwaves-siem-and-soc-experts-to-transform-their-security-operations/"},{"hs_child_table_id":0,"hs_created_at":1734721304154,"hs_deleted_at":0,"hs_id":184128305837,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304154,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/Web/Document_Images/2023%20Trustwave%20Hospitality%20Sector%20Threat%20Landscape%20Infographic-Cover.webp","altText":"","type":"image"},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":5,"isHubspotDefined":false,"label":"Hospitality","labelTranslations":{},"name":"hospitality","order":4,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":5,"isHubspotDefined":false,"label":"Infographic","labelTranslations":{},"name":"infographic","order":6,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"2023 Hospitality Sector Threat Landscape","url":"https://www.trustwave.com/en-us/resources/library/documents/2023-hospitality-sector-threat-landscape/ "},{"hs_child_table_id":0,"hs_created_at":1734721304153,"hs_deleted_at":0,"hs_id":184128305836,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304153,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/database-security-solutions_cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave Database Security Solutions","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-database-security-solutions/"},{"hs_child_table_id":0,"hs_created_at":1734721304152,"hs_deleted_at":0,"hs_id":184128305835,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304152,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/i1iqybwq-1-1.png","altText":"","fileId":163752144669,"height":929,"type":"image","width":420},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":5,"isHubspotDefined":false,"label":"Infographic","labelTranslations":{},"name":"infographic","order":6,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"What are Cyber Heroes Made of?","url":"https://www.trustwave.com/es-us/resources/library/documents/what-are-cyber-heroes-made-of/"},{"hs_child_table_id":0,"hs_created_at":1734721304151,"hs_deleted_at":0,"hs_id":184128305834,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304151,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/finding-big-benefits-in-big-data.png","altText":"","fileId":163749014528,"height":544,"type":"image","width":420},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":5,"isHubspotDefined":false,"label":"Infographic","labelTranslations":{},"name":"infographic","order":6,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Finding Big Benefits in Big Data","url":"https://www.trustwave.com/en-us/resources/library/documents/finding-big-benefits-in-big-data/"},{"hs_child_table_id":0,"hs_created_at":1734721304150,"hs_deleted_at":0,"hs_id":184128305833,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304150,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/Web/Document_Images/Cybersecurity-in-the-Healthcare-Industry-Cover.webp","altText":"","type":"image"},"industry":{"createdAt":1730396680025,"createdByUserId":60505637,"id":1,"isHubspotDefined":false,"label":"Healthcare","labelTranslations":{},"name":"healthcare","order":3,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Research Report","labelTranslations":{},"name":"research report","order":7,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Cybersecurity in the Healthcare Industry: Actionable Intelligence for an Active Threat Landscape","url":"https://www.trustwave.com/en-us/resources/library/documents/cybersecurity-in-the-healthcare-industry-actionable-intelligence-for-an-active-threat-landscape/ "},{"hs_child_table_id":0,"hs_created_at":1734721304149,"hs_deleted_at":0,"hs_id":184128305832,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304149,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Imported%20images/gdpr-what-apac-businesses-need-to-know.jpg","altText":"","fileId":163895014209,"height":490,"type":"image","width":870},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1731443056321,"createdByUserId":60505637,"id":15,"isHubspotDefined":false,"label":"Compliance","labelTranslations":{},"name":"compliance","order":1,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"GDPR: What APAC Businesses Need to Know","url":"https://www.trustwave.com/en-us/resources/library/webinars/gdpr-what-apac-businesses-need-to-know/"},{"hs_child_table_id":0,"hs_created_at":1734721304148,"hs_deleted_at":0,"hs_id":184128305831,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304148,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/you-cant-afford-not-to-address-data-protection-cover-1.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":5,"isHubspotDefined":false,"label":"Infographic","labelTranslations":{},"name":"infographic","order":6,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"You Can't Afford Not to Address Data Protection","url":"https://www.trustwave.com/en-us/resources/library/documents/you-cant-afford-not-to-address-data-protection/"},{"hs_child_table_id":0,"hs_created_at":1734721304147,"hs_deleted_at":0,"hs_id":184128305830,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304147,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/solutions-for-microsoft-security-services_cover-1.png","altText":"","fileId":163755430755,"height":544,"type":"image","width":420},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":18,"isHubspotDefined":false,"label":"Microsoft","labelTranslations":{},"name":"microsoft","order":8,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave Threat Detection & Response Services for Microsoft","url":"https://www.trustwave.com/es-us/resources/library/documents/trustwave-threat-detection-and-response-services-for-microsoft/"},{"hs_child_table_id":0,"hs_created_at":1734721304146,"hs_deleted_at":0,"hs_id":184128305829,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304146,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/mvs-offering-overview-cover-image-1.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave Managed Vulnerability Scanning","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-vulnerability-scanning/"},{"hs_child_table_id":0,"hs_created_at":1734721304145,"hs_deleted_at":0,"hs_id":184128305828,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304145,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/webmarshal-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave WebMarshal","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-webmarshal/"},{"hs_child_table_id":0,"hs_created_at":1734721304144,"hs_deleted_at":0,"hs_id":184128305827,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304144,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/trustwave-secure-email-encryption_cover-1.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave Secure Email Encryption","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-secure-email-encryption/"},{"hs_child_table_id":0,"hs_created_at":1734721304143,"hs_deleted_at":0,"hs_id":184128305826,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304143,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/for-improved-data-security-burn-baby-burn_cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":6,"isHubspotDefined":false,"label":"Guide","labelTranslations":{},"name":"guide","order":5,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"For Improved Data Security, Burn, Baby, Burn","url":"https://www.trustwave.com/en-us/resources/library/documents/for-improved-data-security-burn-baby-burn/"},{"hs_child_table_id":0,"hs_created_at":1734721304142,"hs_deleted_at":0,"hs_id":184128305825,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304142,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/about-trustwave_cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"About Trustwave","url":"https://www.trustwave.com/en-us/resources/library/documents/about-trustwave/"},{"hs_child_table_id":0,"hs_created_at":1734721304141,"hs_deleted_at":0,"hs_id":184128305824,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304141,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/why-a-zero-trust-architecture-must-include-database-security_cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":6,"isHubspotDefined":false,"label":"Guide","labelTranslations":{},"name":"guide","order":5,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Why a Zero Trust Architecture Must Include Database Security","url":"https://www.trustwave.com/en-us/resources/library/documents/why-a-zero-trust-architecture-must-include-database-security/"},{"hs_child_table_id":0,"hs_created_at":1734721304140,"hs_deleted_at":0,"hs_id":184128305823,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304140,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/Captura%20de%20pantalla%202024-04-08%20105409.png","altText":"","fileId":163726503287,"height":786,"type":"image","width":608},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Certified Database Security Partner","url":"https://www.trustwave.com/en-us/resources/library/documents/certified-database-security-partner/"},{"hs_child_table_id":0,"hs_created_at":1734721304139,"hs_deleted_at":0,"hs_id":184128305822,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304139,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/99e09fffa669761a4c71219b9c334cc029afca2e.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":2,"isHubspotDefined":false,"label":"Analyst Report","labelTranslations":{},"name":"analyst report","order":0,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Frost Radar: Americas Managed and Professional Security Services, 2023","url":"https://www.trustwave.com/en-us/resources/library/documents/frost-radar-americas-managed-and-professional-security-services-2023/"},{"hs_child_table_id":0,"hs_created_at":1734721304138,"hs_deleted_at":0,"hs_id":184128305821,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304138,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/mailmarshal-btm_cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave MailMarshal Blended Threat Module","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-mailmarshal-blended-threat-module/"},{"hs_child_table_id":0,"hs_created_at":1734721304137,"hs_deleted_at":0,"hs_id":184128305820,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304137,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/ot-offering-overview-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"OT Security Maturity Diagnostic by Trustwave","url":"https://www.trustwave.com/en-us/resources/library/documents/ot-security-maturity-diagnostic-by-trustwave/"},{"hs_child_table_id":0,"hs_created_at":1734721304136,"hs_deleted_at":0,"hs_id":184128305819,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304136,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/mailmarshal-image-analyzer_cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave MailMarshal Image Analyzer","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-mailmarshal-image-analyzer/ "},{"hs_child_table_id":0,"hs_created_at":1734721304135,"hs_deleted_at":0,"hs_id":184128305818,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304135,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/mg-experts-attack-surface-cover.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":4,"isHubspotDefined":false,"label":"eBook","labelTranslations":{},"name":"ebook","order":3,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"8 Experts on the Myths of Attack Surface Management","url":"https://www.trustwave.com/en-us/resources/library/documents/8-experts-on-the-myths-of-attack-surface-management/"},{"hs_child_table_id":0,"hs_created_at":1734721304134,"hs_deleted_at":0,"hs_id":184128305817,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734726687970,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Imported%20images/database-security-best-practices.jpg","altText":"","fileId":163910148114,"height":490,"type":"image","width":870},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Database Security Best Practices","url":"https://www.trustwave.com/en-us/resources/library/webinars/database-security-best-practices/"},{"hs_child_table_id":0,"hs_created_at":1734721304133,"hs_deleted_at":0,"hs_id":184128305816,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304133,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/winningwarransomware-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":5,"isHubspotDefined":false,"label":"Infographic","labelTranslations":{},"name":"infographic","order":6,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"DFIR","labelTranslations":{},"name":"dfir","order":4,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Winning the War on Ransomware","url":"https://www.trustwave.com/en-us/resources/library/documents/winning-the-war-on-ransomware/"},{"hs_child_table_id":0,"hs_created_at":1734721304132,"hs_deleted_at":0,"hs_id":184128305815,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1739536325907,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/MailMarshal_Plus_M365_Cover.png","altText":"MailMarshal_Plus_M365_Cover","fileId":186125640262,"height":544,"type":"image","width":420},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":6,"isHubspotDefined":false,"label":"Guide","labelTranslations":{},"name":"guide","order":5,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":18,"isHubspotDefined":false,"label":"Microsoft","labelTranslations":{},"name":"microsoft","order":8,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Outlining the Benefits of Trustwave MailMarshal with Microsoft 365 Email","url":"https://www.trustwave.com/en-us/resources/library/documents/outlining-the-benefits-of-trustwave-mailmarshal-with-microsoft-365-email/"},{"hs_child_table_id":0,"hs_created_at":1734721304131,"hs_deleted_at":0,"hs_id":184128305814,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304131,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/5c144bd543a89123847debde5aef5ec8ab7d6e56.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Rapid Action Program by Trustwave","url":"https://www.trustwave.com/en-us/resources/library/documents/rapid-action-program-by-trustwave/"},{"hs_child_table_id":0,"hs_created_at":1734721304130,"hs_deleted_at":0,"hs_id":184128305813,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304130,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/5c144bd543a89123847debde5aef5ec8ab7d6e56%20(1).png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave SpiderLabs Advanced Continual Threat Hunting","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-spiderlabs-advanced-continual-threat-hunting/ "},{"hs_child_table_id":0,"hs_created_at":1734721304129,"hs_deleted_at":0,"hs_id":184128305812,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304129,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/6f7870b458540d18d39e29bfab5110443b689102.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":6,"isHubspotDefined":false,"label":"Guide","labelTranslations":{},"name":"guide","order":5,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":18,"isHubspotDefined":false,"label":"Microsoft","labelTranslations":{},"name":"microsoft","order":8,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Why Microsoft 365 Needs Additional Email Security","url":"https://www.trustwave.com/en-us/resources/library/documents/why-microsoft-365-needs-additional-email-security/"},{"hs_child_table_id":0,"hs_created_at":1734721304128,"hs_deleted_at":0,"hs_id":184128305811,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304128,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/trustwave-mailmarshal-faq-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":8,"isHubspotDefined":false,"label":"FAQ","labelTranslations":{},"name":"faq","order":4,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":18,"isHubspotDefined":false,"label":"Microsoft","labelTranslations":{},"name":"microsoft","order":8,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave MailMarshal FAQ: Covering Our Layered Approach, Complementing Microsoft 365, and More","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-mailmarshal-faq-covering-our-layered-approach-complementing-microsoft-365-and-more/"},{"hs_child_table_id":0,"hs_created_at":1734721304127,"hs_deleted_at":0,"hs_id":184128305810,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304127,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/layered-approach-is-crucial-for-effective-email-security-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":6,"isHubspotDefined":false,"label":"Guide","labelTranslations":{},"name":"guide","order":5,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Why a Layered Approach is Crucial for Effective Email Security","url":"https://www.trustwave.com/en-us/resources/library/documents/why-a-layered-approach-is-crucial-for-effective-email-security/"},{"hs_child_table_id":0,"hs_created_at":1734721304126,"hs_deleted_at":0,"hs_id":184128305809,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304126,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/casestudy-curtinuniversity_cover-1.png","altText":"","type":"image"},"industry":{"createdAt":1730396680025,"createdByUserId":60505637,"id":2,"isHubspotDefined":false,"label":"Education","labelTranslations":{},"name":"education","order":0,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"How Curtin University Partnered with Trustwave for Complete Cyber Insight and Response","url":"https://www.trustwave.com/en-us/resources/library/documents/how-curtin-university-partnered-with-trustwave-for-complete-cyber-insight-and-response/"},{"hs_child_table_id":0,"hs_created_at":1734721304125,"hs_deleted_at":0,"hs_id":184128305808,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304125,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/understanding-mssp-offerings-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":6,"isHubspotDefined":false,"label":"Guide","labelTranslations":{},"name":"guide","order":5,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":11,"isHubspotDefined":false,"label":"SIEM/SOC","labelTranslations":{},"name":"siem_soc","order":11,"type":"option","updatedAt":1731443103341,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Understanding Managed Security Service Provider Offerings","url":"https://www.trustwave.com/en-us/resources/library/documents/understanding-managed-security-service-provider-offerings/"},{"hs_child_table_id":0,"hs_created_at":1734721304124,"hs_deleted_at":0,"hs_id":184128305807,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304124,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/business-case-for-penetration-testing-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":6,"isHubspotDefined":false,"label":"Guide","labelTranslations":{},"name":"guide","order":5,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Making the Business Case for Pen Testing","url":"https://www.trustwave.com/en-us/resources/library/documents/making-the-business-case-for-pen-testing/"},{"hs_child_table_id":0,"hs_created_at":1734721304123,"hs_deleted_at":0,"hs_id":184128305806,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304123,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/what-mdr-is-and-why-you-need-it-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":6,"isHubspotDefined":false,"label":"Guide","labelTranslations":{},"name":"guide","order":5,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"What MDR Is and Why You Need It","url":"https://www.trustwave.com/en-us/resources/library/documents/what-mdr-is-and-why-you-need-it/"},{"hs_child_table_id":0,"hs_created_at":1734721304122,"hs_deleted_at":0,"hs_id":184128305805,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304122,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/penetration-testing-why-its-crucial-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":6,"isHubspotDefined":false,"label":"Guide","labelTranslations":{},"name":"guide","order":5,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Penetration Testing: What It Is and Why It’s Crucial to Enterprise Security","url":"https://www.trustwave.com/en-us/resources/library/documents/penetration-testing-what-it-is-and-why-its-crucial-to-enterprise-security/"},{"hs_child_table_id":0,"hs_created_at":1734721304121,"hs_deleted_at":0,"hs_id":184128305804,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304121,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/penetration-testing-new-ciso-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":6,"isHubspotDefined":false,"label":"Guide","labelTranslations":{},"name":"guide","order":5,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Why Penetration Testing Should Be At The Top of Any New CISO’s To-Do List","url":"https://www.trustwave.com/en-us/resources/library/documents/why-penetration-testing-should-be-at-the-top-of-any-new-cisos-to-do-list/ "},{"hs_child_table_id":0,"hs_created_at":1734721304120,"hs_deleted_at":0,"hs_id":184128305803,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304120,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/trustwave-difference-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":6,"isHubspotDefined":false,"label":"Guide","labelTranslations":{},"name":"guide","order":5,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"The Trustwave Difference: Your Trusted Partner in Cyber Security","url":"https://www.trustwave.com/en-us/resources/library/documents/the-trustwave-difference-your-trusted-partner-in-cyber-security/"},{"hs_child_table_id":0,"hs_created_at":1734721304119,"hs_deleted_at":0,"hs_id":184128305802,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304119,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/get-maximum-value-from-your-siem-cover-1.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":6,"isHubspotDefined":false,"label":"Guide","labelTranslations":{},"name":"guide","order":5,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":11,"isHubspotDefined":false,"label":"SIEM/SOC","labelTranslations":{},"name":"siem_soc","order":11,"type":"option","updatedAt":1731443103341,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Get Maximum Value from Your SIEM","url":"https://www.trustwave.com/en-us/resources/library/documents/get-maximum-value-from-your-siem/"},{"hs_child_table_id":0,"hs_created_at":1734721304118,"hs_deleted_at":0,"hs_id":184128305801,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304118,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/mailmarshal-sandbox-service_cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave MailMarshal Sandbox Service","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-mailmarshal-sandbox-service/"},{"hs_child_table_id":0,"hs_created_at":1734721304117,"hs_deleted_at":0,"hs_id":184128305800,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304117,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/appdetectivepro-and-dbprotect-licensing-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":9,"isHubspotDefined":false,"label":"Spec Sheet","labelTranslations":{},"name":"spec sheet","order":8,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"AppDetectivePRO & DbProtect Licensing","url":"https://www.trustwave.com/en-us/resources/library/documents/appdetectivepro-dbprotect-licensing/"},{"hs_child_table_id":0,"hs_created_at":1734721304116,"hs_deleted_at":0,"hs_id":184128305799,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304116,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/spiderlabs-enterprise-penetration-testing_cover-1.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave SpiderLabs Enterprise Penetration Testing","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-spiderlabs-enterprise-penetration-testing/ "},{"hs_child_table_id":0,"hs_created_at":1734721304115,"hs_deleted_at":0,"hs_id":184128305798,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304115,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/8-reasons-pentesting-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":6,"isHubspotDefined":false,"label":"Guide","labelTranslations":{},"name":"guide","order":5,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"8 Reasons to use a Programmatic Approach to Penetration Testing","url":"https://www.trustwave.com/en-us/resources/library/documents/8-reasons-to-use-a-programmatic-approach-to-penetration-testing/"},{"hs_child_table_id":0,"hs_created_at":1734721304114,"hs_deleted_at":0,"hs_id":184128305797,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304114,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/11-questions-to-ask-your-pentesting-service-provider-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":6,"isHubspotDefined":false,"label":"Guide","labelTranslations":{},"name":"guide","order":5,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"11 Questions To Ask Your Pentesting Service Provider","url":"https://www.trustwave.com/en-us/resources/library/documents/11-questions-to-ask-your-pentesting-service-provider/ "},{"hs_child_table_id":0,"hs_created_at":1734721304113,"hs_deleted_at":0,"hs_id":184128305796,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304113,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/co-managed-soc-service_cover-1.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":11,"isHubspotDefined":false,"label":"SIEM/SOC","labelTranslations":{},"name":"siem_soc","order":11,"type":"option","updatedAt":1731443103341,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave Co-Managed SOC","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-co-managed-soc/ "},{"hs_child_table_id":0,"hs_created_at":1734721304112,"hs_deleted_at":0,"hs_id":184128305795,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304112,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/mod-casestudy_cover.png","altText":"","type":"image"},"industry":{"createdAt":1730396680025,"createdByUserId":60505637,"id":3,"isHubspotDefined":false,"label":"Government","labelTranslations":{},"name":"government","order":2,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":15,"isHubspotDefined":false,"label":"Compliance","labelTranslations":{},"name":"compliance","order":1,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave’s Consulting and Professional Services Helps the UK Ministry of Defence Prepare to Defend Against a Cyberattack","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwaves-consulting-and-professional-services-helps-the-uk-ministry-of-defence-prepare-to-defend-against-a-cyberattack/ "},{"hs_child_table_id":0,"hs_created_at":1734721304111,"hs_deleted_at":0,"hs_id":184128305794,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304111,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/isg-managedsecurityservices-accounts-cover.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":2,"isHubspotDefined":false,"label":"Analyst Report","labelTranslations":{},"name":"analyst report","order":0,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"ISG Provider lens™: Cybersecurity - Solutions and Services: Managed Security Services - Large Accounts U.S.","url":"https://www.trustwave.com/en-us/resources/library/documents/isg-provider-lens-cybersecurity-solutions-and-services-managed-security-services-large-accounts/"},{"hs_child_table_id":0,"hs_created_at":1734721304110,"hs_deleted_at":0,"hs_id":184128305793,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304110,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/pentestcover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave SpiderLabs Testing","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-spiderlabs-testing/"},{"hs_child_table_id":0,"hs_created_at":1734721304109,"hs_deleted_at":0,"hs_id":184128305792,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304109,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/cyber-weapons-used-in-the-ukraine-russia-war-cover.png","altText":"","type":"image"},"industry":{"createdAt":1730396680025,"createdByUserId":60505637,"id":3,"isHubspotDefined":false,"label":"Government","labelTranslations":{},"name":"government","order":2,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Research Report","labelTranslations":{},"name":"research report","order":7,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Overview of the Cyber Weapons Used in the Ukraine - Russia War","url":"https://www.trustwave.com/en-us/resources/library/documents/overview-of-the-cyber-weapons-used-in-the-ukraine-russia-war/ "},{"hs_child_table_id":0,"hs_created_at":1734721304108,"hs_deleted_at":0,"hs_id":184128305791,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304108,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/cybersecurity-glossary-cover-tgs.png","altText":"","type":"image"},"industry":{"createdAt":1730396680025,"createdByUserId":60505637,"id":3,"isHubspotDefined":false,"label":"Government","labelTranslations":{},"name":"government","order":2,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":6,"isHubspotDefined":false,"label":"Guide","labelTranslations":{},"name":"guide","order":5,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave Government Solutions Cyber Glossary","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-government-solutions-cyber-glossary/ "},{"hs_child_table_id":0,"hs_created_at":1734721304107,"hs_deleted_at":0,"hs_id":184128305790,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304107,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/mailmarshal-suite_cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave MailMarshal Suite","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-mailmarshal-secure-email-gateway/"},{"hs_child_table_id":0,"hs_created_at":1734721304106,"hs_deleted_at":0,"hs_id":184128305789,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304106,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/cyberglossary-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":6,"isHubspotDefined":false,"label":"Guide","labelTranslations":{},"name":"guide","order":5,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave Cybersecurity Glossary 101","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-cybersecurity-glossary-101/"},{"hs_child_table_id":0,"hs_created_at":1734721304105,"hs_deleted_at":0,"hs_id":184128305788,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304105,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/mailmarshal-cloud_cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave MailMarshal Cloud","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-mailmarshal-cloud/"},{"hs_child_table_id":0,"hs_created_at":1734721304104,"hs_deleted_at":0,"hs_id":184128305787,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304104,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/mailmarshal-on-prem-hybrid-cloud-edition_cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave MailMarshal On-Prem & Hybrid Cloud Edition","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-mailmarshal-on-prem-and-hybrid-cloud-edition/ "},{"hs_child_table_id":0,"hs_created_at":1734721304103,"hs_deleted_at":0,"hs_id":184128305786,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304103,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/what-why-and-how-of-data-security-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":6,"isHubspotDefined":false,"label":"Guide","labelTranslations":{},"name":"guide","order":5,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"What, Why, and How of Data Security","url":"https://www.trustwave.com/en-us/resources/library/documents/what-why-and-how-of-data-security/ "},{"hs_child_table_id":0,"hs_created_at":1734721304102,"hs_deleted_at":0,"hs_id":184128305785,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304102,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/howmuchisyouridentiyworth_cover.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":5,"isHubspotDefined":false,"label":"Infographic","labelTranslations":{},"name":"infographic","order":6,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"Data Breach","labelTranslations":{},"name":"data_breach","order":2,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"How Much Is Your Identity Worth on the Dark Web?","url":"https://www.trustwave.com/en-us/resources/library/documents/how-much-is-your-identity-worth-on-the-dark-web/ "},{"hs_child_table_id":0,"hs_created_at":1734721304101,"hs_deleted_at":0,"hs_id":184128305784,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304101,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/8_experts_ebook_cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":4,"isHubspotDefined":false,"label":"eBook","labelTranslations":{},"name":"ebook","order":3,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"8 Experts on Achieving Better Supply Chain Security","url":"https://www.trustwave.com/en-us/resources/library/documents/8-experts-on-achieving-better-supply-chain-security/"},{"hs_child_table_id":0,"hs_created_at":1734721304100,"hs_deleted_at":0,"hs_id":184128305783,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304100,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/Web/Webinars/Honeypot-Threats-Social-Meta-BLANK-1.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Threat Briefing: How to Leverage Honeypots in an Era of Rapidly Evolving Threats","url":"https://www.trustwave.com/en-us/resources/library/webinars/threat-briefing-how-to-leverage-honeypots-in-an-era-of-rapidly-evolving-threats/ "},{"hs_child_table_id":0,"hs_created_at":1734721304099,"hs_deleted_at":0,"hs_id":184128305782,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304099,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/supply-chain-security-cover-1.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":9,"isHubspotDefined":false,"label":"Spec Sheet","labelTranslations":{},"name":"spec sheet","order":8,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Supply Chain Security","url":"https://www.trustwave.com/en-us/resources/library/documents/supply-chain-security/ "},{"hs_child_table_id":0,"hs_created_at":1734721304098,"hs_deleted_at":0,"hs_id":184128305781,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304098,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/supply-chain-ecosystem-of-risk-cover.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":5,"isHubspotDefined":false,"label":"Infographic","labelTranslations":{},"name":"infographic","order":6,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Ecosystem of Risk","url":"https://www.trustwave.com/en-us/resources/library/documents/ecosystem-of-risk/ "},{"hs_child_table_id":0,"hs_created_at":1734721304097,"hs_deleted_at":0,"hs_id":184128305780,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304097,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/idc-trustwave-introduces-elevated-crowdsourcing-to-the-mix-by-adding-security-colony-into-their-new-mdr-offerings-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":2,"isHubspotDefined":false,"label":"Analyst Report","labelTranslations":{},"name":"analyst report","order":0,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"IDC: Trustwave Introduces Elevated Crowdsourcing to the Mix by Adding Security Colony into their New MDR Offerings","url":"https://www.trustwave.com/en-us/resources/library/documents/idc-trustwave-introduces-elevated-crowdsourcing-to-the-mix-by-adding-security-colony-into-their-new-mdr-offerings/"},{"hs_child_table_id":0,"hs_created_at":1734721304096,"hs_deleted_at":0,"hs_id":184128305779,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304096,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/mdr-services-for-microsoft_cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":18,"isHubspotDefined":false,"label":"Microsoft","labelTranslations":{},"name":"microsoft","order":8,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave Managed Detection and Response Services for Microsoft","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-managed-detection-and-response-services-for-microsoft/"},{"hs_child_table_id":0,"hs_created_at":1734721304095,"hs_deleted_at":0,"hs_id":184128305778,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304095,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/mdr-services_cover-1.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave Managed Detection and Response","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-managed-detection-and-response/"},{"hs_child_table_id":0,"hs_created_at":1734721304094,"hs_deleted_at":0,"hs_id":184128305777,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304094,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/rapid-time-to-value-cover-1.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":4,"isHubspotDefined":false,"label":"eBook","labelTranslations":{},"name":"ebook","order":3,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Rapid Time-to-Value: Trustwave Security Services On-boarding","url":"https://www.trustwave.com/en-us/resources/library/documents/rapid-time-to-value-trustwave-security-services-on-boarding/"},{"hs_child_table_id":0,"hs_created_at":1734721304093,"hs_deleted_at":0,"hs_id":184128305776,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304093,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/6signsinfographic-instagram.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":6,"isHubspotDefined":false,"label":"Guide","labelTranslations":{},"name":"guide","order":5,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"6 Signs Your Email Gateway Might Need Replacing","url":"https://www.trustwave.com/en-us/resources/library/documents/6-signs-your-email-gateway-might-need-replacing/"},{"hs_child_table_id":0,"hs_created_at":1734721304092,"hs_deleted_at":0,"hs_id":184128305775,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304092,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/spiderlabs-cyberexpertise-cover-1.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":4,"isHubspotDefined":false,"label":"eBook","labelTranslations":{},"name":"ebook","order":3,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"DFIR","labelTranslations":{},"name":"dfir","order":4,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave SpiderLabs","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-spiderlabs-ebook/"},{"hs_child_table_id":0,"hs_created_at":1734721304091,"hs_deleted_at":0,"hs_id":184128305774,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304091,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/augmedix-casestudy_cover.png","altText":"","type":"image"},"industry":{"createdAt":1730396680025,"createdByUserId":60505637,"id":1,"isHubspotDefined":false,"label":"Healthcare","labelTranslations":{},"name":"healthcare","order":3,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"How Augmedix Uses Trustwave MDR to Protect Vital Personal Healthcare Information","url":"https://www.trustwave.com/en-us/resources/library/documents/how-augmedix-uses-trustwave-mdr-to-protect-vital-personal-healthcare-information/ "},{"hs_child_table_id":0,"hs_created_at":1734721304090,"hs_deleted_at":0,"hs_id":184128305773,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304090,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/how-one-manufacturer-is-managing-risk-in-a-connected-world_cover.png","altText":"","type":"image"},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":7,"isHubspotDefined":false,"label":"Manufacturing","labelTranslations":{},"name":"manufacturing","order":6,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"How One Manufacturer is Managing Risk in a Connected World","url":"https://www.trustwave.com/en-us/resources/library/documents/how-one-manufacturer-is-managing-risk-in-a-connected-world/ "},{"hs_child_table_id":0,"hs_created_at":1734721304089,"hs_deleted_at":0,"hs_id":184128305772,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304089,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/prescription-for-cyber-resilience_cover-2.png","altText":"","type":"image"},"industry":{"createdAt":1730396680025,"createdByUserId":60505637,"id":1,"isHubspotDefined":false,"label":"Healthcare","labelTranslations":{},"name":"healthcare","order":3,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"DFIR","labelTranslations":{},"name":"dfir","order":4,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Incident Preparedness Case Study in Healthcare","url":"https://www.trustwave.com/en-us/resources/library/documents/incident-preparedness-case-study-in-healthcare/"},{"hs_child_table_id":0,"hs_created_at":1734721304088,"hs_deleted_at":0,"hs_id":184128305771,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304088,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/mvra_cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":6,"isHubspotDefined":false,"label":"Guide","labelTranslations":{},"name":"guide","order":5,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Managed Vendor Risk Assessment","url":"https://www.trustwave.com/en-us/resources/library/documents/managed-vendor-risk-assessment/"},{"hs_child_table_id":0,"hs_created_at":1734721304087,"hs_deleted_at":0,"hs_id":184128305770,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304087,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/ransomware-preparedness-service-summary-sheet_tdubs-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"DFIR","labelTranslations":{},"name":"dfir","order":4,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Ransomware Preparedness Service","url":"https://www.trustwave.com/en-us/resources/library/documents/ransomware-preparedness-service/ "},{"hs_child_table_id":0,"hs_created_at":1734721304086,"hs_deleted_at":0,"hs_id":184128305769,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1738596106169,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/DORA_Maturity_Accelerator_Cover.png","altText":"DORA_Maturity_Accelerator_Cover","fileId":185617301654,"height":544,"type":"image","width":420},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":4,"isHubspotDefined":false,"label":"Financial Services","labelTranslations":{},"name":"financial_services","order":1,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1731443056321,"createdByUserId":60505637,"id":15,"isHubspotDefined":false,"label":"Compliance","labelTranslations":{},"name":"compliance","order":1,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave DORA Maturity Accelerator","url":"https://www.trustwave.com/en-us/resources/library/documents/digital-operational-resilience-act-dora-trustwave/"},{"hs_child_table_id":0,"hs_created_at":1734721304085,"hs_deleted_at":0,"hs_id":184128305768,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304085,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/schrems-ii-judgement-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":15,"isHubspotDefined":false,"label":"Compliance","labelTranslations":{},"name":"compliance","order":1,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Schrems II Judgement","url":"https://www.trustwave.com/en-us/resources/library/documents/schrems-ii-judgement/"},{"hs_child_table_id":0,"hs_created_at":1734721304084,"hs_deleted_at":0,"hs_id":184128305767,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304084,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/5benefitsremotetesting-covoer.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":5,"isHubspotDefined":false,"label":"Infographic","labelTranslations":{},"name":"infographic","order":6,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"5 Benefits of Remote Penetration Testing","url":"https://www.trustwave.com/en-us/resources/library/documents/5-benefits-of-remote-penetration-testing/"},{"hs_child_table_id":0,"hs_created_at":1734721304083,"hs_deleted_at":0,"hs_id":184128305766,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304083,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/securing-databases-and-complying-with-executive-order-14028-cover-1.png","altText":"","type":"image"},"industry":{"createdAt":1730396680025,"createdByUserId":60505637,"id":3,"isHubspotDefined":false,"label":"Government","labelTranslations":{},"name":"government","order":2,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":10,"isHubspotDefined":false,"label":"White Paper","labelTranslations":{},"name":"white paper","order":9,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":15,"isHubspotDefined":false,"label":"Compliance","labelTranslations":{},"name":"compliance","order":1,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Securing Databases and Complying With Executive Order 14028","url":"https://www.trustwave.com/en-us/resources/library/documents/securing-databases-and-complying-with-executive-order-14028/ "},{"hs_child_table_id":0,"hs_created_at":1734721304082,"hs_deleted_at":0,"hs_id":184128305765,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304082,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/2021-spiderlabs-telemetry-report-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Research Report","labelTranslations":{},"name":"research report","order":7,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"2021 Trustwave SpiderLabs Telemetry Report","url":"https://www.trustwave.com/en-us/resources/library/documents/2021-trustwave-spiderlabs-telemetry-report/ "},{"hs_child_table_id":0,"hs_created_at":1734721304081,"hs_deleted_at":0,"hs_id":184128305764,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304081,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/7expertscyber-cover.png","altText":"","type":"image"},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":4,"isHubspotDefined":false,"label":"Financial Services","labelTranslations":{},"name":"financial_services","order":1,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":4,"isHubspotDefined":false,"label":"eBook","labelTranslations":{},"name":"ebook","order":3,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"DFIR","labelTranslations":{},"name":"dfir","order":4,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"7 Experts on Building and Maintaining Cyber Resilience","url":"https://www.trustwave.com/en-us/resources/library/documents/7-experts-on-building-and-maintaining-cyber-resilience/ "},{"hs_child_table_id":0,"hs_created_at":1734721304080,"hs_deleted_at":0,"hs_id":184128305763,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304080,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/18153_10-principles-of-database-security-program-design-cover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":10,"isHubspotDefined":false,"label":"White Paper","labelTranslations":{},"name":"white paper","order":9,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"10 Principles of Database Security Program Design","url":"https://www.trustwave.com/en-us/resources/library/documents/10-principles-of-database-security-program-design/ "},{"hs_child_table_id":0,"hs_created_at":1734721304079,"hs_deleted_at":0,"hs_id":184128305762,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304079,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/managed-security-and-compliance-services_cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":15,"isHubspotDefined":false,"label":"Compliance","labelTranslations":{},"name":"compliance","order":1,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave Managed Security and Compliance (MSC) Service","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-managed-security-and-compliance-msc-service/"},{"hs_child_table_id":0,"hs_created_at":1734721304078,"hs_deleted_at":0,"hs_id":184128305761,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304078,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/csi-thumbnail.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"DFIR","labelTranslations":{},"name":"dfir","order":4,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave Cyber Security Institute","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-cyber-security-institute/ "},{"hs_child_table_id":0,"hs_created_at":1734721304077,"hs_deleted_at":0,"hs_id":184128305760,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304077,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/2021-network-security-report-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Research Report","labelTranslations":{},"name":"research report","order":7,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"2021 Network Security Report","url":"https://www.trustwave.com/en-us/resources/library/documents/2021-network-security-report/ "},{"hs_child_table_id":0,"hs_created_at":1734721304076,"hs_deleted_at":0,"hs_id":184128305759,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304076,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/database-security-zero-trust-cover%20(1).png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":10,"isHubspotDefined":false,"label":"White Paper","labelTranslations":{},"name":"white paper","order":9,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Database Security in a Zero Trust Architecture","url":"https://www.trustwave.com/en-us/resources/library/documents/database-security-in-a-zero-trust-architecture/ "},{"hs_child_table_id":0,"hs_created_at":1734721304075,"hs_deleted_at":0,"hs_id":184128305758,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304075,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/2021-email-security-report-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Research Report","labelTranslations":{},"name":"research report","order":7,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"2021 Email Threat Report","url":"https://www.trustwave.com/en-us/resources/library/documents/2021-email-threat-report/ "},{"hs_child_table_id":0,"hs_created_at":1734721304074,"hs_deleted_at":0,"hs_id":184128305757,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304074,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/trustwave_og-pa-cover.png","altText":"","type":"image"},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Energy","labelTranslations":{},"name":"energy","order":7,"type":"option","updatedAt":1734701670779,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"U.K. Billion-Dollar Oil Enterprise Establishes a Safer Network with a Next Generation Security System Powered by Trustwave","url":"https://www.trustwave.com/en-us/resources/library/documents/uk-oil-enterprise-establishes-safer-network-with-next-generation-security/"},{"hs_child_table_id":0,"hs_created_at":1734721304073,"hs_deleted_at":0,"hs_id":184128305756,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304073,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/banking-on-trust_cover.png","altText":"","type":"image"},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":4,"isHubspotDefined":false,"label":"Financial Services","labelTranslations":{},"name":"financial_services","order":1,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"DFIR","labelTranslations":{},"name":"dfir","order":4,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Banking on Trust","url":"https://www.trustwave.com/en-us/resources/library/documents/banking-on-trust/ "},{"hs_child_table_id":0,"hs_created_at":1734721304072,"hs_deleted_at":0,"hs_id":184128305755,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304072,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/the-underground-economy-2-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":4,"isHubspotDefined":false,"label":"eBook","labelTranslations":{},"name":"ebook","order":3,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"The Dark Web & the rise of sophisticated attacks","url":"https://www.trustwave.com/en-us/resources/library/documents/the-underground-economy-part-2/ "},{"hs_child_table_id":0,"hs_created_at":1734721304071,"hs_deleted_at":0,"hs_id":184128305754,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304071,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/in-out-and-around-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":10,"isHubspotDefined":false,"label":"White Paper","labelTranslations":{},"name":"white paper","order":9,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":18,"isHubspotDefined":false,"label":"Microsoft","labelTranslations":{},"name":"microsoft","order":8,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"In, Out and Around: 360° Security for Microsoft 365","url":"https://www.trustwave.com/en-us/resources/library/documents/in-out-and-around-360-security-for-office-365/ "},{"hs_child_table_id":0,"hs_created_at":1734721304070,"hs_deleted_at":0,"hs_id":184128305753,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304070,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/do-not-disturb_cover.png","altText":"","type":"image"},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":5,"isHubspotDefined":false,"label":"Hospitality","labelTranslations":{},"name":"hospitality","order":4,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Do Not Disturb! Blocking Email Threats at the Door","url":"https://www.trustwave.com/en-us/resources/library/documents/do-not-disturb-blocking-email-threats-at-the-door/"},{"hs_child_table_id":0,"hs_created_at":1734721304069,"hs_deleted_at":0,"hs_id":184128305752,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304069,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/mailmarshal-spe_cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave MailMarshal Service Provider Edition","url":"https://www.trustwave.com/en-us/resources/library/documents/secure-email-gateway-service-provider-edition/ "},{"hs_child_table_id":0,"hs_created_at":1734721304068,"hs_deleted_at":0,"hs_id":184128305751,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304068,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/avoiding-business-email-compromise_cover.png","altText":"","type":"image"},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":7,"isHubspotDefined":false,"label":"Manufacturing","labelTranslations":{},"name":"manufacturing","order":6,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Avoiding Business Email Compromise","url":"https://www.trustwave.com/en-us/resources/library/documents/avoiding-business-email-compromise/ "},{"hs_child_table_id":0,"hs_created_at":1734721304067,"hs_deleted_at":0,"hs_id":184128305750,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304067,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/mtdr-infographic-2021-cover-2.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":5,"isHubspotDefined":false,"label":"Infographic","labelTranslations":{},"name":"infographic","order":6,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Managed Detection and Response: See How the Numbers Add Up","url":"https://www.trustwave.com/en-us/resources/library/documents/managed-threat-detection-and-response-see-how-the-numbers-add-up/ "},{"hs_child_table_id":0,"hs_created_at":1734721304066,"hs_deleted_at":0,"hs_id":184128305749,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304066,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/qrg-penetration-testing-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":6,"isHubspotDefined":false,"label":"Guide","labelTranslations":{},"name":"guide","order":5,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Quick Reference Guide: Penetration Testing","url":"https://www.trustwave.com/en-us/resources/library/documents/quick-reference-guide-penetration-testing/ "},{"hs_child_table_id":0,"hs_created_at":1734721304065,"hs_deleted_at":0,"hs_id":184128305748,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304065,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/findingcureswellingcyberthreats_cover.png","altText":"","type":"image"},"industry":{"createdAt":1730396680025,"createdByUserId":60505637,"id":1,"isHubspotDefined":false,"label":"Healthcare","labelTranslations":{},"name":"healthcare","order":3,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Finding the Cure for Swelling Cyber Threats","url":"https://www.trustwave.com/en-us/resources/library/documents/finding-the-cure-for-swelling-cyber-threats/ "},{"hs_child_table_id":0,"hs_created_at":1734721304064,"hs_deleted_at":0,"hs_id":184128305747,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304064,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/solarwinds-vuln-fact-sheet-cover-1.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":8,"isHubspotDefined":false,"label":"FAQ","labelTranslations":{},"name":"faq","order":4,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"Data Breach","labelTranslations":{},"name":"data_breach","order":2,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"New Vulnerabilities Discovered in SolarWinds Products by Trustwave SpiderLabs","url":"https://www.trustwave.com/en-us/resources/library/documents/new-vulnerabilities-discovered-in-solarwinds-products-by-trustwave-spiderlabs/ "},{"hs_child_table_id":0,"hs_created_at":1734721304063,"hs_deleted_at":0,"hs_id":184128305746,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304063,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/casestudy_cover-1.png","altText":"","type":"image"},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":7,"isHubspotDefined":false,"label":"Manufacturing","labelTranslations":{},"name":"manufacturing","order":6,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":15,"isHubspotDefined":false,"label":"Compliance","labelTranslations":{},"name":"compliance","order":1,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"DFIR","labelTranslations":{},"name":"dfir","order":4,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"A Night Vision Equipment Company Stalks its Invisible Enemies","url":"https://www.trustwave.com/en-us/resources/library/documents/a-night-vision-equipment-company-stalks-its-invisible-enemies/ "},{"hs_child_table_id":0,"hs_created_at":1734721304062,"hs_deleted_at":0,"hs_id":184128305745,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304062,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/making-the-shift-to-proactive-security-with-mdr-services_cover-1.png","altText":"","type":"image"},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":7,"isHubspotDefined":false,"label":"Manufacturing","labelTranslations":{},"name":"manufacturing","order":6,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Making the Shift to Proactive Security with MDR Services","url":"https://www.trustwave.com/en-us/resources/library/documents/making-the-shift-to-proactive-security-with-mdr-services/ "},{"hs_child_table_id":0,"hs_created_at":1734721304061,"hs_deleted_at":0,"hs_id":184128305744,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304061,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/guide-to-budgeting-for-mdr-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":10,"isHubspotDefined":false,"label":"White Paper","labelTranslations":{},"name":"white paper","order":9,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"An Executive's Guide to Budgeting for Managed Detection and Response","url":"https://www.trustwave.com/en-us/resources/library/documents/an-executives-guide-to-budgeting-for-managed-detection-and-response/ "},{"hs_child_table_id":0,"hs_created_at":1734721304060,"hs_deleted_at":0,"hs_id":184128305743,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304060,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/raising-the-bar_cover.png","altText":"","type":"image"},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":11,"isHubspotDefined":false,"label":"Technology","labelTranslations":{},"name":"technology","order":10,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Raising the Bar for Comprehensive Security Assessments","url":"https://www.trustwave.com/en-us/resources/library/documents/raising-the-bar/ "},{"hs_child_table_id":0,"hs_created_at":1734721304059,"hs_deleted_at":0,"hs_id":184128305742,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304059,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/serving-up-reliable-security_cover.png","altText":"","type":"image"},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":5,"isHubspotDefined":false,"label":"Hospitality","labelTranslations":{},"name":"hospitality","order":4,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"Data Breach","labelTranslations":{},"name":"data_breach","order":2,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Serving Up Reliable Security for a Restaurant Franchise","url":"https://www.trustwave.com/en-us/resources/library/documents/serving-up-reliable-security-for-a-restaurant-franchise/ "},{"hs_child_table_id":0,"hs_created_at":1734721304058,"hs_deleted_at":0,"hs_id":184128305741,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304058,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/trustwave-2020-brochure-cover-1.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":6,"isHubspotDefined":false,"label":"Guide","labelTranslations":{},"name":"guide","order":5,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave Corporate Brochure","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-corporate-brochure/ "},{"hs_child_table_id":0,"hs_created_at":1734721304057,"hs_deleted_at":0,"hs_id":184128305740,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304057,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/segu2d-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":6,"isHubspotDefined":false,"label":"Guide","labelTranslations":{},"name":"guide","order":5,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"The Importance of Keeping Your Secure Email Gateway On-Premise Up-to-Date","url":"https://www.trustwave.com/en-us/resources/library/documents/the-importance-of-keeping-your-secure-email-gateway-on-premise-up-to-date/ "},{"hs_child_table_id":0,"hs_created_at":1734721304056,"hs_deleted_at":0,"hs_id":184128305739,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304056,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/2020-data-security-cover-1.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Research Report","labelTranslations":{},"name":"research report","order":7,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"2020 Trustwave Data Security Index","url":"https://www.trustwave.com/en-us/resources/library/documents/2020-trustwave-data-security-index/ "},{"hs_child_table_id":0,"hs_created_at":1734721304055,"hs_deleted_at":0,"hs_id":184128305738,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304055,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/minimizecybersecurityskillsshortage-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":10,"isHubspotDefined":false,"label":"White Paper","labelTranslations":{},"name":"white paper","order":9,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"How To Minimize the Impact of the Cybersecurity Skills Shortage","url":"https://www.trustwave.com/en-us/resources/library/documents/how-to-minimize-the-impact-of-the-cybersecurity-skills-shortage/ "},{"hs_child_table_id":0,"hs_created_at":1734721304054,"hs_deleted_at":0,"hs_id":184128305737,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304054,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/mg-tdr-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":4,"isHubspotDefined":false,"label":"eBook","labelTranslations":{},"name":"ebook","order":3,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"7 Experts on Transforming Your Threat Detection & Response Strategy","url":"https://www.trustwave.com/en-us/resources/library/documents/7-experts-on-transforming-your-threat-detection-response-strategy/ "},{"hs_child_table_id":0,"hs_created_at":1734721304053,"hs_deleted_at":0,"hs_id":184128305736,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304053,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/co-managed-soc-services-for-microsoft-azure-sentinel_2022_cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":11,"isHubspotDefined":false,"label":"SIEM/SOC","labelTranslations":{},"name":"siem_soc","order":11,"type":"option","updatedAt":1731443103341,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":18,"isHubspotDefined":false,"label":"Microsoft","labelTranslations":{},"name":"microsoft","order":8,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave Co-Managed SOC Services for Microsoft Azure Sentinel","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-threat-detection-and-response-services-for-microsoft-azure/ "},{"hs_child_table_id":0,"hs_created_at":1734721304052,"hs_deleted_at":0,"hs_id":184128305735,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304052,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/five-ways-attackers-get-to-databases-cover-1.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":5,"isHubspotDefined":false,"label":"Infographic","labelTranslations":{},"name":"infographic","order":6,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Five Ways Attackers Get To Databases","url":"https://www.trustwave.com/en-us/resources/library/documents/five-ways-attackers-get-to-databases/ "},{"hs_child_table_id":0,"hs_created_at":1734721304051,"hs_deleted_at":0,"hs_id":184128305734,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304051,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/proactive_threat_hunting_2022_cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave Proactive Threat Hunting","url":"https://www.trustwave.com/en-us/resources/library/documents/proactive-threat-hunting/"},{"hs_child_table_id":0,"hs_created_at":1734721304050,"hs_deleted_at":0,"hs_id":184128305733,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304050,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/the-threat-hunt-that-uncovered-novel-malware_cover.png","altText":"","type":"image"},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":11,"isHubspotDefined":false,"label":"Technology","labelTranslations":{},"name":"technology","order":10,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"The Threat Hunt That Uncovered Novel Malware","url":"https://www.trustwave.com/en-us/resources/library/documents/the-threat-hunt-that-uncovered-novel-malware/ "},{"hs_child_table_id":0,"hs_created_at":1734721304049,"hs_deleted_at":0,"hs_id":184128305732,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304049,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/security_technology_management_2022_cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Security Technology Management","url":"https://www.trustwave.com/en-us/resources/library/documents/security-technology-management/"},{"hs_child_table_id":0,"hs_created_at":1734721304048,"hs_deleted_at":0,"hs_id":184128305731,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304048,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/threat-detection-and-response-consulting_cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Threat Detection and Response Consulting (TDR Consulting)","url":"https://www.trustwave.com/en-us/resources/library/documents/threat-detection-and-response-consulting/"},{"hs_child_table_id":0,"hs_created_at":1734721304047,"hs_deleted_at":0,"hs_id":184128305730,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304047,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/dbprotect_2022_cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave DbProtect","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-dbprotect/ "},{"hs_child_table_id":0,"hs_created_at":1734721304046,"hs_deleted_at":0,"hs_id":184128305729,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304046,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/managed-database-security_cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave Managed Database Security","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-managed-database-security/ "},{"hs_child_table_id":0,"hs_created_at":1734721304045,"hs_deleted_at":0,"hs_id":184128305728,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304045,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/covid-19-insight-the-telco-security-alliance-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Research Report","labelTranslations":{},"name":"research report","order":7,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"COVID-19 Insight from the Telco Security Alliance","url":"https://www.trustwave.com/en-us/resources/library/documents/covid-19-insight-from-the-telco-security-alliance/"},{"hs_child_table_id":0,"hs_created_at":1734721304044,"hs_deleted_at":0,"hs_id":184128305727,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304044,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/the-golden-tax-department-and-emergence-of-goldenspy-malware.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Research Report","labelTranslations":{},"name":"research report","order":7,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"DFIR","labelTranslations":{},"name":"dfir","order":4,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"The Golden Tax Department and Emergence of GoldenSpy Malware","url":"https://www.trustwave.com/en-us/resources/library/documents/the-golden-tax-department-and-emergence-of-goldenspy-malware/ "},{"hs_child_table_id":0,"hs_created_at":1734721304043,"hs_deleted_at":0,"hs_id":184128305726,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304043,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/database-risk-assessment_cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Database Risk Assessment Service","url":"https://www.trustwave.com/en-us/resources/library/documents/database-risk-assessment-service/ "},{"hs_child_table_id":0,"hs_created_at":1734721304042,"hs_deleted_at":0,"hs_id":184128305725,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304042,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/best-practice-approach-in-healthcare-cover.png","altText":"","type":"image"},"industry":{"createdAt":1730396680025,"createdByUserId":60505637,"id":1,"isHubspotDefined":false,"label":"Healthcare","labelTranslations":{},"name":"healthcare","order":3,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Crisis Management: A Best Practice Approach in Healthcare","url":"https://www.trustwave.com/en-us/resources/library/documents/crisis-management-a-best-practice-approach-in-healthcare/ "},{"hs_child_table_id":0,"hs_created_at":1734721304041,"hs_deleted_at":0,"hs_id":184128305724,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304041,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/dbprotect-activity-monitoring_copver.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave DbProtect Activity Monitoring Module","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-dbprotect-activity-monitoring-module/ "},{"hs_child_table_id":0,"hs_created_at":1734721304040,"hs_deleted_at":0,"hs_id":184128305723,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304040,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/dbprotect-vulnerability-management_cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave DbProtect Vulnerability Management Module","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-dbprotect-vulnerability-management-module/ "},{"hs_child_table_id":0,"hs_created_at":1734721304039,"hs_deleted_at":0,"hs_id":184128305722,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304039,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/dbprotect-rights-management_cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave DbProtect Rights Management Module","url":"https://www.trustwave.com/en-us/resources/library/documents/dbprotect-rights-management-module/"},{"hs_child_table_id":0,"hs_created_at":1734721304038,"hs_deleted_at":0,"hs_id":184128305721,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304038,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/once-future-cover-image.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":4,"isHubspotDefined":false,"label":"eBook","labelTranslations":{},"name":"ebook","order":3,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Once and Future Threats: What Security Testing Is and Will Be","url":"https://www.trustwave.com/en-us/resources/library/documents/once-and-future-threats-what-security-testing-is-and-will-be/ "},{"hs_child_table_id":0,"hs_created_at":1734721304037,"hs_deleted_at":0,"hs_id":184128305720,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304037,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/customer-faq-tvm-migration-from-trustkeeper-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":8,"isHubspotDefined":false,"label":"FAQ","labelTranslations":{},"name":"faq","order":4,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave Vulnerability Management is moving to the Trustwave Fusion platform","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-threat-and-vulnerability-service-is-moving-to-trustwave-fusion-platform/ "},{"hs_child_table_id":0,"hs_created_at":1734721304036,"hs_deleted_at":0,"hs_id":184128305719,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304036,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/gsr2020-cover-image.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Research Report","labelTranslations":{},"name":"research report","order":7,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"2020 Trustwave Global Security Report","url":"https://www.trustwave.com/en-us/resources/library/documents/2020-trustwave-global-security-report/ "},{"hs_child_table_id":0,"hs_created_at":1734721304035,"hs_deleted_at":0,"hs_id":184128305718,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304035,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/appdetectivepro-evaluation-guide_cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":6,"isHubspotDefined":false,"label":"Guide","labelTranslations":{},"name":"guide","order":5,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"AppDetectivePRO Evaluation Guide","url":"https://www.trustwave.com/en-us/resources/library/documents/appdetectivepro-evaluation-guide/"},{"hs_child_table_id":0,"hs_created_at":1734721304034,"hs_deleted_at":0,"hs_id":184128305717,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304034,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/appdetectivepro_scanning_faq-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":8,"isHubspotDefined":false,"label":"FAQ","labelTranslations":{},"name":"faq","order":4,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Scanning in AppDetectivePRO: Frequently Asked Questions","url":"https://www.trustwave.com/en-us/resources/library/documents/scanning-in-appdetectivepro-frequently-asked-questions/ "},{"hs_child_table_id":0,"hs_created_at":1734721304033,"hs_deleted_at":0,"hs_id":184128305716,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304033,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/mst-customer-faq-trustkeeperps-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":8,"isHubspotDefined":false,"label":"FAQ","labelTranslations":{},"name":"faq","order":4,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"FAQ - Managed Security Testing Services Migration to Trustwave Fusion Platform","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-fusion-platform-faq/ "},{"hs_child_table_id":0,"hs_created_at":1734721304032,"hs_deleted_at":0,"hs_id":184128305715,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304032,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/ddos-report-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Research Report","labelTranslations":{},"name":"research report","order":7,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Global DDoS Threat Report","url":"https://www.trustwave.com/en-us/resources/library/documents/global-ddos-threat-report/ "},{"hs_child_table_id":0,"hs_created_at":1734721304031,"hs_deleted_at":0,"hs_id":184128305714,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304031,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/tw-global-security-report-video-cover.png","altText":"","fileId":163901998726,"height":1248,"type":"image","width":1690},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"Data Breach","labelTranslations":{},"name":"data_breach","order":2,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Cyber Security Awareness: Tips to Educate Employees on Data Security","url":"https://www.trustwave.com/en-us/resources/library/webinars/cyber-security-awareness-tips-to-educate-employees-on-data-security/ "},{"hs_child_table_id":0,"hs_created_at":1734721304030,"hs_deleted_at":0,"hs_id":184128305713,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304030,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/ddos-infographic-tw-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":5,"isHubspotDefined":false,"label":"Infographic","labelTranslations":{},"name":"infographic","order":6,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Anatomy of a DDoS Attack","url":"https://www.trustwave.com/en-us/resources/library/documents/anatomy-of-a-ddos-attack/ "},{"hs_child_table_id":0,"hs_created_at":1734721304029,"hs_deleted_at":0,"hs_id":184128305712,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304029,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/appdetectivepro_2022_cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave AppDetectivePRO","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-appdetectivepro/"},{"hs_child_table_id":0,"hs_created_at":1734721304028,"hs_deleted_at":0,"hs_id":184128305711,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304028,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/cyber-security-in-government-trustwave-cover-2.png","altText":"","type":"image"},"industry":{"createdAt":1730396680025,"createdByUserId":60505637,"id":3,"isHubspotDefined":false,"label":"Government","labelTranslations":{},"name":"government","order":2,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":10,"isHubspotDefined":false,"label":"White Paper","labelTranslations":{},"name":"white paper","order":9,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Cybersecurity in Government","url":"https://www.trustwave.com/en-us/resources/library/documents/cybersecurity-in-government/ "},{"hs_child_table_id":0,"hs_created_at":1734721304027,"hs_deleted_at":0,"hs_id":184128305710,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304027,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/economies-of-database-scale-achieved_cover.png","altText":"","type":"image"},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":4,"isHubspotDefined":false,"label":"Financial Services","labelTranslations":{},"name":"financial_services","order":1,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Economies of Database Scale Achieved","url":"https://www.trustwave.com/en-us/resources/library/documents/economies-of-database-scale-achieved/ "},{"hs_child_table_id":0,"hs_created_at":1734721304026,"hs_deleted_at":0,"hs_id":184128305709,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304026,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/seven-steps-to-cost-effective-hipaa-compliance-cover.png","altText":"","type":"image"},"industry":{"createdAt":1730396680025,"createdByUserId":60505637,"id":1,"isHubspotDefined":false,"label":"Healthcare","labelTranslations":{},"name":"healthcare","order":3,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":6,"isHubspotDefined":false,"label":"Guide","labelTranslations":{},"name":"guide","order":5,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1731443056321,"createdByUserId":60505637,"id":15,"isHubspotDefined":false,"label":"Compliance","labelTranslations":{},"name":"compliance","order":1,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Seven Step to Cost-Effective HIPAA Compliance","url":"https://www.trustwave.com/en-us/resources/library/documents/seven-steps-to-cost-effective-hipaa-compliance/ "},{"hs_child_table_id":0,"hs_created_at":1734721304025,"hs_deleted_at":0,"hs_id":184128305708,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304025,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/tsa-10keyinsights-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":5,"isHubspotDefined":false,"label":"Infographic","labelTranslations":{},"name":"infographic","order":6,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"The Global Telco Security Alliance's 10 Essential Cybersecurity Tips for Businesses","url":"https://www.trustwave.com/en-us/resources/library/documents/the-global-telco-security-alliances-10-essential-cybersecurity-tips-for-businesses/ "},{"hs_child_table_id":0,"hs_created_at":1734721304024,"hs_deleted_at":0,"hs_id":184128305707,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304024,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/spiderlabs-penetration-testing-services-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave SpiderLabs Penetration Testing Services","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-spiderlabs-penetration-testing-services/ "},{"hs_child_table_id":0,"hs_created_at":1734721304023,"hs_deleted_at":0,"hs_id":184128305706,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304023,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/trustwave-fusion-platform_cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":11,"isHubspotDefined":false,"label":"SIEM/SOC","labelTranslations":{},"name":"siem_soc","order":11,"type":"option","updatedAt":1731443103341,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave Fusion","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-fusion/ "},{"hs_child_table_id":0,"hs_created_at":1734721304022,"hs_deleted_at":0,"hs_id":184128305705,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304022,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/cyber-multicloud-ebook-cover-image.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":4,"isHubspotDefined":false,"label":"eBook","labelTranslations":{},"name":"ebook","order":3,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Cyber Resiliency in the Multi-Cloud Era","url":"https://www.trustwave.com/en-us/resources/library/documents/cyber-resiliency-in-the-multi-cloud-era/ "},{"hs_child_table_id":0,"hs_created_at":1734721304021,"hs_deleted_at":0,"hs_id":184128305704,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304021,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/testing-the-depths-of-your-security-cover.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":5,"isHubspotDefined":false,"label":"Infographic","labelTranslations":{},"name":"infographic","order":6,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Testing the Depths of Your Security","url":"https://www.trustwave.com/en-us/resources/library/documents/testing-the-depths-of-your-security/"},{"hs_child_table_id":0,"hs_created_at":1734721304020,"hs_deleted_at":0,"hs_id":184128305703,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304020,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/new-methods-for-solving-phishing-bec-account-takeovers-and-other-security-threats-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":10,"isHubspotDefined":false,"label":"White Paper","labelTranslations":{},"name":"white paper","order":9,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"New Methods for Solving Phishing, Business Email Compromise and Other Security Threats","url":"https://www.trustwave.com/en-us/resources/library/documents/new-methods-for-solving-phishing-business-email-compromise-and-other-security-threats/ "},{"hs_child_table_id":0,"hs_created_at":1734721304019,"hs_deleted_at":0,"hs_id":184128305702,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304019,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/the-underground-economy-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":4,"isHubspotDefined":false,"label":"eBook","labelTranslations":{},"name":"ebook","order":3,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"The Underground Economy","url":"https://www.trustwave.com/en-us/resources/library/documents/the-underground-economy/ "},{"hs_child_table_id":0,"hs_created_at":1734721304018,"hs_deleted_at":0,"hs_id":184128305701,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304018,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/securing-financial-data-from-within_cover.png","altText":"","type":"image"},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":4,"isHubspotDefined":false,"label":"Financial Services","labelTranslations":{},"name":"financial_services","order":1,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Securing Financial Data From Within","url":"https://www.trustwave.com/en-us/resources/library/documents/securing-financial-data-from-within/ "},{"hs_child_table_id":0,"hs_created_at":1734721304017,"hs_deleted_at":0,"hs_id":184128305700,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304017,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/security-testing-services_cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Security Testing Services","url":"https://www.trustwave.com/en-us/resources/library/documents/security-testing-services/ "},{"hs_child_table_id":0,"hs_created_at":1734721304016,"hs_deleted_at":0,"hs_id":184128305699,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304016,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/cybersecuritychallenges-infographic-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":5,"isHubspotDefined":false,"label":"Infographic","labelTranslations":{},"name":"infographic","order":6,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Three Cybersecurity Challenges Every Enterprise Needs to Address","url":"https://www.trustwave.com/en-us/resources/library/documents/three-cybersecurity-challenges-every-enterprise-needs-to-address/ "},{"hs_child_table_id":0,"hs_created_at":1734721304015,"hs_deleted_at":0,"hs_id":184128305698,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304015,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/ensuring-a-clean-bill-of-health-for-databases_cover.png","altText":"","type":"image"},"industry":{"createdAt":1730396680025,"createdByUserId":60505637,"id":1,"isHubspotDefined":false,"label":"Healthcare","labelTranslations":{},"name":"healthcare","order":3,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Ensuring a Clean Bill of Health for Databases","url":"https://www.trustwave.com/en-us/resources/library/documents/ensuring-a-clean-bill-of-health-for-databases/ "},{"hs_child_table_id":0,"hs_created_at":1734721304014,"hs_deleted_at":0,"hs_id":184128305697,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304014,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/managed-detection-on-site-siem-options_cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":11,"isHubspotDefined":false,"label":"SIEM/SOC","labelTranslations":{},"name":"siem_soc","order":11,"type":"option","updatedAt":1731443103341,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave Managed Detection: On-Site SIEM Options","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-managed-detection-on-site-siem-options/ "},{"hs_child_table_id":0,"hs_created_at":1734721304013,"hs_deleted_at":0,"hs_id":184128305696,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304013,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/preventing-crises_letter-cover.png","altText":"","type":"image"},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Professional Services","labelTranslations":{},"name":"professional_services","order":8,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Preventing Crises","url":"https://www.trustwave.com/en-us/resources/library/documents/preventing-crises/ "},{"hs_child_table_id":0,"hs_created_at":1734721304012,"hs_deleted_at":0,"hs_id":184128305695,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304012,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/securing-the-vote_letter-cover.png","altText":"","type":"image"},"industry":{"createdAt":1730396680025,"createdByUserId":60505637,"id":3,"isHubspotDefined":false,"label":"Government","labelTranslations":{},"name":"government","order":2,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Securing the Vote","url":"https://www.trustwave.com/en-us/resources/library/documents/securing-the-vote/ "},{"hs_child_table_id":0,"hs_created_at":1734721304011,"hs_deleted_at":0,"hs_id":184128305694,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304011,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/database-security-in-the-cloud-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":10,"isHubspotDefined":false,"label":"White Paper","labelTranslations":{},"name":"white paper","order":9,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Database Security in the Cloud","url":"https://www.trustwave.com/en-us/resources/library/documents/database-security-in-the-cloud/ "},{"hs_child_table_id":0,"hs_created_at":1734721304010,"hs_deleted_at":0,"hs_id":184128305693,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304010,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/protecting-a-nation-in-the-cloud-cover%20(1).png","altText":"","type":"image"},"industry":{"createdAt":1730396680025,"createdByUserId":60505637,"id":3,"isHubspotDefined":false,"label":"Government","labelTranslations":{},"name":"government","order":2,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Protecting a Nation in the Cloud","url":"https://www.trustwave.com/en-us/resources/library/documents/dbprotect-government-case-study/ "},{"hs_child_table_id":0,"hs_created_at":1734721304009,"hs_deleted_at":0,"hs_id":184128305692,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304009,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/2019gsrcover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Research Report","labelTranslations":{},"name":"research report","order":7,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"Data Breach","labelTranslations":{},"name":"data_breach","order":2,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"DFIR","labelTranslations":{},"name":"dfir","order":4,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"2019 Trustwave Global Security Report","url":"https://www.trustwave.com/en-us/resources/library/documents/2019-trustwave-global-security-report/ "},{"hs_child_table_id":0,"hs_created_at":1734721304008,"hs_deleted_at":0,"hs_id":184128305691,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304008,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/73af2f88feac47fbcae9c35263aecc93cb8d9b55.png","altText":"","type":"image"},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":7,"isHubspotDefined":false,"label":"Manufacturing","labelTranslations":{},"name":"manufacturing","order":6,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"DFIR","labelTranslations":{},"name":"dfir","order":4,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"The Case of the Fools Gold Image","url":"https://www.trustwave.com/en-us/resources/library/documents/the-case-of-the-fools-gold-image/ "},{"hs_child_table_id":0,"hs_created_at":1734721304007,"hs_deleted_at":0,"hs_id":184128305690,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304007,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/tmk8dd7a.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave SpiderLabs Red Teaming","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-spiderlabs-red-teaming/ "},{"hs_child_table_id":0,"hs_created_at":1734721304006,"hs_deleted_at":0,"hs_id":184128305689,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304006,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/mg-dbs-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":4,"isHubspotDefined":false,"label":"eBook","labelTranslations":{},"name":"ebook","order":3,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"7 Experts on Database Security","url":"https://www.trustwave.com/en-us/resources/library/documents/7-experts-on-database-security/ "},{"hs_child_table_id":0,"hs_created_at":1734721304005,"hs_deleted_at":0,"hs_id":184128305688,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304005,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/mg-sm-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":4,"isHubspotDefined":false,"label":"eBook","labelTranslations":{},"name":"ebook","order":3,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"7 Experts on Security Maturity","url":"https://www.trustwave.com/en-us/resources/library/documents/7-experts-on-security-maturity/ "},{"hs_child_table_id":0,"hs_created_at":1734721304004,"hs_deleted_at":0,"hs_id":184128305687,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304004,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/mg-atd-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":4,"isHubspotDefined":false,"label":"eBook","labelTranslations":{},"name":"ebook","order":3,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"7 Experts on Advanced Threat Detection","url":"https://www.trustwave.com/en-us/resources/library/documents/7-experts-on-advanced-threat-detection/ "},{"hs_child_table_id":0,"hs_created_at":1734721304003,"hs_deleted_at":0,"hs_id":184128305686,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304003,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/phishing-infographic-cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":5,"isHubspotDefined":false,"label":"Infographic","labelTranslations":{},"name":"infographic","order":6,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Don’t Be a Phish Out of Water","url":"https://www.trustwave.com/en-us/resources/library/documents/dont-be-a-phish-out-of-water/ "},{"hs_child_table_id":0,"hs_created_at":1734721304002,"hs_deleted_at":0,"hs_id":184128305685,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304002,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/fueling-a-healthy-security-diet_cover.png","altText":"","type":"image"},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Retail","labelTranslations":{},"name":"retail","order":9,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Fueling a Healthy Security Diet","url":"https://www.trustwave.com/en-us/resources/library/documents/fueling-a-healthy-security-diet/"},{"hs_child_table_id":0,"hs_created_at":1734721304001,"hs_deleted_at":0,"hs_id":184128305684,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304001,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/anhtjsym.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Research Report","labelTranslations":{},"name":"research report","order":7,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Internet of Things Cybersecurity Readiness","url":"https://www.trustwave.com/en-us/resources/library/documents/iot-cybersecurity-readiness/ "},{"hs_child_table_id":0,"hs_created_at":1734721304000,"hs_deleted_at":0,"hs_id":184128305683,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721304000,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/mpgcohpy-1.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":4,"isHubspotDefined":false,"label":"eBook","labelTranslations":{},"name":"ebook","order":3,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1731443056321,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"DFIR","labelTranslations":{},"name":"dfir","order":4,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"The Hassle-Free Guide to Dominating Your Next Security Incident","url":"https://www.trustwave.com/en-us/resources/library/documents/the-hassle-free-guide-to-dominating-your-next-security-incident/ "},{"hs_child_table_id":0,"hs_created_at":1734721303999,"hs_deleted_at":0,"hs_id":184128305682,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303999,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/fa89ua-e.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":4,"isHubspotDefined":false,"label":"eBook","labelTranslations":{},"name":"ebook","order":3,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"The Ultimate Reference Guide to Cybersecurity Threats","url":"https://www.trustwave.com/en-us/resources/library/documents/the-ultimate-reference-guide-to-cybersecurity-threats/ "},{"hs_child_table_id":0,"hs_created_at":1734721303998,"hs_deleted_at":0,"hs_id":184128305681,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303998,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/3ofyxsds.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave Intrusion Detection System","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-intrusion-detection-system/ "},{"hs_child_table_id":0,"hs_created_at":1734721303997,"hs_deleted_at":0,"hs_id":184128305680,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303997,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/fhggyzcy.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Implementation Services","url":"https://www.trustwave.com/en-us/resources/library/documents/implementation-services/ "},{"hs_child_table_id":0,"hs_created_at":1734721303996,"hs_deleted_at":0,"hs_id":184128305679,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303996,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/z-ycx0oa.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":10,"isHubspotDefined":false,"label":"White Paper","labelTranslations":{},"name":"white paper","order":9,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":15,"isHubspotDefined":false,"label":"Compliance","labelTranslations":{},"name":"compliance","order":1,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"The Best of Both Worlds: Blending Best Practices with New Security Protocols","url":"https://www.trustwave.com/en-us/resources/library/documents/the-best-of-both-worlds-blending-best-practices-with-new-security-protocols/ "},{"hs_child_table_id":0,"hs_created_at":1734721303995,"hs_deleted_at":0,"hs_id":184128305678,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303995,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/upholding-lawyer-client-privilege_letter-cover%20(1).png","altText":"","type":"image"},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Legal","labelTranslations":{},"name":"legal","order":5,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":11,"isHubspotDefined":false,"label":"SIEM/SOC","labelTranslations":{},"name":"siem_soc","order":11,"type":"option","updatedAt":1731443103341,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Upholding Lawyer-Client Privilege","url":"https://www.trustwave.com/en-us/resources/library/documents/upholding-lawyer-client-privilege/ "},{"hs_child_table_id":0,"hs_created_at":1734721303994,"hs_deleted_at":0,"hs_id":184128305677,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303994,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/feb251fcb4b5aa26f563ff0990cf460297420d3f.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1731443056321,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"DFIR","labelTranslations":{},"name":"dfir","order":4,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Digital Forensics and Incident Response Consulting","url":"https://www.trustwave.com/en-us/resources/library/documents/digital-forensics-and-incident-response-consulting/ "},{"hs_child_table_id":0,"hs_created_at":1734721303993,"hs_deleted_at":0,"hs_id":184128305676,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303993,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/0c57faf4f2a92a8a56f061405b16eab9f50afdcc.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":10,"isHubspotDefined":false,"label":"White Paper","labelTranslations":{},"name":"white paper","order":9,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1731443056321,"createdByUserId":60505637,"id":15,"isHubspotDefined":false,"label":"Compliance","labelTranslations":{},"name":"compliance","order":1,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Three Pillars for Successfully Addressing GDPR","url":"https://www.trustwave.com/en-us/resources/library/documents/three-pillars-for-successfully-addressing-gdpr/ "},{"hs_child_table_id":0,"hs_created_at":1734721303992,"hs_deleted_at":0,"hs_id":184128305675,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303992,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/spiderlabs-services_cover.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"DFIR","labelTranslations":{},"name":"dfir","order":4,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave SpiderLabs","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-spiderlabs/ "},{"hs_child_table_id":0,"hs_created_at":1734721303991,"hs_deleted_at":0,"hs_id":184128305674,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303991,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/i1iqybwq-1.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":5,"isHubspotDefined":false,"label":"Infographic","labelTranslations":{},"name":"infographic","order":6,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"DFIR","labelTranslations":{},"name":"dfir","order":4,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"What are Cyber Heroes Made of?","url":"https://www.trustwave.com/en-us/esources/library/documents/what-are-cyber-heroes-made-of/ "},{"hs_child_table_id":0,"hs_created_at":1734721303990,"hs_deleted_at":0,"hs_id":184128305673,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303990,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/41f857918fa79f3a486bc369469c1c58b6de8286.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave Vulnerability Management","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-vulnerability-management/ "},{"hs_child_table_id":0,"hs_created_at":1734721303989,"hs_deleted_at":0,"hs_id":184128305672,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303989,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/535df3de2dabb83eefeaf8d044bda1f057df95da.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave Data Protection Practice","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-data-protection-practice/ "},{"hs_child_table_id":0,"hs_created_at":1734721303988,"hs_deleted_at":0,"hs_id":184128305671,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303988,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/w0gxn5e4.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Research Report","labelTranslations":{},"name":"research report","order":7,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"2018 Trustwave Global Security Report","url":"https://www.trustwave.com/en-us/resources/library/documents/2018-trustwave-global-security-report/ "},{"hs_child_table_id":0,"hs_created_at":1734721303987,"hs_deleted_at":0,"hs_id":184128305670,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303987,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/mpxhdi24.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave SpiderLabs Phishing Service","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-spiderlabs-phishing-service/ "},{"hs_child_table_id":0,"hs_created_at":1734721303986,"hs_deleted_at":0,"hs_id":184128305669,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303986,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/securing-transactions_letter-cover.png","altText":"","type":"image"},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Retail","labelTranslations":{},"name":"retail","order":9,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":15,"isHubspotDefined":false,"label":"Compliance","labelTranslations":{},"name":"compliance","order":1,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Securing Transactions and a Company's Growth","url":"https://www.trustwave.com/en-us/resources/library/documents/securing-transactions-and-a-companys-growth/ "},{"hs_child_table_id":0,"hs_created_at":1734721303985,"hs_deleted_at":0,"hs_id":184128305668,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303985,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/keeping-a-metropolis-on-track_letter-cover.png","altText":"","type":"image"},"industry":{"createdAt":1730396680025,"createdByUserId":60505637,"id":3,"isHubspotDefined":false,"label":"Government","labelTranslations":{},"name":"government","order":2,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Keeping a Metropolis on Track","url":"https://www.trustwave.com/en-us/resources/library/documents/keeping-a-metropolis-on-track/ "},{"hs_child_table_id":0,"hs_created_at":1734721303984,"hs_deleted_at":0,"hs_id":184128305667,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303984,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/taking-cyber-fears-off-the-menu_letter-cover.png","altText":"","type":"image"},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":5,"isHubspotDefined":false,"label":"Hospitality","labelTranslations":{},"name":"hospitality","order":4,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":15,"isHubspotDefined":false,"label":"Compliance","labelTranslations":{},"name":"compliance","order":1,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Taking Cyber Fears Off the Menu","url":"https://www.trustwave.com/en-us/resources/library/documents/taking-cyber-fears-off-the-menu/ "},{"hs_child_table_id":0,"hs_created_at":1734721303983,"hs_deleted_at":0,"hs_id":184128305666,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303983,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/serving-up-safety_letter-cover.png","altText":"","type":"image"},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":5,"isHubspotDefined":false,"label":"Hospitality","labelTranslations":{},"name":"hospitality","order":4,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":15,"isHubspotDefined":false,"label":"Compliance","labelTranslations":{},"name":"compliance","order":1,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Serving up Safety","url":"https://www.trustwave.com/en-us/resources/library/documents/serving-up-safety/ "},{"hs_child_table_id":0,"hs_created_at":1734721303982,"hs_deleted_at":0,"hs_id":184128305665,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303982,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/seeding-safe-collaboration_letter-cover.png","altText":"","type":"image"},"industry":{"createdAt":1730396680025,"createdByUserId":60505637,"id":1,"isHubspotDefined":false,"label":"Healthcare","labelTranslations":{},"name":"healthcare","order":3,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Seeding Safe Collaboration","url":"https://www.trustwave.com/en-us/resources/library/documents/seeding-safe-collaboration/ "},{"hs_child_table_id":0,"hs_created_at":1734721303981,"hs_deleted_at":0,"hs_id":184128305664,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303981,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/flowing-into-the-future_letter-cover.png","altText":"","type":"image"},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Energy","labelTranslations":{},"name":"energy","order":7,"type":"option","updatedAt":1734701670779,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":11,"isHubspotDefined":false,"label":"SIEM/SOC","labelTranslations":{},"name":"siem_soc","order":11,"type":"option","updatedAt":1731443103341,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Flowing into the Future","url":"https://www.trustwave.com/en-us/resources/library/documents/flowing-into-the-future/ "},{"hs_child_table_id":0,"hs_created_at":1734721303980,"hs_deleted_at":0,"hs_id":184128305593,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303980,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/takingflight_casestudy-cover.png","altText":"","type":"image"},"industry":{"createdAt":1734701670779,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Transportation","labelTranslations":{},"name":"transportation","order":11,"type":"option","updatedAt":1734701670779,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Taking Flight","url":"https://www.trustwave.com/en-us/resources/library/documents/taking-flight/ "},{"hs_child_table_id":0,"hs_created_at":1734721303979,"hs_deleted_at":0,"hs_id":184128305592,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303979,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/working-for-the-people_letter-cover.png","altText":"","type":"image"},"industry":{"createdAt":1730396680025,"createdByUserId":60505637,"id":3,"isHubspotDefined":false,"label":"Government","labelTranslations":{},"name":"government","order":2,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":1,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Working for the People","url":"https://www.trustwave.com/en-us/resources/library/documents/working-for-the-people/ "},{"hs_child_table_id":0,"hs_created_at":1734721303978,"hs_deleted_at":0,"hs_id":184128305591,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303978,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/ierr37pw.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":4,"isHubspotDefined":false,"label":"eBook","labelTranslations":{},"name":"ebook","order":3,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"The Complete Guide to Building a Security Culture","url":"https://www.trustwave.com/en-us/resources/library/documents/the-complete-guide-to-building-a-security-culture/ "},{"hs_child_table_id":0,"hs_created_at":1734721303977,"hs_deleted_at":0,"hs_id":184128305590,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303977,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/13019_10099.webp","altText":"","type":"image"},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":4,"isHubspotDefined":false,"label":"Financial Services","labelTranslations":{},"name":"financial_services","order":1,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Research Report","labelTranslations":{},"name":"research report","order":7,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Post Soviet Bank Heists","url":"https://www.trustwave.com/en-us/resources/library/documents/post-soviet-bank-heist/ "},{"hs_child_table_id":0,"hs_created_at":1734721303976,"hs_deleted_at":0,"hs_id":184128305589,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303976,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/9718.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":5,"isHubspotDefined":false,"label":"Infographic","labelTranslations":{},"name":"infographic","order":6,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"The Pressured World of a Security Pro","url":"https://www.trustwave.com/en-us/resources/library/documents/the-pressured-world-of-a-security-pro/ "},{"hs_child_table_id":0,"hs_created_at":1734721303975,"hs_deleted_at":0,"hs_id":184128305588,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303975,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/9520.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Research Report","labelTranslations":{},"name":"research report","order":7,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"Data Breach","labelTranslations":{},"name":"data_breach","order":2,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"2017 Trustwave Global Security Report","url":"https://www.trustwave.com/en-us/resources/library/documents/2017-trustwave-global-security-report/ "},{"hs_child_table_id":0,"hs_created_at":1734721303974,"hs_deleted_at":0,"hs_id":184128305587,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303974,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/9219.jpg","altText":"","type":"image"},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":4,"isHubspotDefined":false,"label":"Financial Services","labelTranslations":{},"name":"financial_services","order":1,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1731443056321,"createdByUserId":60505637,"id":15,"isHubspotDefined":false,"label":"Compliance","labelTranslations":{},"name":"compliance","order":1,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Cybersecurity for Financial Services Companies: Addressing New York’s First-In-The Nation Regulation","url":"https://www.trustwave.com/en-us/resources/library/documents/cybersecurity-for-financial-services-companies-addressing-new-yorks-first-in-the-nation-regulation/ "},{"hs_child_table_id":0,"hs_created_at":1734721303973,"hs_deleted_at":0,"hs_id":184128305586,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303973,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/9004.jpg","altText":"","type":"image"},"industry":{"createdAt":1730396680025,"createdByUserId":60505637,"id":3,"isHubspotDefined":false,"label":"Government","labelTranslations":{},"name":"government","order":2,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":6,"isHubspotDefined":false,"label":"Guide","labelTranslations":{},"name":"guide","order":5,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":15,"isHubspotDefined":false,"label":"Compliance","labelTranslations":{},"name":"compliance","order":1,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Federal CDM Program Funds Continuous Monitoring Data Security Initiatives","url":"https://www.trustwave.com/en-us/resources/library/documents/federal-cdm-program-funds-continuous-monitoring-data-security-initiatives/ "},{"hs_child_table_id":0,"hs_created_at":1734721303972,"hs_deleted_at":0,"hs_id":184128305585,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303972,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/dqrh2xug.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":10,"isHubspotDefined":false,"label":"White Paper","labelTranslations":{},"name":"white paper","order":9,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Why Move to an MSSP?","url":"https://www.trustwave.com/en-us/resources/library/documents/why-move-to-an-mssp/ "},{"hs_child_table_id":0,"hs_created_at":1734721303971,"hs_deleted_at":0,"hs_id":184128305584,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303971,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/8714.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave Web Risk Monitoring","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-web-risk-monitoring/ "},{"hs_child_table_id":0,"hs_created_at":1734721303970,"hs_deleted_at":0,"hs_id":184128305583,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303970,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/8694.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":9,"isHubspotDefined":false,"label":"Spec Sheet","labelTranslations":{},"name":"spec sheet","order":8,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":11,"isHubspotDefined":false,"label":"SIEM/SOC","labelTranslations":{},"name":"siem_soc","order":11,"type":"option","updatedAt":1731443103341,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave SIEM Signed Common Criteria Certificate","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-siem-signed-common-criteria-certificate/ "},{"hs_child_table_id":0,"hs_created_at":1734721303969,"hs_deleted_at":0,"hs_id":184128305582,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303969,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/8291.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":5,"isHubspotDefined":false,"label":"Infographic","labelTranslations":{},"name":"infographic","order":6,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Flow Chart: Should You Re-Evaluate Your Security Strategy?","url":"https://www.trustwave.com/en-us/resources/library/documents/flow-chart-should-you-re-evaluate-your-security-strategy/ "},{"hs_child_table_id":0,"hs_created_at":1734721303968,"hs_deleted_at":0,"hs_id":184128305581,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303968,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/7906.png","altText":"","type":"image"},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":5,"isHubspotDefined":false,"label":"Hospitality","labelTranslations":{},"name":"hospitality","order":4,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":10,"isHubspotDefined":false,"label":"White Paper","labelTranslations":{},"name":"white paper","order":9,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Hospitality in the Crosshairs of Cybercrime","url":"https://www.trustwave.com/en-us/resources/library/documents/hospitality-in-the-crosshairs-of-cybercrime/ "},{"hs_child_table_id":0,"hs_created_at":1734721303967,"hs_deleted_at":0,"hs_id":184128305580,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303967,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/3118.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"Data Breach","labelTranslations":{},"name":"data_breach","order":2,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave SpiderLabs Proactive Breach Detection","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-spiderlabs-proactive-breach-detection/ "},{"hs_child_table_id":0,"hs_created_at":1734721303966,"hs_deleted_at":0,"hs_id":184128305579,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303966,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/7840.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":5,"isHubspotDefined":false,"label":"Infographic","labelTranslations":{},"name":"infographic","order":6,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Why Managing Security Should Be Like Managing Life","url":"https://www.trustwave.com/en-us/resources/library/documents/why-managing-security-should-be-like-managing-life/ "},{"hs_child_table_id":0,"hs_created_at":1734721303965,"hs_deleted_at":0,"hs_id":184128305578,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303965,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/3238.png","altText":"","type":"image"},"industry":{"createdAt":1730396680025,"createdByUserId":60505637,"id":1,"isHubspotDefined":false,"label":"Healthcare","labelTranslations":{},"name":"healthcare","order":3,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1731443056321,"createdByUserId":60505637,"id":15,"isHubspotDefined":false,"label":"Compliance","labelTranslations":{},"name":"compliance","order":1,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"HIPAA Compliance Pre-Assessment","url":"https://www.trustwave.com/en-us/resources/library/documents/hipaa-compliance-pre-assessment/ "},{"hs_child_table_id":0,"hs_created_at":1734721303964,"hs_deleted_at":0,"hs_id":184128305577,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303964,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/7820.png","altText":"","type":"image"},"industry":{"createdAt":1730396680025,"createdByUserId":60505637,"id":1,"isHubspotDefined":false,"label":"Healthcare","labelTranslations":{},"name":"healthcare","order":3,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1731443056321,"createdByUserId":60505637,"id":15,"isHubspotDefined":false,"label":"Compliance","labelTranslations":{},"name":"compliance","order":1,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"HIPAA Compliance Readiness","url":"https://www.trustwave.com/en-us/resources/library/documents/hipaa-compliance-readiness/ "},{"hs_child_table_id":0,"hs_created_at":1734721303963,"hs_deleted_at":0,"hs_id":184128305576,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303963,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/2502.png","altText":"","type":"image"},"industry":{"createdAt":1730396680025,"createdByUserId":60505637,"id":1,"isHubspotDefined":false,"label":"Healthcare","labelTranslations":{},"name":"healthcare","order":3,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":15,"isHubspotDefined":false,"label":"Compliance","labelTranslations":{},"name":"compliance","order":1,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"HIPAA Risk Assessment","url":"https://www.trustwave.com/en-us/resources/library/documents/hipaa-risk-assessment/ "},{"hs_child_table_id":0,"hs_created_at":1734721303962,"hs_deleted_at":0,"hs_id":184128305575,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303962,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/7764.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Research Report","labelTranslations":{},"name":"research report","order":7,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"2016 Trustwave Global Security Report","url":"https://www.trustwave.com/en-us/resources/library/documents/2016-Trustwave-Global-Security-Report/ "},{"hs_child_table_id":0,"hs_created_at":1734721303961,"hs_deleted_at":0,"hs_id":184128305574,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303961,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/7213.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":5,"isHubspotDefined":false,"label":"Infographic","labelTranslations":{},"name":"infographic","order":6,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Flow Chart: Is Managed Security Right for Your Business?","url":"https://www.trustwave.com/en-us/resources/library/documents/flow-chart-is-managed-security-right-for-your-business/ "},{"hs_child_table_id":0,"hs_created_at":1734721303960,"hs_deleted_at":0,"hs_id":184128305573,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303960,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/7141.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1731443056321,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"DFIR","labelTranslations":{},"name":"dfir","order":4,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave Incident Readiness Program","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-incident-readiness-program/ "},{"hs_child_table_id":0,"hs_created_at":1734721303959,"hs_deleted_at":0,"hs_id":184128305572,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303959,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/7065.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":10,"isHubspotDefined":false,"label":"White Paper","labelTranslations":{},"name":"white paper","order":9,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":11,"isHubspotDefined":false,"label":"SIEM/SOC","labelTranslations":{},"name":"siem_soc","order":11,"type":"option","updatedAt":1731443103341,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"An Executive’s Guide to Budgeting for SIEM","url":"https://www.trustwave.com/en-us/resources/library/documents/an-executives-guide-to-budgeting-for-siem/ "},{"hs_child_table_id":0,"hs_created_at":1734721303958,"hs_deleted_at":0,"hs_id":184128305571,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303958,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/6913.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":9,"isHubspotDefined":false,"label":"Spec Sheet","labelTranslations":{},"name":"spec sheet","order":8,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave AppDetectivePRO Signed Common Criteria Certificate","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-appdetectivepro-signed-common-criteria-certificate/ "},{"hs_child_table_id":0,"hs_created_at":1734721303957,"hs_deleted_at":0,"hs_id":184128305570,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303957,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/6914.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":9,"isHubspotDefined":false,"label":"Spec Sheet","labelTranslations":{},"name":"spec sheet","order":8,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave DbProtect Signed Common Criteria Certificate","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-dbprotect-signed-common-criteria-certificate/ "},{"hs_child_table_id":0,"hs_created_at":1734721303956,"hs_deleted_at":0,"hs_id":184128305569,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303956,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/6818.png","altText":"","type":"image"},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":5,"isHubspotDefined":false,"label":"Hospitality","labelTranslations":{},"name":"hospitality","order":4,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":6,"isHubspotDefined":false,"label":"Guide","labelTranslations":{},"name":"guide","order":5,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Hospitality Tip Sheet: 5 Essential Data Security Actions to Take Now","url":"https://www.trustwave.com/en-us/resources/library/documents/hospitality-tip-sheet-5-essential-data-security-actions-to-take-now/ "},{"hs_child_table_id":0,"hs_created_at":1734721303955,"hs_deleted_at":0,"hs_id":184128305568,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303955,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/6815.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave Secure Email Gateway Service Provider Edition","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-secure-email-gateway-service-provider-edition/ "},{"hs_child_table_id":0,"hs_created_at":1734721303954,"hs_deleted_at":0,"hs_id":184128305567,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303954,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/6756.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":5,"isHubspotDefined":false,"label":"Infographic","labelTranslations":{},"name":"infographic","order":6,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"10 Reasons to Test, Not Guess","url":"https://www.trustwave.com/en-us/resources/library/documents/10-reasons-to-test-not-guess/ "},{"hs_child_table_id":0,"hs_created_at":1734721303953,"hs_deleted_at":0,"hs_id":184128305566,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303953,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/6519.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1731443056321,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"DFIR","labelTranslations":{},"name":"dfir","order":4,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave Data Forensics and Incident Response Services","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-data-forensics-and-incident-response-services/ "},{"hs_child_table_id":0,"hs_created_at":1734721303952,"hs_deleted_at":0,"hs_id":184128305565,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303952,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/6440.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Research Report","labelTranslations":{},"name":"research report","order":7,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"2015 Trustwave Global Security Report","url":"https://www.trustwave.com/en-us/resources/library/documents/2015-trustwave-global-security-report/ "},{"hs_child_table_id":0,"hs_created_at":1734721303951,"hs_deleted_at":0,"hs_id":184128305564,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303951,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/634.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":6,"isHubspotDefined":false,"label":"Guide","labelTranslations":{},"name":"guide","order":5,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave Vulnerability Management Scanning Quick Start Guide","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-vulnerability-management-scanning-quick-start-guide/ "},{"hs_child_table_id":0,"hs_created_at":1734721303950,"hs_deleted_at":0,"hs_id":184128305563,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303950,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/4865.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":6,"isHubspotDefined":false,"label":"Guide","labelTranslations":{},"name":"guide","order":5,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave Vulnerability Management User Guide","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-vulnerability-management-user-guide/ "},{"hs_child_table_id":0,"hs_created_at":1734721303949,"hs_deleted_at":0,"hs_id":184128305562,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303949,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/6131.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":2,"isHubspotDefined":false,"label":"Analyst Report","labelTranslations":{},"name":"analyst report","order":0,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"451 Research Deal Analysis: Singtel to Acquire Trustwave to Bolster Global Cyber Security Capabilities","url":"https://www.trustwave.com/en-us/resources/library/documents/451-research-deal-analysis-singtel-to-acquire-trustwave-to-bolster-global-cyber-security-capabilities/ "},{"hs_child_table_id":0,"hs_created_at":1734721303948,"hs_deleted_at":0,"hs_id":184128305561,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303948,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/7529.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":11,"isHubspotDefined":false,"label":"SIEM/SOC","labelTranslations":{},"name":"siem_soc","order":11,"type":"option","updatedAt":1731443103341,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave Managed SIEM","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-managed-siem/ "},{"hs_child_table_id":0,"hs_created_at":1734721303947,"hs_deleted_at":0,"hs_id":184128305560,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303947,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/5502.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":5,"isHubspotDefined":false,"label":"Infographic","labelTranslations":{},"name":"infographic","order":6,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Why Security Sits on the Shelf","url":"https://www.trustwave.com/en-us/resources/library/documents/why-security-sits-on-the-shelf/ "},{"hs_child_table_id":0,"hs_created_at":1734721303946,"hs_deleted_at":0,"hs_id":184128305559,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303946,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/3234.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":5,"isHubspotDefined":false,"label":"Infographic","labelTranslations":{},"name":"infographic","order":6,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"The Right Price for Cybercriminals","url":"https://www.trustwave.com/en-us/resources/library/documents/the-right-price-for-cybercriminals/ "},{"hs_child_table_id":0,"hs_created_at":1734721303945,"hs_deleted_at":0,"hs_id":184128305558,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1735569825136,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/3062.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Stop Ransomware Before It Stops You","url":"https://www.trustwave.com/en-us/resources/library/webinars/stop-ransomware-before-it-stops-you/ "},{"hs_child_table_id":0,"hs_created_at":1734721303944,"hs_deleted_at":0,"hs_id":184128305557,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303944,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/3059.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":9,"isHubspotDefined":false,"label":"Spec Sheet","labelTranslations":{},"name":"spec sheet","order":8,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave Network Access Control (NAC) Common Criteria Validation Certificate","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-network-access-control-nac-common-criteria-validation-certificate/ "},{"hs_child_table_id":0,"hs_created_at":1734721303943,"hs_deleted_at":0,"hs_id":184128305556,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303943,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/2733.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Research Report","labelTranslations":{},"name":"research report","order":7,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"2014 Trustwave Global Security Report","url":"https://www.trustwave.com/en-us/resources/library/documents/2014-trustwave-global-security-report/ "},{"hs_child_table_id":0,"hs_created_at":1734721303942,"hs_deleted_at":0,"hs_id":184128305555,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303942,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/2682.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":5,"isHubspotDefined":false,"label":"Infographic","labelTranslations":{},"name":"infographic","order":6,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Applications Under Duress - How Well Do You Test Your Apps?","url":"https://www.trustwave.com/en-us/resources/library/documents/applications-under-duress-how-well-do-you-test-your-apps/ "},{"hs_child_table_id":0,"hs_created_at":1734721303941,"hs_deleted_at":0,"hs_id":184128305554,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303941,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/2514.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":9,"isHubspotDefined":false,"label":"Spec Sheet","labelTranslations":{},"name":"spec sheet","order":8,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave NAC Server Management Specifications","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-nac-server-management-specifications/ "},{"hs_child_table_id":0,"hs_created_at":1734721303940,"hs_deleted_at":0,"hs_id":184128305553,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303940,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/2020.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":11,"isHubspotDefined":false,"label":"SIEM/SOC","labelTranslations":{},"name":"siem_soc","order":11,"type":"option","updatedAt":1731443103341,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave SIEM Enterprise","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-siem-enterprise/ "},{"hs_child_table_id":0,"hs_created_at":1734721303939,"hs_deleted_at":0,"hs_id":184128305552,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303939,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/1670.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":5,"isHubspotDefined":false,"label":"Infographic","labelTranslations":{},"name":"infographic","order":6,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Malware Everywhere","url":"https://www.trustwave.com/en-us/resources/library/documents/malware-everywhere/ "},{"hs_child_table_id":0,"hs_created_at":1734721303938,"hs_deleted_at":0,"hs_id":184128305551,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303938,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/efd4f09cfcd60a9e01e39b535d64722c8c44c184.png","altText":"","type":"image"},"industry":{"createdAt":1730396680025,"createdByUserId":60505637,"id":3,"isHubspotDefined":false,"label":"Government","labelTranslations":{},"name":"government","order":2,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Network Access Control for Government","url":"https://www.trustwave.com/en-us/resources/library/documents/network-access-control-for-government/ "},{"hs_child_table_id":0,"hs_created_at":1734721303937,"hs_deleted_at":0,"hs_id":184128305550,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303937,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/1934.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":5,"isHubspotDefined":false,"label":"Infographic","labelTranslations":{},"name":"infographic","order":6,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Ethical Hackers Look Back - And Look Ahead","url":"https://www.trustwave.com/en-us/resources/library/documents/ethical-hackers-look-back-and-look-ahead/ "},{"hs_child_table_id":0,"hs_created_at":1734721303936,"hs_deleted_at":0,"hs_id":184128305549,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303936,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/1960.png","altText":"","type":"image"},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":5,"isHubspotDefined":false,"label":"Hospitality","labelTranslations":{},"name":"hospitality","order":4,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Managed Security Services for Hospitality","url":"https://www.trustwave.com/en-us/resources/library/documents/managed-security-services-for-hospitality/ "},{"hs_child_table_id":0,"hs_created_at":1734721303935,"hs_deleted_at":0,"hs_id":184128305548,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303935,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/1896.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":5,"isHubspotDefined":false,"label":"Infographic","labelTranslations":{},"name":"infographic","order":6,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Finding Big Benefits in Big Data","url":"https://www.trustwave.com/en-us/resources/blogs/trustwave-blog/infographic-finding-big-benefits-in-big-data "},{"hs_child_table_id":0,"hs_created_at":1734721303934,"hs_deleted_at":0,"hs_id":184128305547,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303934,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/631.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Research Report","labelTranslations":{},"name":"research report","order":7,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"2013 Trustwave Global Security Report","url":"https://www.trustwave.com/en-us/resources/library/documents/2013-trustwave-global-security-report/ "},{"hs_child_table_id":0,"hs_created_at":1734721303933,"hs_deleted_at":0,"hs_id":184128305546,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303933,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/2125.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":2,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave Extended Validation SSL Certificates","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-extended-validation-ssl-certificates/ "},{"hs_child_table_id":0,"hs_created_at":1734721303932,"hs_deleted_at":0,"hs_id":184128305545,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303932,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/598.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":5,"isHubspotDefined":false,"label":"Infographic","labelTranslations":{},"name":"infographic","order":6,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Ethical Hacking History","url":"https://www.trustwave.com/en-us/resources/library/documents/ethical-hacking-history/ "},{"hs_child_table_id":0,"hs_created_at":1734721303931,"hs_deleted_at":0,"hs_id":184128305544,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303931,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/623.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":9,"isHubspotDefined":false,"label":"Spec Sheet","labelTranslations":{},"name":"spec sheet","order":8,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":11,"isHubspotDefined":false,"label":"SIEM/SOC","labelTranslations":{},"name":"siem_soc","order":11,"type":"option","updatedAt":1731443103341,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave SIEM Log Management Appliances","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-siem-log-management-appliances/ "},{"hs_child_table_id":0,"hs_created_at":1734721303930,"hs_deleted_at":0,"hs_id":184128305543,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303930,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/5451.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Research Report","labelTranslations":{},"name":"research report","order":7,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"2012 Trustwave Global Security Report","url":"https://www.trustwave.com/en-us/resources/library/documents/2012-trustwave-global-security-report/ "},{"hs_child_table_id":0,"hs_created_at":1734721303929,"hs_deleted_at":0,"hs_id":184128305542,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303929,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/5450.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Research Report","labelTranslations":{},"name":"research report","order":7,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"DFIR","labelTranslations":{},"name":"dfir","order":4,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"2011 Trustwave Global Security Report","url":"https://www.trustwave.com/en-us/resources/library/documents/2011-trustwave-global-security-report/ "},{"hs_child_table_id":0,"hs_created_at":1734721303928,"hs_deleted_at":0,"hs_id":184128305541,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303928,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/5449.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Research Report","labelTranslations":{},"name":"research report","order":7,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"DFIR","labelTranslations":{},"name":"dfir","order":4,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"2010 Trustwave Global Security Report","url":"https://www.trustwave.com/en-us/resources/library/documents/2010-trustwave-global-security-report/ "},{"hs_child_table_id":0,"hs_created_at":1734721303927,"hs_deleted_at":0,"hs_id":184128305540,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303927,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/5448.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Research Report","labelTranslations":{},"name":"research report","order":7,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"2009 Trustwave Global Security Report","url":"https://www.trustwave.com/en-us/resources/library/documents/2009-trustwave-global-security-report/ "},{"hs_child_table_id":0,"hs_created_at":1734721303926,"hs_deleted_at":0,"hs_id":184128305539,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303926,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/84f8713a-dec2-4ea1-a2e1-c9539387a984.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":14,"isHubspotDefined":false,"label":"Overview","labelTranslations":{},"name":"overview","order":11,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"video","labelTranslations":{},"name":"video","order":2,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave Managed Detection and Response (MDR)","url":"https://www.trustwave.com/en-us/resources/library/videos/trustwave-managed-detection-and-response-mdr/ "},{"hs_child_table_id":0,"hs_created_at":1734721303925,"hs_deleted_at":0,"hs_id":184128305538,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303925,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/tommdr-cover.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":14,"isHubspotDefined":false,"label":"Overview","labelTranslations":{},"name":"overview","order":11,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"video","labelTranslations":{},"name":"video","order":2,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave Managed Detection and Response overview","url":"https://www.trustwave.com/en-us/resources/library/videos/trustwave-managed-detection-and-response-overview/ "},{"hs_child_table_id":0,"hs_created_at":1734721303924,"hs_deleted_at":0,"hs_id":184128305537,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303924,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/cc1383_ms_misa_trustwave_sentinel_thumbnail-1.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":14,"isHubspotDefined":false,"label":"Overview","labelTranslations":{},"name":"overview","order":11,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":11,"isHubspotDefined":false,"label":"SIEM/SOC","labelTranslations":{},"name":"siem_soc","order":11,"type":"option","updatedAt":1731443103341,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":18,"isHubspotDefined":false,"label":"Microsoft","labelTranslations":{},"name":"microsoft","order":8,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"video","labelTranslations":{},"name":"video","order":2,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave and Microsoft Sentinel Integration Video","url":"https://www.trustwave.com/en-us/resources/library/videos/trustwave-and-microsoft-sentinel-integration-video/ "},{"hs_child_table_id":0,"hs_created_at":1734721303923,"hs_deleted_at":0,"hs_id":184128305536,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303923,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/cc1383_ms_misa_trustwave_endpoint_thumbnail-1-1.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":14,"isHubspotDefined":false,"label":"Overview","labelTranslations":{},"name":"overview","order":11,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":18,"isHubspotDefined":false,"label":"Microsoft","labelTranslations":{},"name":"microsoft","order":8,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"video","labelTranslations":{},"name":"video","order":2,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave and Microsoft Defender for Endpoint Integration","url":"https://www.trustwave.com/en-us/resources/library/videos/trustwave-and-microsoft-defender-for-endpoint-integration/ "},{"hs_child_table_id":0,"hs_created_at":1734721303922,"hs_deleted_at":0,"hs_id":184128305535,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303922,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/mvra-1920x1080-cover-2.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":14,"isHubspotDefined":false,"label":"Overview","labelTranslations":{},"name":"overview","order":11,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"video","labelTranslations":{},"name":"video","order":2,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Managed Vendor Risk Assessment (MVRA) Overview","url":"https://www.trustwave.com/en-us/resources/library/videos/managed-vendor-risk-assessment-mvra-overview/ "},{"hs_child_table_id":0,"hs_created_at":1734721303921,"hs_deleted_at":0,"hs_id":184128305534,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303921,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/mvra-1920x1080-cover.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":14,"isHubspotDefined":false,"label":"Overview","labelTranslations":{},"name":"overview","order":11,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"video","labelTranslations":{},"name":"video","order":2,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"An Introduction to Supply Chain Risk","url":"https://www.trustwave.com/en-us/resources/library/videos/an-introduction-to-supply-chain-risk/ "},{"hs_child_table_id":0,"hs_created_at":1734721303920,"hs_deleted_at":0,"hs_id":184128305533,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303920,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/sdwan-cover.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":14,"isHubspotDefined":false,"label":"Overview","labelTranslations":{},"name":"overview","order":11,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"video","labelTranslations":{},"name":"video","order":2,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Secure SD-WAN video","url":"https://www.trustwave.com/en-us/resources/library/videos/secure-sd-wan-video/ "},{"hs_child_table_id":0,"hs_created_at":1734721303919,"hs_deleted_at":0,"hs_id":184128305532,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303919,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/webinar-cover-2.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":14,"isHubspotDefined":false,"label":"Overview","labelTranslations":{},"name":"overview","order":11,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"video","labelTranslations":{},"name":"video","order":2,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"A Red Team Simulation Synopsis – How Trustwave SpiderLabs Conduct a Simulated Attack","url":"https://www.trustwave.com/en-us/resources/library/videos/a-red-team-simulation-synopsis/ "},{"hs_child_table_id":0,"hs_created_at":1734721303918,"hs_deleted_at":0,"hs_id":184128305531,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303918,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/510ad3f651349bb229697d94a68a331e5be1d68a.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":14,"isHubspotDefined":false,"label":"Overview","labelTranslations":{},"name":"overview","order":11,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"video","labelTranslations":{},"name":"video","order":2,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave Managed Threat Detection and Response (MTDR)","url":"https://www.trustwave.com/en-us/resources/library/videos/trustwave-managed-threat-detection-and-response-mtdr/ "},{"hs_child_table_id":0,"hs_created_at":1734721303917,"hs_deleted_at":0,"hs_id":184128305530,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303917,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/dbprotect-webinarcover.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":14,"isHubspotDefined":false,"label":"Overview","labelTranslations":{},"name":"overview","order":11,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"video","labelTranslations":{},"name":"video","order":2,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave DbProtect: Proactive Database Security","url":"https://www.trustwave.com/en-us/resources/library/videos/trustwave-dbprotect-proactive-database-security/ "},{"hs_child_table_id":0,"hs_created_at":1734721303916,"hs_deleted_at":0,"hs_id":184128305529,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303916,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/how-to-setup-and-schedule-a-self-service-scan4-read-only.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":15,"isHubspotDefined":false,"label":"Demo","labelTranslations":{},"name":"demo","order":12,"type":"option","updatedAt":1731082217142,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"video","labelTranslations":{},"name":"video","order":2,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"How to setup and schedule a self-service scan in the Trustwave Fusion platform","url":"https://www.trustwave.com/en-us/resources/library/videos/how-to-setup-and-schedule-self-service-scan/ "},{"hs_child_table_id":0,"hs_created_at":1734721303915,"hs_deleted_at":0,"hs_id":184128305528,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303915,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/how-to-setup-and-schedule-an-internal-pentration-test-and-associated-vrpt2-read-only.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":15,"isHubspotDefined":false,"label":"Demo","labelTranslations":{},"name":"demo","order":12,"type":"option","updatedAt":1731082217142,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"video","labelTranslations":{},"name":"video","order":2,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"How to setup and schedule an internal penetration test and associated virtual remote penetration testing tool (VRPT)","url":"https://www.trustwave.com/en-us/resources/library/videos/setup-and-schedule-an-internal-penetration-test-and-associated-vrpt/ "},{"hs_child_table_id":0,"hs_created_at":1734721303914,"hs_deleted_at":0,"hs_id":184128305527,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303914,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/webinarcover.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":15,"isHubspotDefined":false,"label":"Demo","labelTranslations":{},"name":"demo","order":12,"type":"option","updatedAt":1731082217142,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"video","labelTranslations":{},"name":"video","order":2,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"How to set-up and schedule a pen test in the Trustwave Fusion Platform","url":"https://www.trustwave.com/en-us/resources/library/videos/how-to-set-up-and-schedule-a-pen-test-in-the-trustwave-fusion-platform/ "},{"hs_child_table_id":0,"hs_created_at":1734721303913,"hs_deleted_at":0,"hs_id":184128305526,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303913,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/brighttalk-mark-webinarcover.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":14,"isHubspotDefined":false,"label":"Overview","labelTranslations":{},"name":"overview","order":11,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1731443056321,"createdByUserId":60505637,"id":15,"isHubspotDefined":false,"label":"Compliance","labelTranslations":{},"name":"compliance","order":1,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"video","labelTranslations":{},"name":"video","order":2,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"The Rising Tide: Regulation and Cybersecurity","url":"https://www.trustwave.com/en-us/resources/library/videos/the-rising-tide-regulation-and-cybersecurity/ "},{"hs_child_table_id":0,"hs_created_at":1734721303911,"hs_deleted_at":0,"hs_id":184128305524,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303911,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/dbprotect-cybercat.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":14,"isHubspotDefined":false,"label":"Overview","labelTranslations":{},"name":"overview","order":11,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"video","labelTranslations":{},"name":"video","order":2,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Reduce Cyber Risk With Trustwave DbProtect","url":"https://www.trustwave.com/en-us/resources/library/videos/reduce-cyber-risk-with-trustwave-dbprotect/ "},{"hs_child_table_id":0,"hs_created_at":1734721303910,"hs_deleted_at":0,"hs_id":184128305523,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303910,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/instagram-landscape.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":14,"isHubspotDefined":false,"label":"Overview","labelTranslations":{},"name":"overview","order":11,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"video","labelTranslations":{},"name":"video","order":2,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Obtaining Complete Cybersecurity Visibility in the Business","url":"https://www.trustwave.com/en-us/resources/library/videos/obtaining-complete-cybersecurity-visibility-in-the-business/ "},{"hs_child_table_id":0,"hs_created_at":1734721303909,"hs_deleted_at":0,"hs_id":184128305522,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303909,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/multi-cloud-bt-webinarcover.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":14,"isHubspotDefined":false,"label":"Overview","labelTranslations":{},"name":"overview","order":11,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"Data Breach","labelTranslations":{},"name":"data_breach","order":2,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"DFIR","labelTranslations":{},"name":"dfir","order":4,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"video","labelTranslations":{},"name":"video","order":2,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Securing the Multi-Cloud in the Age of Threats","url":"https://www.trustwave.com/en-us/resources/library/videos/securing-the-multi-cloud-in-the-age-of-threats/ "},{"hs_child_table_id":0,"hs_created_at":1734721303908,"hs_deleted_at":0,"hs_id":184128305521,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303908,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/dbprotect-2tw-video-cover.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":15,"isHubspotDefined":false,"label":"Demo","labelTranslations":{},"name":"demo","order":12,"type":"option","updatedAt":1731082217142,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"video","labelTranslations":{},"name":"video","order":2,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Reduce the Risk of Insider Threats and Compromised Accounts with DbProtect","url":"https://www.trustwave.com/en-us/resources/library/videos/reduce-the-risk-of-insider-threats-and-compromised-accounts-with-dbprotect/ "},{"hs_child_table_id":0,"hs_created_at":1734721303907,"hs_deleted_at":0,"hs_id":184128305520,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303907,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/dbprotect-1tw-video-cover.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":15,"isHubspotDefined":false,"label":"Demo","labelTranslations":{},"name":"demo","order":12,"type":"option","updatedAt":1731082217142,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"video","labelTranslations":{},"name":"video","order":2,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"DbProtect Scheduling","url":"https://www.trustwave.com/en-us/resources/library/videos/dbprotect-scheduling/ "},{"hs_child_table_id":0,"hs_created_at":1734721303906,"hs_deleted_at":0,"hs_id":184128305519,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303906,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/tw-rebrand-socialmeta.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":15,"isHubspotDefined":false,"label":"Demo","labelTranslations":{},"name":"demo","order":12,"type":"option","updatedAt":1731082217142,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"video","labelTranslations":{},"name":"video","order":2,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Getting Started with AppDetectivePRO","url":"https://www.trustwave.com/en-us/resources/library/videos/getting-started-with-appdetectivepro/ "},{"hs_child_table_id":0,"hs_created_at":1734721303905,"hs_deleted_at":0,"hs_id":184128305518,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303905,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/foodforthought-cover.jpg","altText":"","type":"image"},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":5,"isHubspotDefined":false,"label":"Hospitality","labelTranslations":{},"name":"hospitality","order":4,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":14,"isHubspotDefined":false,"label":"Overview","labelTranslations":{},"name":"overview","order":11,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"video","labelTranslations":{},"name":"video","order":2,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Food for Thought: A Starter’s Guide to Restaurant Cybersecurity","url":"https://www.trustwave.com/en-us/resources/library/videos/food-for-thought-a-starters-guide-to-restaurant-cybersecurity/ "},{"hs_child_table_id":0,"hs_created_at":1734721303904,"hs_deleted_at":0,"hs_id":184128305517,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303904,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/asoc.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":14,"isHubspotDefined":false,"label":"Overview","labelTranslations":{},"name":"overview","order":11,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":11,"isHubspotDefined":false,"label":"SIEM/SOC","labelTranslations":{},"name":"siem_soc","order":11,"type":"option","updatedAt":1731443103341,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"video","labelTranslations":{},"name":"video","order":2,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave Security Operations Centers","url":"https://www.trustwave.com/en-us/resources/library/videos/trustwave-security-operations-centers/ "},{"hs_child_table_id":0,"hs_created_at":1734721303903,"hs_deleted_at":0,"hs_id":184128305516,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303903,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/our-story-video-cover.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":14,"isHubspotDefined":false,"label":"Overview","labelTranslations":{},"name":"overview","order":11,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"video","labelTranslations":{},"name":"video","order":2,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave","url":"https://www.trustwave.com/en-us/resources/library/videos/trustwave/ "},{"hs_child_table_id":0,"hs_created_at":1734721303902,"hs_deleted_at":0,"hs_id":184128305515,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303902,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/scanning-testing-video-cover.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":14,"isHubspotDefined":false,"label":"Overview","labelTranslations":{},"name":"overview","order":11,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"video","labelTranslations":{},"name":"video","order":2,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Scanning and Testing","url":"https://www.trustwave.com/en-us/resources/library/videos/scanning-and-testing/ "},{"hs_child_table_id":0,"hs_created_at":1734721303901,"hs_deleted_at":0,"hs_id":184128305514,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303901,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/image.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":14,"isHubspotDefined":false,"label":"Overview","labelTranslations":{},"name":"overview","order":11,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":11,"isHubspotDefined":false,"label":"SIEM/SOC","labelTranslations":{},"name":"siem_soc","order":11,"type":"option","updatedAt":1731443103341,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"video","labelTranslations":{},"name":"video","order":2,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"A Risk Based Approach to Cybersecurity Maturity","url":"https://www.trustwave.com/en-us/resources/library/videos/a-risk-based-approach-to-cybersecurity-maturity/ "},{"hs_child_table_id":0,"hs_created_at":1734721303900,"hs_deleted_at":0,"hs_id":184128305513,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303900,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/mssp.png","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":14,"isHubspotDefined":false,"label":"Overview","labelTranslations":{},"name":"overview","order":11,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"video","labelTranslations":{},"name":"video","order":2,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave Managed Security Services","url":"https://www.trustwave.com/en-us/resources/library/videos/trustwave-managed-security-services/ "},{"hs_child_table_id":0,"hs_created_at":1734721303899,"hs_deleted_at":0,"hs_id":184128305512,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303899,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/video-mst-intro.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":14,"isHubspotDefined":false,"label":"Overview","labelTranslations":{},"name":"overview","order":11,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"video","labelTranslations":{},"name":"video","order":2,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave Managed Security Testing","url":"https://www.trustwave.com/en-us/resources/library/videos/trustwave-managed-security-testing/ "},{"hs_child_table_id":0,"hs_created_at":1734721303898,"hs_deleted_at":0,"hs_id":184128305511,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303898,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/Web/Webinars/AttackSurfaceMgmt-Social-Meta-BLANK.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Attack Surface Management: Challenges, Myths, and Solutions","url":"https://www.trustwave.com/en-us/resources/library/webinars/attack-surface-management-challenges-myths-and-solutions/ "},{"hs_child_table_id":0,"hs_created_at":1734721303897,"hs_deleted_at":0,"hs_id":184128305510,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303897,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/Web/Webinars/SL-Healthcare-Report-Webinar-Social-Meta%202.webp","altText":"","type":"image"},"industry":{"createdAt":1730396680025,"createdByUserId":60505637,"id":1,"isHubspotDefined":false,"label":"Healthcare","labelTranslations":{},"name":"healthcare","order":3,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Cybersecurity in the Healthcare Industry: Actionable Intelligence for an Active Threat Landscape","url":"https://www.trustwave.com/en-us/resources/library/webinars/threat-briefing-report-healthcare/ "},{"hs_child_table_id":0,"hs_created_at":1734721303896,"hs_deleted_at":0,"hs_id":184128305509,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303896,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/dbss-crownjewels-social-meta-2.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Protecting the Crown Jewels: Why Good Enough is Not Enough in Data Security","url":"https://www.trustwave.com/en-us/resources/library/webinars/protecting-the-crown-jewels-why-good-enough-is-not-enough-in-data-security/ "},{"hs_child_table_id":0,"hs_created_at":1734721303895,"hs_deleted_at":0,"hs_id":184128305508,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303895,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/dbss-deeperdive-webinar-cover.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Deeper Dive: Protecting Your Data in a Hybrid Environment","url":"https://www.trustwave.com/en-us/resources/library/webinars/deeper-dive-protecting-your-data-in-a-hybrid-environment/ "},{"hs_child_table_id":0,"hs_created_at":1734721303894,"hs_deleted_at":0,"hs_id":184128305507,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303894,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/faces-modern-adversary-ams-webinar-cover.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":19,"isHubspotDefined":false,"label":"Artificial Intelligence","labelTranslations":{},"name":"artificial_intelligence","order":0,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"The Many Faces of the Modern Adversary","url":"https://www.trustwave.com/en-us/resources/library/webinars/the-many-faces-of-the-modern-adversary/ "},{"hs_child_table_id":0,"hs_created_at":1734721303893,"hs_deleted_at":0,"hs_id":184128305506,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303893,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/dbss-channel-webinar-social-meta-blank.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Database Security Solutions (DBSS) Channel Webinar","url":"https://www.trustwave.com/en-us/resources/library/webinars/database-security-solutions-dbss-channel-webinar/ "},{"hs_child_table_id":0,"hs_created_at":1734721303892,"hs_deleted_at":0,"hs_id":184128305505,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303892,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/chatgpt-webinar-social-meta-2.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1731443056321,"createdByUserId":60505637,"id":19,"isHubspotDefined":false,"label":"Artificial Intelligence","labelTranslations":{},"name":"artificial_intelligence","order":0,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"ChatGPT: The Risks and Myths of Chatbot AIs","url":"https://www.trustwave.com/en-us/resources/library/webinars/chatgpt-the-risks-and-myths-of-chatbot-ais/ "},{"hs_child_table_id":0,"hs_created_at":1734721303891,"hs_deleted_at":0,"hs_id":184128305504,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303891,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/hybridworld-social-meta-2.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"Data Breach","labelTranslations":{},"name":"data_breach","order":2,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"It's a Hybrid World, Do You Know Where Your Sensitive Data Is?","url":"https://www.trustwave.com/en-us/resources/library/webinars/its-a-hybrid-world-do-you-know-where-your-sensitive-data-is/ "},{"hs_child_table_id":0,"hs_created_at":1734721303890,"hs_deleted_at":0,"hs_id":184128305503,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303890,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/5tips-sd-wan-webinar-cover-1.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"5 Tips for Safeguarding Your SD-WAN","url":"https://www.trustwave.com/en-us/resources/library/webinars/5-tips-for-safeguarding-your-sd-wan/ "},{"hs_child_table_id":0,"hs_created_at":1734721303889,"hs_deleted_at":0,"hs_id":184128305502,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303889,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/tuesdaycompromised-webinar-cover-1.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"It's Tuesday: Do You Know if You’re Compromised?","url":"https://www.trustwave.com/en-us/resources/library/webinars/its-tuesday-do-you-know-if-you-re-compromised/"},{"hs_child_table_id":0,"hs_created_at":1734721303888,"hs_deleted_at":0,"hs_id":184128305501,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303888,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/2023resolutions-social-meta-2-2.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"2023 Cybersecurity Resolutions for Every Organization","url":"https://www.trustwave.com/en-us/resources/library/webinars/2023-cybersecurity-resolutions-for-every-organization/ "},{"hs_child_table_id":0,"hs_created_at":1734721303887,"hs_deleted_at":0,"hs_id":184128305500,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303887,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/2022-12-wbn-amer-emea-2023-threat-predictions-webinar-cover.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Prepare for What’s Next: Cybersecurity Trend Predictions for 2023 & Beyond","url":"https://www.trustwave.com/en-us/resources/library/webinars/prepare-for-whats-next-cybersecurity-trend-predictions-for-2023-and-beyond/ "},{"hs_child_table_id":0,"hs_created_at":1734721303886,"hs_deleted_at":0,"hs_id":184128305499,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303886,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/2022-12-wbn-amer-emea-threat-briefing-webinar-cover.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"[APAC Replay] SpiderLabs Threat Briefing: Cybercrime for Commercialization and Combat","url":"https://www.trustwave.com/en-us/resources/library/webinars/apac-replay-spiderlabs-threat-briefing-cybercrime-for-commercialization-and-combat/ "},{"hs_child_table_id":0,"hs_created_at":1734721303885,"hs_deleted_at":0,"hs_id":184128305498,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303885,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/2022-12-wbn-amer-emea-threat-briefing-webinar-cover%20(1).jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"[AMS/EMEA Replay] SpiderLabs Threat Briefing: Cybercrime for Commercialization and Combat","url":"https://www.trustwave.com/en-us/resources/library/webinars/amsemea-replay-spiderlabs-threat-briefing-cybercrime-for-commercialization-and-combat/ "},{"hs_child_table_id":0,"hs_created_at":1734721303884,"hs_deleted_at":0,"hs_id":184128305497,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303884,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/mm-webinar-webinar-cover.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Layered Security with Trustwave MailMarshal","url":"https://www.trustwave.com/en-us/resources/library/webinars/layered-security-with-trustwave-mailmarshal/ "},{"hs_child_table_id":0,"hs_created_at":1734721303883,"hs_deleted_at":0,"hs_id":184128305496,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303883,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/pentest-dr-webinar-webinar-cover-1.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Penetration Testing, Red Teaming, and More: Improving Your Defenses By Thinking Like an Attacker","url":"https://www.trustwave.com/en-us/resources/library/webinars/penetration-testing-red-teaming-and-more-improving-your-defenses-by-thinking-like-an-attacker/ "},{"hs_child_table_id":0,"hs_created_at":1734721303882,"hs_deleted_at":0,"hs_id":184128305495,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303882,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/cybermesh-webinar-300x150.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"[APAC Replay] Optimising your Cyber Response with a Cyber Mesh Architecture","url":"https://www.trustwave.com/en-us/resources/library/webinars/apac-replay-optimising-your-cyber-response-with-a-cyber-mesh-architecture/ "},{"hs_child_table_id":0,"hs_created_at":1734721303881,"hs_deleted_at":0,"hs_id":184128305494,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303881,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/supply-chain-social-meta-cover-2.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"[Security Panel] Real-World Supply Chain Risk Management","url":"https://www.trustwave.com/en-us/resources/library/webinars/real-world-supply-chain-risk-management/ "},{"hs_child_table_id":0,"hs_created_at":1734721303880,"hs_deleted_at":0,"hs_id":184128305493,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303880,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/russia-ukraine-cyberweapons-webinar-cover-1.jpg","altText":"","type":"image"},"industry":{"createdAt":1730396680025,"createdByUserId":60505637,"id":3,"isHubspotDefined":false,"label":"Government","labelTranslations":{},"name":"government","order":2,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"[APAC Replay] Cyber Weapons Used in the Ukraine-Russia War – Overview and Lessons Learned","url":"https://www.trustwave.com/en-us/resources/library/webinars/apac-replay-cyber-weapons-used-in-the-ukraine-russia-war-overview-and-lessons-learned/ "},{"hs_child_table_id":0,"hs_created_at":1734721303879,"hs_deleted_at":0,"hs_id":184128305492,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303879,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/russia-ukraine-cyberweapons-watch-social-meta-cover.jpg","altText":"","type":"image"},"industry":{"createdAt":1730396680025,"createdByUserId":60505637,"id":3,"isHubspotDefined":false,"label":"Government","labelTranslations":{},"name":"government","order":2,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Briefing: Cyber Weapons Used in the Ukraine-Russia War – Overview and Lessons Learned","url":"https://www.trustwave.com/en-us/resources/library/webinars/briefing-cyber-weapons-used-in-the-ukraine-russia-war-overview-and-lessons-learned/ "},{"hs_child_table_id":0,"hs_created_at":1734721303878,"hs_deleted_at":0,"hs_id":184128305491,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303878,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/lapsus-webinar-cover.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"Data Breach","labelTranslations":{},"name":"data_breach","order":2,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"DFIR","labelTranslations":{},"name":"dfir","order":4,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Lapsus$: The Latest Threat To Your Digital Supply Chain","url":"https://www.trustwave.com/en-us/resources/library/webinars/lapsus-the-latest-threat-to-your-digital-supply-chain/ "},{"hs_child_table_id":0,"hs_created_at":1734721303877,"hs_deleted_at":0,"hs_id":184128305490,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303877,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/ms-licensing-webinar-cover-1.jpg","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":11,"isHubspotDefined":false,"label":"SIEM/SOC","labelTranslations":{},"name":"siem_soc","order":11,"type":"option","updatedAt":1731443103341,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":18,"isHubspotDefined":false,"label":"Microsoft","labelTranslations":{},"name":"microsoft","order":8,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"[APAC Replay] Lessons Learned on Maximising Your Microsoft Security Licensing","url":"https://www.trustwave.com/en-us/resources/library/webinars/apac-replay-lessons-learned-on-maximising-your-microsoft-security-licensing/ "},{"hs_child_table_id":0,"hs_created_at":1734721303876,"hs_deleted_at":0,"hs_id":184128305489,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303876,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/Web/Document%20Images/16392_app-scanner-enterprise-eol-customer-faq-cover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":8,"isHubspotDefined":false,"label":"FAQ","labelTranslations":{},"name":"faq","order":4,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"App Scanner Enterprise End-of-Life FAQ","url":"https://www.trustwave.com/en-us/resources/library/documents/app-scanner-enterprise-end-of-life-faq/"},{"hs_child_table_id":0,"hs_created_at":1734721303875,"hs_deleted_at":0,"hs_id":184128305488,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303875,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hs-fs/hubfs/Web/Document%20Images/13276_6072.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":10,"isHubspotDefined":false,"label":"White Paper","labelTranslations":{},"name":"white paper","order":9,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":18,"isHubspotDefined":false,"label":"Microsoft","labelTranslations":{},"name":"microsoft","order":8,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Better Together: Microsoft Office 365 and Trustwave SEG Cloud - Internal","url":"https://www.trustwave.com/en-us/resources/library/documents/better-together-microsoft-office-365-and-trustwave-seg-cloud-internal/ "},{"hs_child_table_id":0,"hs_created_at":1734721303874,"hs_deleted_at":0,"hs_id":184128305487,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303874,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Software_Trials/16054_bitdefender_rn-softwave_cover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":9,"isHubspotDefined":false,"label":"Spec Sheet","labelTranslations":{},"name":"spec sheet","order":8,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Bitdefender for Marshal Release Notes","url":"https://www.trustwave.com/en-us/resources/library/documents/bitdefender-for-marshal-release-notes/ "},{"hs_child_table_id":0,"hs_created_at":1734721303873,"hs_deleted_at":0,"hs_id":184128305486,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734979489163,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/General/Commune_hotels_participation_agreement.jpg","altText":"Commune_hotels_participation_agreement","fileId":184216089267,"height":886,"type":"image","width":792},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":5,"isHubspotDefined":false,"label":"Hospitality","labelTranslations":{},"name":"hospitality","order":4,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":9,"isHubspotDefined":false,"label":"Spec Sheet","labelTranslations":{},"name":"spec sheet","order":8,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Commune Hotels Participation Agreement","url":"https://www.trustwave.com/en-us/resources/library/documents/commune-hotels-participation-agreement/"},{"hs_child_table_id":0,"hs_created_at":1734721303872,"hs_deleted_at":0,"hs_id":184128305485,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734979670959,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/16658_segcloud-customerguide-cover.jpg","altText":"16658_segcloud-customerguide-cover","fileId":177173964685,"height":544,"type":"image","width":420},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":9,"isHubspotDefined":false,"label":"Spec Sheet","labelTranslations":{},"name":"spec sheet","order":8,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Pre-Provisioning for SEG Cloud","url":"https://www.trustwave.com/en-us/resources/library/documents/pre-provisioning-for-seg-cloud/ "},{"hs_child_table_id":0,"hs_created_at":1734721303871,"hs_deleted_at":0,"hs_id":184128305484,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303871,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Software_Trials/16055_sophos_rn-softwave_cover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":9,"isHubspotDefined":false,"label":"Spec Sheet","labelTranslations":{},"name":"spec sheet","order":8,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Sophos for Marshal Release Notes","url":"https://www.trustwave.com/en-us/resources/library/documents/sophos-for-marshal-release-notes/ "},{"hs_child_table_id":0,"hs_created_at":1734721303870,"hs_deleted_at":0,"hs_id":184128305483,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303870,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/17557_sl-comic-book-cover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":5,"isHubspotDefined":false,"label":"Infographic","labelTranslations":{},"name":"infographic","order":6,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"SpiderLabs Red Team: Operation Bullseye","url":"https://www.trustwave.com/en-us/resources/library/documents/spiderlabs-red-team-operation-bullseye/ "},{"hs_child_table_id":0,"hs_created_at":1734721303869,"hs_deleted_at":0,"hs_id":184128305482,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303869,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Blogs/Blogheaders/15012_channel-partner-program-cover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":6,"isHubspotDefined":false,"label":"Guide","labelTranslations":{},"name":"guide","order":5,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"document","labelTranslations":{},"name":"document","order":1,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Trustwave Channel Partner Program","url":"https://www.trustwave.com/en-us/resources/library/documents/trustwave-channel-partner-program/ "},{"hs_child_table_id":0,"hs_created_at":1734721303868,"hs_deleted_at":0,"hs_id":184128305481,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303868,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/15141_our-story-video-cover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":14,"isHubspotDefined":false,"label":"Overview","labelTranslations":{},"name":"overview","order":11,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"video","labelTranslations":{},"name":"video","order":2,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"2020 Trustwave Corporate Video","url":"https://www.trustwave.com/en-us/resources/library/videos/2020-trustwave-corporate-video/ "},{"hs_child_table_id":0,"hs_created_at":1734721303867,"hs_deleted_at":0,"hs_id":184128305480,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303867,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Blogs/Blogheaders/18571_clientsuccessteam-cover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":14,"isHubspotDefined":false,"label":"Overview","labelTranslations":{},"name":"overview","order":11,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1710180247020,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"video","labelTranslations":{},"name":"video","order":2,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Cyber Success Team","url":"https://www.trustwave.com/en-us/resources/library/videos/cyber-success-team/ "},{"hs_child_table_id":0,"hs_created_at":1734721303866,"hs_deleted_at":0,"hs_id":184128305479,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303866,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/17822_10tipsbreach-webinar-cover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"Data Breach","labelTranslations":{},"name":"data_breach","order":2,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"10 Tips for Breach Resilience","url":"https://www.trustwave.com/en-us/resources/library/webinars/10-tips-for-breach-resilience/"},{"hs_child_table_id":0,"hs_created_at":1734721303865,"hs_deleted_at":0,"hs_id":184128305478,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303865,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/16745_3strategies-webinarcover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"3 Strategies for Assessing and Reducing Data Risks","url":"https://www.trustwave.com/en-us/resources/library/webinars/3-strategies-for-assessing-and-reducing-data-risks/ "},{"hs_child_table_id":0,"hs_created_at":1734721303864,"hs_deleted_at":0,"hs_id":184128305477,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303864,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/18118_emailthreattrends-webinar-cover-2.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"[AMS Replay] Email Threat Trends: New Attacks Hiding in Plain Sight","url":"https://www.trustwave.com/en-us/resources/library/webinars/ams-replay-email-threat-trends-new-attacks-hiding-in-plain-sight/ "},{"hs_child_table_id":0,"hs_created_at":1734721303863,"hs_deleted_at":0,"hs_id":184128305476,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303863,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/18305_deepfakes-webinar-cover-1.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1731443056321,"createdByUserId":60505637,"id":19,"isHubspotDefined":false,"label":"Artificial Intelligence","labelTranslations":{},"name":"artificial_intelligence","order":0,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"[APAC Replay] An Introduction to Deepfakes","url":"https://www.trustwave.com/en-us/resources/library/webinars/apac-replay-an-introduction-to-deepfakes/ "},{"hs_child_table_id":0,"hs_created_at":1734721303862,"hs_deleted_at":0,"hs_id":184128305475,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303862,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/18108_emailthreattrends-webinar-cover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"[APAC Replay] Email Threat Trends: New Attacks Hiding in Plain Sight","url":"https://www.trustwave.com/en-us/resources/library/webinars/apac-replay-email-threat-trends-new-attacks-hiding-in-plain-sight/ "},{"hs_child_table_id":0,"hs_created_at":1734721303861,"hs_deleted_at":0,"hs_id":184128305474,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303861,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/17692_attacksim-webinar-cover-1.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"[APAC Replay] Enhancing your cyber resilience through attack simulation exercises","url":"https://www.trustwave.com/en-us/resources/library/webinars/apac-replay-enhancing-your-cyber-resilience-through-attack-simulation-exercises/ "},{"hs_child_table_id":0,"hs_created_at":1734721303860,"hs_deleted_at":0,"hs_id":184128305473,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303860,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/17973_ms-defender-xdr-webinar-cover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":11,"isHubspotDefined":false,"label":"SIEM/SOC","labelTranslations":{},"name":"siem_soc","order":11,"type":"option","updatedAt":1731443103341,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":18,"isHubspotDefined":false,"label":"Microsoft","labelTranslations":{},"name":"microsoft","order":8,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"[APAC Replay] Evolving from Microsoft Defender to XDR","url":"https://www.trustwave.com/en-us/resources/library/webinars/apac-replay-evolving-from-microsoft-defender-to-xdr/ "},{"hs_child_table_id":0,"hs_created_at":1734721303859,"hs_deleted_at":0,"hs_id":184128305472,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303859,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/18217_masterclasssurviving-webinar-cover-1.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"Data Breach","labelTranslations":{},"name":"data_breach","order":2,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"DFIR","labelTranslations":{},"name":"dfir","order":4,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"[APAC Replay] Masterclass: Surviving a Crisis - A View From the Trenches","url":"https://www.trustwave.com/en-us/resources/library/webinars/apac-replay-masterclass-surviving-a-crisis-a-view-from-the-trenches/ "},{"hs_child_table_id":0,"hs_created_at":1734721303858,"hs_deleted_at":0,"hs_id":184128305471,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303858,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/17911_doubleedgesword-webinar-cover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"[APAC Replay] The double edged sword of supply chain cyber risk","url":"https://www.trustwave.com/en-us/resources/library/webinars/apac-replay-the-double-edged-sword-of-supply-chain-cyber-risk/ "},{"hs_child_table_id":0,"hs_created_at":1734721303857,"hs_deleted_at":0,"hs_id":184128305470,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303857,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/18336_sase-sse-webinar-300x150.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"[APAC Replay] Understanding SASE and SSE","url":"https://www.trustwave.com/en-us/resources/library/webinars/apac-replay-understanding-sase-and-sse/"},{"hs_child_table_id":0,"hs_created_at":1734721303856,"hs_deleted_at":0,"hs_id":184128305469,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303856,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Blogs/Blogheaders/17663_sw-emailheader.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"Data Breach","labelTranslations":{},"name":"data_breach","order":2,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"[APAC Webinar] New SolarWinds Vulnerabilities Discovered by Trustwave SpiderLabs","url":"https://www.trustwave.com/en-us/resources/library/webinars/apac-webinar-new-solarwinds-vulnerabilities-discovered-by-trustwave-spiderlabs/ "},{"hs_child_table_id":0,"hs_created_at":1734721303855,"hs_deleted_at":0,"hs_id":184128305468,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303855,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/16746_cmmc-redux-webinarcover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1731443056321,"createdByUserId":60505637,"id":15,"isHubspotDefined":false,"label":"Compliance","labelTranslations":{},"name":"compliance","order":1,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Automating CMMC and Other Regulatory Frameworks","url":"https://www.trustwave.com/en-us/resources/library/webinars/automating-cmmc-and-other-regulatory-frameworks/ "},{"hs_child_table_id":0,"hs_created_at":1734721303854,"hs_deleted_at":0,"hs_id":184128305467,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303854,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/16593_barbarians-webinarcover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"Data Breach","labelTranslations":{},"name":"data_breach","order":2,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Barbarians at the Gate: Secure Your Data Before the Next Breach","url":"https://www.trustwave.com/en-us/resources/library/webinars/barbarians-at-the-gate-secure-your-data-before-the-next-breach/ "},{"hs_child_table_id":0,"hs_created_at":1734721303853,"hs_deleted_at":0,"hs_id":184128305466,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303853,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/14279_gdpr_us_webinarcoverb.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1731443056321,"createdByUserId":60505637,"id":15,"isHubspotDefined":false,"label":"Compliance","labelTranslations":{},"name":"compliance","order":1,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Blueprint for Building a Strategic GDPR Framework (Americas)","url":"https://www.trustwave.com/en-us/resources/library/webinars/blueprint-for-building-a-strategic-gdpr-framework-americas/ "},{"hs_child_table_id":0,"hs_created_at":1734721303852,"hs_deleted_at":0,"hs_id":184128305465,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303852,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/14289_gdpr_blueprint_webinarcover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1731443056321,"createdByUserId":60505637,"id":15,"isHubspotDefined":false,"label":"Compliance","labelTranslations":{},"name":"compliance","order":1,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Blueprint for Building a Strategic GDPR Framework (EMEA)","url":"https://www.trustwave.com/en-us/resources/library/webinars/blueprint-for-building-a-strategic-gdpr-framework-emea/ "},{"hs_child_table_id":0,"hs_created_at":1734721303851,"hs_deleted_at":0,"hs_id":184128305464,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303851,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/18150_panw-cloudsecurity-webinar-cover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Cloud Security for the Modern World","url":"https://www.trustwave.com/en-us/resources/library/webinars/cloud-security-for-the-modern-world/ "},{"hs_child_table_id":0,"hs_created_at":1734721303850,"hs_deleted_at":0,"hs_id":184128305463,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303850,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Blogs/Social/16755_corecompetencies-socialmeta-1.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Core Components of a Secure Remote Worker Maturity Model","url":"https://www.trustwave.com/en-us/resources/library/webinars/core-components-of-a-secure-remote-worker-maturity-model/ "},{"hs_child_table_id":0,"hs_created_at":1734721303849,"hs_deleted_at":0,"hs_id":184128305462,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303849,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/16608_covid-biscont-webinarcover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"COVID-19: Four Underestimated Parts of Your Security Operations Business Continuity Plan","url":"https://www.trustwave.com/en-us/resources/library/webinars/covid-19-four-underestimated-parts-of-your-security-operations-business-continuity-plan/ "},{"hs_child_table_id":0,"hs_created_at":1734721303848,"hs_deleted_at":0,"hs_id":184128305461,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303848,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/16618_covid-newlandscape-webinarcover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"COVID-19: The New Threat Landscape [APAC]","url":"https://www.trustwave.com/en-us/resources/library/webinars/covid-19-the-new-threat-landscape-apac/"},{"hs_child_table_id":0,"hs_created_at":1734721303847,"hs_deleted_at":0,"hs_id":184128305460,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303847,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/16618_covid-newlandscape-webinarcover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"COVID-19: The New Threat Landscape","url":"https://www.trustwave.com/en-us/resources/library/webinars/covid-19-the-new-threat-landscape/ "},{"hs_child_table_id":0,"hs_created_at":1734721303845,"hs_deleted_at":0,"hs_id":184128305458,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303845,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/16403_osterman-webinarcover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Don’t let online miscreants compromise your organization","url":"https://www.trustwave.com/en-us/resources/library/webinars/don-t-let-online-miscreants-compromise-your-organization/ "},{"hs_child_table_id":0,"hs_created_at":1734721303844,"hs_deleted_at":0,"hs_id":184128305457,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303844,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/WEB_17786_msdefender-webinar-cover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":11,"isHubspotDefined":false,"label":"SIEM/SOC","labelTranslations":{},"name":"siem_soc","order":11,"type":"option","updatedAt":1731443103341,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":18,"isHubspotDefined":false,"label":"Microsoft","labelTranslations":{},"name":"microsoft","order":8,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"[EMEA Webinar] How Trustwave helps empower Microsoft Defender for Endpoint & Azure Sentinel","url":"https://www.trustwave.com/en-us/resources/library/webinars/emea-webinar-how-trustwave-helps-empower-microsoft-defender-for-endpoint-azure-sentinel/ "},{"hs_child_table_id":0,"hs_created_at":1734721303843,"hs_deleted_at":0,"hs_id":184128305456,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303843,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/WEB_17784_ms-xdr-defender-webinar-cover-1.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":18,"isHubspotDefined":false,"label":"Microsoft","labelTranslations":{},"name":"microsoft","order":8,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Evolving to XDR from EDR: How to do it and why it matters","url":"https://www.trustwave.com/en-us/resources/library/webinars/evolving-to-xdr-from-edr-how-to-do-it-and-why-it-matters/ "},{"hs_child_table_id":0,"hs_created_at":1734721303842,"hs_deleted_at":0,"hs_id":184128305455,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303842,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/17650_nist-cmmc-webinar-cover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1731443056321,"createdByUserId":60505637,"id":15,"isHubspotDefined":false,"label":"Compliance","labelTranslations":{},"name":"compliance","order":1,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"From NIST 800-171 to CMMC: The Roadmap to Ensuring DoD Contract Wins","url":"https://www.trustwave.com/en-us/resources/library/webinars/from-nist-800-171-to-cmmc-the-roadmap-to-ensuring-dod-contract-wins/ "},{"hs_child_table_id":0,"hs_created_at":1734721303841,"hs_deleted_at":0,"hs_id":184128305454,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303841,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Defaults/DEF_15281_generic-default-image.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1731443056321,"createdByUserId":60505637,"id":15,"isHubspotDefined":false,"label":"Compliance","labelTranslations":{},"name":"compliance","order":1,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"GDPR: What Matters and How to Address It","url":"https://www.trustwave.com/en-us/resources/library/webinars/gdpr-what-matters-and-how-to-address-it/ "},{"hs_child_table_id":0,"hs_created_at":1734721303840,"hs_deleted_at":0,"hs_id":184128305453,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303840,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/14279_gdpr_us_webinarcoverb.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1731443056321,"createdByUserId":60505637,"id":15,"isHubspotDefined":false,"label":"Compliance","labelTranslations":{},"name":"compliance","order":1,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"GDPR: What U.S Businesses Need to Know","url":"https://www.trustwave.com/en-us/resources/library/webinars/gdpr-what-us-businesses-need-to-know/ "},{"hs_child_table_id":0,"hs_created_at":1734721303839,"hs_deleted_at":0,"hs_id":184128305452,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303839,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/16910_goldenspy-webinarcover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"GoldenSpy Threat: How to Protect Your Company","url":"https://www.trustwave.com/en-us/resources/library/webinars/goldenspy-threat-how-to-protect-your-company-amer-emea/"},{"hs_child_table_id":0,"hs_created_at":1734721303838,"hs_deleted_at":0,"hs_id":184128305451,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303838,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/17912_siem-extinct-webinar-cover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":11,"isHubspotDefined":false,"label":"SIEM/SOC","labelTranslations":{},"name":"siem_soc","order":11,"type":"option","updatedAt":1731443103341,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":18,"isHubspotDefined":false,"label":"Microsoft","labelTranslations":{},"name":"microsoft","order":8,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Is SIEM Heading for Extinction?","url":"https://www.trustwave.com/en-us/resources/library/webinars/is-siem-heading-for-extinction/ "},{"hs_child_table_id":0,"hs_created_at":1734721303837,"hs_deleted_at":0,"hs_id":184128305450,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303837,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Blogs/Social/BSO_16333_global-webinarapj-socialmeta_2019.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Know your enemy: A proactive security approach","url":"https://www.trustwave.com/en-us/resources/library/webinars/know-your-enemy-a-proactive-security-approach/ "},{"hs_child_table_id":0,"hs_created_at":1734721303836,"hs_deleted_at":0,"hs_id":184128305449,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303836,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Blogs/Social/16755_corecompetencies-socialmeta-1.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Lessons Learned Securing Organisations Against COVID-19 Cyber Threats [APAC Time Zone]","url":"https://www.trustwave.com/en-us/resources/library/webinars/lessons-learned-securing-organisations-against-covid-19-cyber-threats-apac-time-zone/ "},{"hs_child_table_id":0,"hs_created_at":1734721303835,"hs_deleted_at":0,"hs_id":184128305448,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303835,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/17971_hybridworld-webinar-cover-1.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Magnify Your Visibility in a Hybrid World","url":"https://www.trustwave.com/en-us/resources/library/webinars/magnify-your-visibility-in-a-hybrid-world/ "},{"hs_child_table_id":0,"hs_created_at":1734721303834,"hs_deleted_at":0,"hs_id":184128305447,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303834,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/WEB_17793_panw-tw-roundtable-webinar-cover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Palo Alto Networks and Trustwave: Tackling Customers' Evolving Cybersecurity Needs","url":"https://www.trustwave.com/en-us/resources/library/webinars/palo-alto-networks-and-trustwave-tackling-customers-evolving-cybersecurity-needs/ "},{"hs_child_table_id":0,"hs_created_at":1734721303833,"hs_deleted_at":0,"hs_id":184128305446,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303833,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/16412_sts-1-webinarcover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Part 1: Advance Your Security Maturity Through Testing","url":"https://www.trustwave.com/en-us/resources/library/webinars/part-1-advance-your-security-maturity-through-testing/ "},{"hs_child_table_id":0,"hs_created_at":1734721303832,"hs_deleted_at":0,"hs_id":184128305445,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303832,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/17578_preparecmmc-webinar-cover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1731443056321,"createdByUserId":60505637,"id":15,"isHubspotDefined":false,"label":"Compliance","labelTranslations":{},"name":"compliance","order":1,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Prepare Your Organization for CMMC","url":"https://www.trustwave.com/en-us/resources/library/webinars/prepare-your-organization-for-cmmc/ "},{"hs_child_table_id":0,"hs_created_at":1734721303831,"hs_deleted_at":0,"hs_id":184128305444,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303831,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Events/18295_spark-300x150-1.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"Data Breach","labelTranslations":{},"name":"data_breach","order":2,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Ransomware Attacks and Their Reflection on the Dark Web","url":"https://www.trustwave.com/en-us/resources/library/webinars/ransomware-attacks-and-their-reflection-on-the-dark-web/ "},{"hs_child_table_id":0,"hs_created_at":1734721303830,"hs_deleted_at":0,"hs_id":184128305443,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303830,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/18195_ransomware-scmedia-webinar-cover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Ransomware Protection for Your Hybrid Environment","url":"https://www.trustwave.com/en-us/resources/library/webinars/ransomware-protection-for-your-hybrid-environment/ "},{"hs_child_table_id":0,"hs_created_at":1734721303829,"hs_deleted_at":0,"hs_id":184128305442,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303829,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/17827_redteamrules-webinar-cover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"Data Breach","labelTranslations":{},"name":"data_breach","order":2,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Red Team Rules: The Importance of Human-Led Testing","url":"https://www.trustwave.com/en-us/resources/library/webinars/red-team-rules-the-importance-of-human-led-testing/ "},{"hs_child_table_id":0,"hs_created_at":1734721303828,"hs_deleted_at":0,"hs_id":184128305441,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303828,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/18472_aus-tw-ukraine-response-webinar-cover.webp","altText":"","type":"image"},"industry":{"createdAt":1730396680025,"createdByUserId":60505637,"id":3,"isHubspotDefined":false,"label":"Government","labelTranslations":{},"name":"government","order":2,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"AMS Briefing: Russia-Ukraine Crisis – Defending Your Organization from Geopolitical Cybersecurity Threats","url":"https://www.trustwave.com/en-us/resources/library/webinars/russia-ukraine-crisis-defending-your-organization-from-geopolitical-cybersecurity-threats/ "},{"hs_child_table_id":0,"hs_created_at":1734721303827,"hs_deleted_at":0,"hs_id":184128305440,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303827,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/18083_securenation-webinar-cover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Secure Your Organization Like the Nation Depends on It","url":"https://www.trustwave.com/en-us/resources/library/webinars/secure-your-organization-like-the-nation-depends-on-it/ "},{"hs_child_table_id":0,"hs_created_at":1734721303826,"hs_deleted_at":0,"hs_id":184128305439,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303826,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/18093_securing-hybrid-webinar-cover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"Data Breach","labelTranslations":{},"name":"data_breach","order":2,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Securing Hybrid Environments","url":"https://www.trustwave.com/en-us/resources/library/webinars/securing-hybrid-environments/ "},{"hs_child_table_id":0,"hs_created_at":1734721303825,"hs_deleted_at":0,"hs_id":184128305438,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303825,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/16548_sm-webinar-emea-webinarcover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"Data Breach","labelTranslations":{},"name":"data_breach","order":2,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Security Maturity And How To Get There","url":"https://www.trustwave.com/en-us/resources/library/webinars/security-maturity-and-how-to-get-there/ "},{"hs_child_table_id":0,"hs_created_at":1734721303824,"hs_deleted_at":0,"hs_id":184128305437,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303824,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Webinar%20Images/brighttalk-nov-summit-cover.jpg","altText":"","fileId":164084959293,"height":675,"type":"image","width":1200},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":15,"isHubspotDefined":false,"label":"Compliance","labelTranslations":{},"name":"compliance","order":1,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Tactics, Techniques and Procedures to Protect Your Company Against Past and Future Threats","url":"https://www.trustwave.com/en-us/resources/library/webinars/tactics-techniques-and-procedures-to-protect-your-company-against-past-and-future-threats/ "},{"hs_child_table_id":0,"hs_created_at":1734721303823,"hs_deleted_at":0,"hs_id":184128305436,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303823,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/14273_security-maturity_webinar-cover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Security Maturity: Expert Insights and Solutions","url":"https://www.trustwave.com/en-us/resources/library/webinars/security-maturity-expert-insights-and-solutions/ "},{"hs_child_table_id":0,"hs_created_at":1734721303822,"hs_deleted_at":0,"hs_id":184128305435,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303822,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Webinar%20Images/email-laptop-webinarcover.png","altText":"","fileId":164087039861,"height":490,"type":"image","width":870},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":18,"isHubspotDefined":false,"label":"Microsoft","labelTranslations":{},"name":"microsoft","order":8,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Best Practices Demo: Trustwave Email Archiving","url":"https://www.trustwave.com/en-us/resources/library/webinars/best-practices-demo-trustwave-email-archiving/ "},{"hs_child_table_id":0,"hs_created_at":1734721303821,"hs_deleted_at":0,"hs_id":184128305434,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303821,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Document_Images/13192_7330.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"DFIR","labelTranslations":{},"name":"dfir","order":4,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"The Security Survival Guide for Growing Businesses","url":"https://www.trustwave.com/en-us/resources/library/webinars/security-survival-guide-for-growing-businesses/ "},{"hs_child_table_id":0,"hs_created_at":1734721303820,"hs_deleted_at":0,"hs_id":184128305433,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303820,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Webinar%20Images/sts-2-webinarcover.jpg","altText":"","fileId":164080664999,"height":490,"type":"image","width":870},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Part 2: Security Testing Best Practices Demo","url":"https://www.trustwave.com/en-us/resources/library/webinars/part-2-security-testing-best-practices-demo/ "},{"hs_child_table_id":0,"hs_created_at":1734721303819,"hs_deleted_at":0,"hs_id":184128305432,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303819,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Webinar%20Images/emergingthreats_webinarcover.jpg","altText":"","fileId":164084651646,"height":490,"type":"image","width":870},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":4,"isHubspotDefined":false,"label":"Financial Services","labelTranslations":{},"name":"financial_services","order":1,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Emerging Threats","url":"https://www.trustwave.com/en-us/resources/library/webinars/emerging-threats/ "},{"hs_child_table_id":0,"hs_created_at":1734721303818,"hs_deleted_at":0,"hs_id":184128305431,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303818,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Webinar%20Images/cloud-jan2020-webinarcover.jpg","altText":"","fileId":164080289608,"height":490,"type":"image","width":870},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Navigating Multi-Cloud Security Complexity Today","url":"https://www.trustwave.com/en-us/resources/library/webinars/navigating-multi-cloud-security-complexity-today/ "},{"hs_child_table_id":0,"hs_created_at":1734721303817,"hs_deleted_at":0,"hs_id":184128305430,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303817,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Webinar%20Images/cyberpitfalls-socialmeta-1.jpg","altText":"","fileId":164080309805,"height":630,"type":"image","width":1200},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Cybersecurity Pitfalls and Remediation Recommendations","url":"https://www.trustwave.com/en-us/resources/library/webinars/cybersecurity-pitfalls-and-remediation-recommendations/ "},{"hs_child_table_id":0,"hs_created_at":1734721303816,"hs_deleted_at":0,"hs_id":184128305429,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303816,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Webinar%20Images/covid-newlandscape-webinarcover-apj-1.jpg","altText":"","fileId":164080401302,"height":490,"type":"image","width":870},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"Data Breach","labelTranslations":{},"name":"data_breach","order":2,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"[APAC WEBINAR] Secure your modern workforce with a proven remote access solution, hosted by Trustwave and Palo Alto Networks","url":"https://www.trustwave.com/en-us/resources/library/webinars/secure-your-modern-workforce-with-a-proven-remote-access-solution/ "},{"hs_child_table_id":0,"hs_created_at":1734721303815,"hs_deleted_at":0,"hs_id":184128305428,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303815,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Webinar%20Images/level3-webinarcover.jpg","altText":"","fileId":163940414373,"height":490,"type":"image","width":870},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Level 3: Magnified Visibility for Threat Detection & Response","url":"https://www.trustwave.com/en-us/resources/library/webinars/level-3-magnified-visibility-for-threat-detection-and-response/ "},{"hs_child_table_id":0,"hs_created_at":1734721303814,"hs_deleted_at":0,"hs_id":184128305427,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303814,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Webinar%20Images/XSOAR.png","altText":"","fileId":163941601924,"height":412,"type":"image","width":766},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Level 2: What Can XSOAR Do for You?","url":"https://www.trustwave.com/en-us/resources/library/webinars/level-2-what-can-xsoar-do-for-you/ "},{"hs_child_table_id":0,"hs_created_at":1734721303813,"hs_deleted_at":0,"hs_id":184128305426,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303813,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Webinar%20Images/level1-edi-webinarcover-1.jpg","altText":"","fileId":164070459243,"height":490,"type":"image","width":870},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Level 1: Endpoint Detection and Investigation Game Plan","url":"https://www.trustwave.com/en-us/resources/library/webinars/level-1-endpoint-detection-and-investigation-game-plan/ "},{"hs_child_table_id":0,"hs_created_at":1734721303812,"hs_deleted_at":0,"hs_id":184128305425,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303812,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Webinar%20Images/level0-edr-socialmeta-1.jpg","altText":"","fileId":164080060335,"height":630,"type":"image","width":1200},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Level 0: Revisiting Your Endpoint Security","url":"https://www.trustwave.com/en-us/resources/library/webinars/level-0-revisiting-your-endpoint-security/ "},{"hs_child_table_id":0,"hs_created_at":1734721303811,"hs_deleted_at":0,"hs_id":184128305424,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303811,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Webinar%20Images/testbeyondtech-webinar-cover-1.jpg","altText":"","fileId":163948293422,"height":490,"type":"image","width":870},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Test Beyond Tech","url":"https://www.trustwave.com/en-us/resources/library/webinars/test-beyond-tech/ "},{"hs_child_table_id":0,"hs_created_at":1734721303810,"hs_deleted_at":0,"hs_id":184128305423,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303810,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Webinar%20Images/dosdonts_webinar_cover.jpg","altText":"","fileId":164195437992,"height":490,"type":"image","width":870},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1731443056321,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"Data Breach","labelTranslations":{},"name":"data_breach","order":2,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"DFIR","labelTranslations":{},"name":"dfir","order":4,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Security Breach Do’s and Don’ts to Minimize Damage and Downtime","url":"https://www.trustwave.com/en-us/resources/library/webinars/security-breach-dos-and-donts-to-minimize-damage-and-downtime/ "},{"hs_child_table_id":0,"hs_created_at":1734721303809,"hs_deleted_at":0,"hs_id":184128305422,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303809,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Webinar%20Images/nist-cmmc-followup-webinar-cover.jpg","altText":"","fileId":163943064476,"height":490,"type":"image","width":870},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1731443056321,"createdByUserId":60505637,"id":15,"isHubspotDefined":false,"label":"Compliance","labelTranslations":{},"name":"compliance","order":1,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"From NIST 800-171 to CMMC: Follow-up Q&A Session","url":"https://www.trustwave.com/en-us/resources/library/webinars/from-nist-800-171-to-cmmc-follow-up-qa-session/ "},{"hs_child_table_id":0,"hs_created_at":1734721303808,"hs_deleted_at":0,"hs_id":184128305421,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303808,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Webinar%20Images/sw2-webinar-cover-1.jpg","altText":"","fileId":163949593610,"height":490,"type":"image","width":870},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"Data Breach","labelTranslations":{},"name":"data_breach","order":2,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Overview of New SolarWinds Vulnerabilities Discovered by Trustwave SpiderLabs","url":"https://www.trustwave.com/en-us/resources/library/webinars/overview-of-new-solarwinds-vulnerabilities-discovered-by-trustwave-spiderlabs/ "},{"hs_child_table_id":0,"hs_created_at":1734721303807,"hs_deleted_at":0,"hs_id":184128305420,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303807,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Webinar%20Images/ms-partnerwebinar-webcover-1.jpg","altText":"","fileId":163949595455,"height":490,"type":"image","width":870},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":18,"isHubspotDefined":false,"label":"Microsoft","labelTranslations":{},"name":"microsoft","order":8,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Modernize your Security Operations","url":"https://www.trustwave.com/en-us/resources/library/webinars/modernize-your-security-operations/ "},{"hs_child_table_id":0,"hs_created_at":1734721303806,"hs_deleted_at":0,"hs_id":184128305419,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303806,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Webinar%20Images/dbsecurity_webinarcover.jpg","altText":"","fileId":164176707371,"height":490,"type":"image","width":870},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Access Granted or Denied: Framework for Effective User Rights Management","url":"https://www.trustwave.com/en-us/resources/library/webinars/access-granted-or-denied-framework-for-effective-user-rights-management/ "},{"hs_child_table_id":0,"hs_created_at":1734721303805,"hs_deleted_at":0,"hs_id":184128305418,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303805,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/17038_testing2020-webinarcover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Security Testing in 2020. The old and the new.","url":"https://www.trustwave.com/en-us/resources/library/webinars/security-testing-in-2020-the-old-and-the-new/ "},{"hs_child_table_id":0,"hs_created_at":1734721303804,"hs_deleted_at":0,"hs_id":184128305417,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303804,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Webinar%20Images/cont-comp-webinarcover.jpg","altText":"","fileId":163960976389,"height":490,"type":"image","width":870},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":15,"isHubspotDefined":false,"label":"Compliance","labelTranslations":{},"name":"compliance","order":1,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"[APAC] Securing your digital business through continuous compliance","url":"https://www.trustwave.com/en-us/resources/library/webinars/apac-securing-your-digital-business-through-continuous-compliance/ "},{"hs_child_table_id":0,"hs_created_at":1734721303803,"hs_deleted_at":0,"hs_id":184128305416,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303803,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Webinar%20Images/doubletrouble-webinarcover.jpg","altText":"","fileId":163961797691,"height":490,"type":"image","width":870},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"Data Breach","labelTranslations":{},"name":"data_breach","order":2,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"[Pacific] Double Trouble: Ransomware and Business Email Compromise","url":"https://www.trustwave.com/en-us/resources/library/webinars/pacific-double-trouble-ransomware-and-business-email-compromise/ "},{"hs_child_table_id":0,"hs_created_at":1734721303802,"hs_deleted_at":0,"hs_id":184128305415,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303802,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Webinar%20Images/crimetime-webinarcover.png","altText":"","fileId":164068639304,"height":490,"type":"image","width":870},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Crime Time: The Impact of COVID-19 on the Underground Economy","url":"https://www.trustwave.com/en-us/resources/library/webinars/crime-time-the-impact-of-covid-19-on-the-underground-economy/ "},{"hs_child_table_id":0,"hs_created_at":1734721303801,"hs_deleted_at":0,"hs_id":184128305414,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303801,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Webinar%20Images/trustwave-social_on-demand.png","altText":"","fileId":164071758209,"height":630,"type":"image","width":1200},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"The forced evolution of MSSPs: What's next?","url":"https://www.trustwave.com/en-us/resources/library/webinars/the-forced-evolution-of-mssps-whats-next/ "},{"hs_child_table_id":0,"hs_created_at":1734721303800,"hs_deleted_at":0,"hs_id":184128305413,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303800,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Webinar%20Images/healthcare_webinar_cover2017.jpg","altText":"","fileId":164189376543,"height":490,"type":"image","width":870},"industry":{"createdAt":1730396680025,"createdByUserId":60505637,"id":1,"isHubspotDefined":false,"label":"Healthcare","labelTranslations":{},"name":"healthcare","order":3,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"The Framework of Hard-to-Detect Attacks on Health Care Databases","url":"https://www.trustwave.com/en-us/resources/library/webinars/the-framework-of-hard-to-detect-attacks-on-health-care-databases/ "},{"hs_child_table_id":0,"hs_created_at":1734721303799,"hs_deleted_at":0,"hs_id":184128305412,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303799,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Webinar%20Images/avant-spotlight-kory-webinar-cover.jpg","altText":"","fileId":163961226933,"height":490,"type":"image","width":870},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"We eradicate threats. All day. Every day.","url":"https://www.trustwave.com/en-us/resources/library/webinars/we-eradicate-threats-all-day-every-day/ "},{"hs_child_table_id":0,"hs_created_at":1734721303798,"hs_deleted_at":0,"hs_id":184128305411,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303798,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Webinar%20Images/cisorace_webinarcover.jpg","altText":"","fileId":164182872198,"height":490,"type":"image","width":870},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"DFIR","labelTranslations":{},"name":"dfir","order":4,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"The Great CISO Race: Better Your Odds in Achieving Security Maturity","url":"https://www.trustwave.com/en-us/resources/library/webinars/the-great-ciso-race-better-your-odds-in-achieving-security-maturity/ "},{"hs_child_table_id":0,"hs_created_at":1734721303797,"hs_deleted_at":0,"hs_id":184128305410,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303797,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Webinar%20Images/trends-impacting-it-auditing-webinar-cover.jpg","altText":"","fileId":163948860769,"height":490,"type":"image","width":870},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Data Security Trends Impacting IT Auditing","url":"https://www.trustwave.com/en-us/resources/library/webinars/data-security-trends-impacting-it-auditing/ "},{"hs_child_table_id":0,"hs_created_at":1734721303796,"hs_deleted_at":0,"hs_id":184128305409,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303796,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Webinar%20Images/dbsecurity_webinarcover.jpg","altText":"","fileId":164176707371,"height":490,"type":"image","width":870},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"When Patching isn’t Enough: Methods to Properly Manage Vulnerabilities","url":"https://www.trustwave.com/en-us/resources/library/webinars/when-patching-isnt-enough-methods-to-properly-manage-vulnerabilities/ "},{"hs_child_table_id":0,"hs_created_at":1734721303795,"hs_deleted_at":0,"hs_id":184128305408,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303795,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Webinar%20Images/tgs-webinar-socialmeta.jpg","altText":"","fileId":163965813157,"height":620,"type":"image","width":1200},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":12,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"GoldenSpy: Hunting Threats and Understanding Your Risks","url":"https://www.trustwave.com/en-us/resources/library/webinars/goldenspy-hunting-threats-and-understanding-your-risks/ "},{"hs_child_table_id":0,"hs_created_at":1734721303794,"hs_deleted_at":0,"hs_id":184128305337,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303794,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Webinar%20Images/zerotrust-webinarcover.jpg","altText":"","fileId":163964973849,"height":490,"type":"image","width":870},"industry":{"createdAt":1730396680025,"createdByUserId":60505637,"id":3,"isHubspotDefined":false,"label":"Government","labelTranslations":{},"name":"government","order":2,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"[Australia] A case for Zero Trust network security - a briefing for local councils","url":"https://www.trustwave.com/en-us/resources/library/webinars/australia-a-case-for-zero-trust-network-security-a-briefing-for-local-councils/ "},{"hs_child_table_id":0,"hs_created_at":1734721303793,"hs_deleted_at":0,"hs_id":184128305336,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303793,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/15935_webinar-security-testing-report.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Security Testing Report: Analyzing the Top Trends","url":"https://www.trustwave.com/en-us/resources/library/webinars/security-testing-report-analyzing-the-top-trends/ "},{"hs_child_table_id":0,"hs_created_at":1734721303792,"hs_deleted_at":0,"hs_id":184128305335,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303792,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/18000_slowbroken-webinar-cover-1.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Slow is the New Broken: Accelerating your Cloud Security","url":"https://www.trustwave.com/en-us/resources/library/webinars/slow-is-the-new-broken-accelerating-your-cloud-security/ "},{"hs_child_table_id":0,"hs_created_at":1734721303791,"hs_deleted_at":0,"hs_id":184128305334,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303791,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/18403_ageofmssp-webinar-cover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":7,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"The Age of MSSPs: Uncovering the Why’s of Managed Services","url":"https://www.trustwave.com/en-us/resources/library/webinars/the-age-of-mssps-uncovering-the-whys-of-managed-services/ "},{"hs_child_table_id":0,"hs_created_at":1734721303790,"hs_deleted_at":0,"hs_id":184128305333,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303790,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/17823_assumebreach-webinar-cover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"Data Breach","labelTranslations":{},"name":"data_breach","order":2,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"The Attackers Already Know Your \"Assume Breach\" Strategy","url":"https://www.trustwave.com/en-us/resources/library/webinars/the-attackers-already-know-your-assume-breach-strategy/ "},{"hs_child_table_id":0,"hs_created_at":1734721303789,"hs_deleted_at":0,"hs_id":184128305332,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303789,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/14699_webinar-internet-of-things.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"The Internet of Things Revolution: What Lurks in the Shadows?","url":"https://www.trustwave.com/en-us/resources/library/webinars/the-internet-of-things-revolution-what-lurks-in-the-shadows/ "},{"hs_child_table_id":0,"hs_created_at":1734721303788,"hs_deleted_at":0,"hs_id":184128305331,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303788,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/14267_tdr_webinar_cover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":6,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Threat Detection and Response Best Practices","url":"https://www.trustwave.com/en-us/resources/library/webinars/threat-detection-and-response-best-practices/ "},{"hs_child_table_id":0,"hs_created_at":1734721303787,"hs_deleted_at":0,"hs_id":184128305330,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303787,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Webinar%20Images/webinar-secure-in-swg.jpg","altText":"","fileId":164191637054,"height":490,"type":"image","width":870},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Six Ways to Put Secure Back in Secure Web Gateways","url":"https://www.trustwave.com/en-us/resources/library/webinars/six-ways-to-put-secure-back-in-secure-web-gateways/ "},{"hs_child_table_id":0,"hs_created_at":1734721303786,"hs_deleted_at":0,"hs_id":184128305329,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303786,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Webinar%20Images/dfir-webinarcover.jpg","altText":"","fileId":164163871625,"height":490,"type":"image","width":870},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1731443056321,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"DFIR","labelTranslations":{},"name":"dfir","order":4,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Tips to Maximize the Value of a DFIR Retainer","url":"https://www.trustwave.com/en-us/resources/library/webinars/tips-to-maximize-the-value-of-a-dfir-retainer/ "},{"hs_child_table_id":0,"hs_created_at":1734721303785,"hs_deleted_at":0,"hs_id":184128305328,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303785,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Blogs/Trustwave/14265_managing-it-risk.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"Data Breach","labelTranslations":{},"name":"data_breach","order":2,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Unbreakable Rules for Managing IT Risk: What Every CISO Should Know","url":"https://www.trustwave.com/en-us/resources/library/webinars/unbreakable-rules-for-managing-it-risk-what-every-ciso-should-know/"},{"hs_child_table_id":0,"hs_created_at":1734721303784,"hs_deleted_at":0,"hs_id":184128305327,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303784,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/WEB_14266_webinar-2016gsr.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"Data Breach","labelTranslations":{},"name":"data_breach","order":2,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Understand Cybercrime Trends and Tactics to Defend Against Them","url":"https://www.trustwave.com/en-us/resources/library/webinars/understand-cybercrime-trends-and-tactics-to-defend-against-them/ "},{"hs_child_table_id":0,"hs_created_at":1734721303783,"hs_deleted_at":0,"hs_id":184128305326,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303783,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Webinar%20Images/webinar-web-app-security.jpg","altText":"","fileId":164189392039,"height":490,"type":"image","width":870},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Web Application Security","url":"https://www.trustwave.com/en-us/resources/library/webinars/web-application-security/ "},{"hs_child_table_id":0,"hs_created_at":1734721303782,"hs_deleted_at":0,"hs_id":184128305325,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303782,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Blogs/Social/16824_why-patch-if-you-dont-fix-it-socialmeta.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Why Patch if You Don’t Fix It?","url":"https://www.trustwave.com/en-us/resources/library/webinars/why-patch-if-you-dont-fix-it/"},{"hs_child_table_id":0,"hs_created_at":1734721303781,"hs_deleted_at":0,"hs_id":184128305324,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303781,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Webinar%20Images/db-webinarcover.jpg","altText":"","fileId":164294762296,"height":490,"type":"image","width":870},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"Data Breach","labelTranslations":{},"name":"data_breach","order":2,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Reducing Database Exposure","url":"https://www.trustwave.com/en-us/resources/library/webinars/reducing-database-exposure/ "},{"hs_child_table_id":0,"hs_created_at":1734721303780,"hs_deleted_at":0,"hs_id":184128305323,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303780,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Webinar%20Images/webinar-modern-cybercrime.jpg","altText":"","fileId":164297023005,"height":490,"type":"image","width":870},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":3,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Modern Cybercrime: Staying Ahead of the Perfect Storm","url":"https://www.trustwave.com/en-us/resources/library/webinars/modern-cybercrime-staying-ahead-of-the-perfect-storm/ "},{"hs_child_table_id":0,"hs_created_at":1734721303779,"hs_deleted_at":0,"hs_id":184128305322,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303779,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/14269_rt-webinarcover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Why Red Teaming isn't Pen Testing","url":"https://www.trustwave.com/en-us/resources/library/webinars/why-red-teaming-isnt-pen-testing/ "},{"hs_child_table_id":0,"hs_created_at":1734721303778,"hs_deleted_at":0,"hs_id":184128305321,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303778,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Webinar%20Images/ogm-webinar-cover.png","altText":"","fileId":164294071642,"height":490,"type":"image","width":870},"industry":{"createdAt":1731417844871,"createdByUserId":60505637,"id":5,"isHubspotDefined":false,"label":"Hospitality","labelTranslations":{},"name":"hospitality","order":4,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":9,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"DFIR","labelTranslations":{},"name":"dfir","order":4,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Operation Grand Mars: Defending Against Carbanak Cyber Attacks","url":"https://www.trustwave.com/en-us/resources/library/webinars/operation-grand-mars-defending-against-carbanak-cyber-attacks/"},{"hs_child_table_id":0,"hs_created_at":1734721303777,"hs_deleted_at":0,"hs_id":184128305320,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303777,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Webinar%20Images/webinar-next-level-threats.jpg","altText":"","fileId":164190247212,"height":490,"type":"image","width":870},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":5,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"Data Breach","labelTranslations":{},"name":"data_breach","order":2,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"DFIR","labelTranslations":{},"name":"dfir","order":4,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Stopping Ransomware & CEO Email Fraud","url":"https://www.trustwave.com/en-us/resources/library/webinars/stopping-ransomware-and-ceo-email-fraud/ "},{"hs_child_table_id":0,"hs_created_at":1734721303776,"hs_deleted_at":0,"hs_id":184128305319,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303776,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Webinar%20Images/Captura%20de%20pantalla%202024-04-11%20142111.png","altText":"","fileId":164180490559,"height":379,"type":"image","width":747},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1731443056321,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"DFIR","labelTranslations":{},"name":"dfir","order":4,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Security Breaches: Looking Back to Move Forward","url":"https://www.trustwave.com/en-us/resources/library/webinars/security-breaches-looking-back-to-move-forward/ "},{"hs_child_table_id":0,"hs_created_at":1734721303775,"hs_deleted_at":0,"hs_id":184128305318,"hs_initial_published_at":1734721350192,"hs_is_edited":false,"hs_published_at":1739536332657,"hs_updated_at":1734721303775,"hs_updated_by_user_id":63911226,"image":{"url":"https://www.trustwave.com/hubfs/Web/Webinars/18223_dooropenthreats-webinar-cover.webp","altText":"","type":"image"},"resource_filter":{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":10,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},"resource_topic":[{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":10,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}],"resource_type":{"createdAt":1709837224628,"createdByUserId":60505637,"id":14,"isHubspotDefined":false,"label":"webinar","labelTranslations":{},"name":"webinar","order":0,"type":"option","updatedAt":1710274099313,"updatedByUserId":60505637},"title":"Your Patching Regimen: Leaving the Door Open to Threats","url":"https://www.trustwave.com/en-us/resources/library/webinars/your-patching-regimen-leaving-the-door-open-to-threats/"}]; var maxItems = 21; var baseItems = 21; // New filters var db_getfilter = [{"createdAt":1709837224628,"createdByUserId":0,"id":2,"isHubspotDefined":false,"label":"Analyst Report","labelTranslations":{},"name":"analyst report","order":null,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},{"createdAt":1709837224628,"createdByUserId":0,"id":7,"isHubspotDefined":false,"label":"Case Study","labelTranslations":{},"name":"case study","order":null,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},{"createdAt":1709837224628,"createdByUserId":0,"id":3,"isHubspotDefined":false,"label":"Data Sheet","labelTranslations":{},"name":"data sheet","order":null,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},{"createdAt":1709837224628,"createdByUserId":0,"id":4,"isHubspotDefined":false,"label":"eBook","labelTranslations":{},"name":"ebook","order":null,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},{"createdAt":1709837224628,"createdByUserId":0,"id":8,"isHubspotDefined":false,"label":"FAQ","labelTranslations":{},"name":"faq","order":null,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},{"createdAt":1709837224628,"createdByUserId":0,"id":6,"isHubspotDefined":false,"label":"Guide","labelTranslations":{},"name":"guide","order":null,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},{"createdAt":1709837224628,"createdByUserId":0,"id":5,"isHubspotDefined":false,"label":"Infographic","labelTranslations":{},"name":"infographic","order":null,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Research Report","labelTranslations":{},"name":"research report","order":null,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},{"createdAt":1709837224628,"createdByUserId":0,"id":9,"isHubspotDefined":false,"label":"Spec Sheet","labelTranslations":{},"name":"spec sheet","order":null,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},{"createdAt":1709837224628,"createdByUserId":0,"id":10,"isHubspotDefined":false,"label":"White Paper","labelTranslations":{},"name":"white paper","order":null,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},{"createdAt":1709837224628,"createdByUserId":0,"id":13,"isHubspotDefined":false,"label":"Webinar","labelTranslations":{},"name":"webinar","order":null,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},{"createdAt":1709837224628,"createdByUserId":0,"id":14,"isHubspotDefined":false,"label":"Overview","labelTranslations":{},"name":"overview","order":null,"type":"option","updatedAt":1731082170253,"updatedByUserId":60505637},{"createdAt":1709837224628,"createdByUserId":0,"id":15,"isHubspotDefined":false,"label":"Demo","labelTranslations":{},"name":"demo","order":null,"type":"option","updatedAt":1731082217142,"updatedByUserId":60505637}]; var db_getindustry = [{"createdAt":1730396680025,"createdByUserId":60505637,"id":2,"isHubspotDefined":false,"label":"Education","labelTranslations":{},"name":"education","order":null,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},{"createdAt":1731417844871,"createdByUserId":60505637,"id":4,"isHubspotDefined":false,"label":"Financial Services","labelTranslations":{},"name":"financial_services","order":null,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},{"createdAt":1730396680025,"createdByUserId":60505637,"id":3,"isHubspotDefined":false,"label":"Government","labelTranslations":{},"name":"government","order":null,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},{"createdAt":1730396680025,"createdByUserId":60505637,"id":1,"isHubspotDefined":false,"label":"Healthcare","labelTranslations":{},"name":"healthcare","order":null,"type":"option","updatedAt":1730396680025,"updatedByUserId":60505637},{"createdAt":1731417844871,"createdByUserId":60505637,"id":5,"isHubspotDefined":false,"label":"Hospitality","labelTranslations":{},"name":"hospitality","order":null,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},{"createdAt":1731417844871,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Legal","labelTranslations":{},"name":"legal","order":null,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},{"createdAt":1731417844871,"createdByUserId":60505637,"id":7,"isHubspotDefined":false,"label":"Manufacturing","labelTranslations":{},"name":"manufacturing","order":null,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},{"createdAt":1731417844871,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Energy","labelTranslations":{},"name":"energy","order":null,"type":"option","updatedAt":1734701670779,"updatedByUserId":60505637},{"createdAt":1731417844871,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Professional Services","labelTranslations":{},"name":"professional_services","order":null,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},{"createdAt":1731417844871,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Retail","labelTranslations":{},"name":"retail","order":null,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},{"createdAt":1731417844871,"createdByUserId":60505637,"id":11,"isHubspotDefined":false,"label":"Technology","labelTranslations":{},"name":"technology","order":null,"type":"option","updatedAt":1731417844871,"updatedByUserId":60505637},{"createdAt":1734701670779,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Transportation","labelTranslations":{},"name":"transportation","order":null,"type":"option","updatedAt":1734701670779,"updatedByUserId":60505637}]; var db_gettopic = [{"createdAt":1731443056321,"createdByUserId":60505637,"id":19,"isHubspotDefined":false,"label":"Artificial Intelligence","labelTranslations":{},"name":"artificial_intelligence","order":null,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":15,"isHubspotDefined":false,"label":"Compliance","labelTranslations":{},"name":"compliance","order":null,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":16,"isHubspotDefined":false,"label":"Data Breach","labelTranslations":{},"name":"data_breach","order":null,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637},{"createdAt":1709837224628,"createdByUserId":0,"id":1,"isHubspotDefined":false,"label":"Database Security","labelTranslations":{},"name":"database_security","order":null,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":17,"isHubspotDefined":false,"label":"DFIR","labelTranslations":{},"name":"dfir","order":null,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":6,"isHubspotDefined":false,"label":"Email Security","labelTranslations":{},"name":"email_security","order":null,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":8,"isHubspotDefined":false,"label":"Managed Detection and Response","labelTranslations":{},"name":"managed_detection_and_response","order":null,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":10,"isHubspotDefined":false,"label":"Managed Security Services","labelTranslations":{},"name":"managed_security_services","order":null,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1731443056321,"createdByUserId":60505637,"id":18,"isHubspotDefined":false,"label":"Microsoft","labelTranslations":{},"name":"microsoft","order":null,"type":"option","updatedAt":1731443056321,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":9,"isHubspotDefined":false,"label":"Penetration Testing","labelTranslations":{},"name":"penetration_testing","order":null,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":12,"isHubspotDefined":false,"label":"Security and Risk Management","labelTranslations":{},"name":"security_and_risk_management","order":null,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":11,"isHubspotDefined":false,"label":"SIEM/SOC","labelTranslations":{},"name":"siem_soc","order":null,"type":"option","updatedAt":1731443103341,"updatedByUserId":60505637},{"createdAt":1710769807756,"createdByUserId":60505637,"id":13,"isHubspotDefined":false,"label":"Threat Intelligence","labelTranslations":{},"name":"threat_intelligence","order":null,"type":"option","updatedAt":1734720270556,"updatedByUserId":60505637}]; </script> <!-- Added by GoogleTagManager integration --> <script> var _hsp = window._hsp = window._hsp || []; window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} var useGoogleConsentModeV2 = true; var waitForUpdateMillis = 1000; var hsLoadGtm = function loadGtm() { if(window._hsGtmLoadOnce) { return; } if (useGoogleConsentModeV2) { gtag('set','developer_id.dZTQ1Zm',true); gtag('consent', 'default', { 'ad_storage': 'denied', 'analytics_storage': 'denied', 'ad_user_data': 'denied', 'ad_personalization': 'denied', 'wait_for_update': waitForUpdateMillis }); _hsp.push(['useGoogleConsentModeV2']) } (function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer','GTM-54M2ZJN'); window._hsGtmLoadOnce = true; }; _hsp.push(['addPrivacyConsentListener', function(consent){ if(consent.allowed || (consent.categories && consent.categories.analytics)){ hsLoadGtm(); } }]); </script> <!-- /Added by GoogleTagManager integration --> <link rel="canonical" href="https://www.trustwave.com/en-us/resources/library/"> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-DP8B111F8E"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-DP8B111F8E'); </script> <meta property="og:url" content="https://www.trustwave.com/en-us/resources/library/"> <meta name="twitter:card" content="summary"> <meta http-equiv="content-language" content="en-us"> <!-- Facebook Meta Tags --> <meta property="og:url" content="https://www.trustwave.com/en-us/resources/library/"> <meta property="og:type" content="website"> <meta property="og:title" content="Resource Library | Trustwave"> <meta property="og:description" content=""> <meta property="og:image" content="https://www.trustwave.com/hubfs/Web/General/metadata.jpg"> <!-- Twitter Meta Tags --> <meta name="twitter:card" content="summary_large_image"> <meta property="twitter:domain" content="trustwave.com"> <meta property="twitter:url" content="https://www.trustwave.com/en-us/resources/library/"> <meta name="twitter:title" content="Resource Library | Trustwave"> <meta name="twitter:description" content=""> <meta name="twitter:image" content="https://www.trustwave.com/hubfs/Web/General/metadata.jpg"> <meta name="generator" content="HubSpot"></head> <body class="template-header-default" id="103150220405"> <!-- Added by GoogleTagManager integration --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-54M2ZJN" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- /Added by GoogleTagManager integration --> <div class="body-wrapper hs-content-id-103150220405 hs-site-page page "> <div id="hs_cos_wrapper_module_16910398984436" class="hs_cos_wrapper hs_cos_wrapper_widget hs_cos_wrapper_type_module" style="" data-hs-cos-general-type="widget" data-hs-cos-type="module"> <div class="header-section"> <div class="header-two-row"> <div class="container site-content"> <div class="header-first-row"> <div class="first-two-col"> <div class="f-left"> <div class="f-left-inr"> <div class="icon-two-col"> <div class="icon-left-q"> <svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" version="1.1" id="Layer_1" x="0px" y="0px" width="24px" height="24px" viewbox="0 0 24 24" enable-background="new 0 0 24 24" xml:space="preserve"> <g> <path fill="#ED1A3D" d="M12,0c6.6,0,12,5.4,12,12c0,6.6-5.4,12-12,12C5.3,24,0,18.6,0,12C0,5.4,5.4,0,12,0z M21.6,12 c0-5.3-4.3-9.6-9.6-9.6c-5.3,0-9.6,4.3-9.6,9.6c0,5.3,4.3,9.6,9.6,9.6C17.3,21.6,21.6,17.3,21.6,12z" /> <path fill="#ED1A3D" d="M10.8,10.2c0-1,0-2,0-3c0-0.6,0.4-1.1,1.1-1.2c0.6-0.1,1.1,0.3,1.3,0.8c0,0.1,0.1,0.2,0.1,0.4c0,2,0,4,0,6 c0,0.6-0.4,1.1-1,1.2c-0.5,0.1-1.1-0.3-1.3-0.8c-0.1-0.2-0.1-0.3-0.1-0.5C10.8,12.1,10.8,11.2,10.8,10.2 C10.8,10.2,10.8,10.2,10.8,10.2z" /> <path fill="#ED1A3D" d="M13.2,16.8c0,0.7-0.5,1.2-1.2,1.2c-0.7,0-1.2-0.5-1.2-1.2c0-0.7,0.5-1.2,1.2-1.2 C12.7,15.6,13.2,16.1,13.2,16.8z" /> </g> </svg> </div> <div class="icon-right-q"> <div class="i-content-right"> <p style="margin-top: 10px;">Trustwave Unveils 2025 Cybersecurity Threat Report for Energy and Utilities Sector. <a href="https://www.trustwave.com/en-us/resources/library/documents/trustwave-spiderlabs-research-cybersecurity-challenges-for-energy-and-utilities-in-2025/" rel="noopener" target="_blank">Learn More</a></p> <input id="hippowiz-ass-injected" type="hidden" value="true"><input id="hvmessage-toextension-listener" type="hidden" value="none"> </div> </div> </div> </div> </div> <div class="f-right"> <div class="f-r-inr"> <div class="f-list-items"> <ul> <li> <a href="https://www.trustwave.com/en-us/submit-rfp/"> Submit RFP </a> </li> <li> <a href="https://www.trustwave.com/en-us/company/contact/">Contact Us </a> </li> <li> <a href="javascript:void(0)">Login </a> <div class="login-wrapper"> <div class="login-section"> <div class="login-sec-inr"> <div class="login-two-row"> <div class="login-f-row"> <div class="log-logo"> <img src="https://www.trustwave.com/hubfs/fusion-logo-color-1.svg" alt="fusion-logo-color-1" loading="lazy" width="300" height="96" style="max-width: 100%; height: auto;"> </div> <div class="login-link-buton"> <a href="https://fusion.trustwave.com/" target="_blank" rel="noopener">Fusion Platform Login </a> </div> <div class="what-link"> <a href="https://www.trustwave.com/en-us/company/about-us/trustwave-fusion-platform/">What is the Trustwave Fusion Platform? </a> </div> </div> <div class="login-s-row"> <div class="login-last-bnt"> <a href="https://console.us.mailmarshal.cloud/" target="_blank" rel="noopener">MailMarshal Cloud Login </a> </div> </div> </div> </div> </div> </div> </li> <li> <a href="javascript:void(0)">Incident Response </a> <div class="incidence-section"> <div class="incidence-sec-inr"> <div class="indic-two-row"> <div class="indic-f-row"> <div class="indics-title"> <h6> Experiencing a security breach? </h6> </div> <div class="indics-content"> <p>Get access to immediate incident response assistance.</p> </div> <div class="hotline-title"> 24 HOUR HOTLINES </div> </div> <div class="indic-sec-row"> <div class="hot-item-link"> <ul> <li> <span> AMERICAS </span> <span> <a href="tel:+1%20855%20438%204305">+1 855 438 4305 </a> </span> </li> <li> <span> EMEA </span> <span> <a href="tel:+44%208081687370">+44 8081687370 </a> </span> </li> <li> <span> AUSTRALIA </span> <span> <a href="tel:+61%201300901211">+61 1300901211 </a> </span> </li> <li> <span> SINGAPORE </span> <span> <a href="tel:+65%2068175019">+65 68175019 </a> </span> </li> </ul> </div> <div class="indic-last-col"> <a href="https://www.trustwave.com/en-us/company/contact/security-breach/">Recommended Actions </a> </div> </div> </div> </div> </div> </li> </ul> </div> </div> </div> </div> </div> </div> </div> <div class="header-second-row"> <div class="container site-content"> <div class="header-sec-inr"> <div class="header-three-col"> <div class="header-left"> <div class="header-logo header-normal"> <span id="hs_cos_wrapper_module_16910398984436_" class="hs_cos_wrapper hs_cos_wrapper_widget hs_cos_wrapper_type_logo" style="" data-hs-cos-general-type="widget" data-hs-cos-type="logo"><a href="//www.trustwave.com" id="hs-link-module_16910398984436_" style="border-width:0px;border:0px;"><img src="https://www.trustwave.com/hs-fs/hubfs/Web/Logos/trustwave-logo-white.png?width=300&height=43&name=trustwave-logo-white.png" class="hs-image-widget " height="43" style="height: auto;width:300px;border-width:0px;border:0px;" width="300" alt="trustwave-logo-white-2" title="trustwave-logo-white-2" loading="" srcset="https://www.trustwave.com/hs-fs/hubfs/Web/Logos/trustwave-logo-white.png?width=150&height=22&name=trustwave-logo-white.png 150w, https://www.trustwave.com/hs-fs/hubfs/Web/Logos/trustwave-logo-white.png?width=300&height=43&name=trustwave-logo-white.png 300w, https://www.trustwave.com/hs-fs/hubfs/Web/Logos/trustwave-logo-white.png?width=450&height=65&name=trustwave-logo-white.png 450w, https://www.trustwave.com/hs-fs/hubfs/Web/Logos/trustwave-logo-white.png?width=600&height=86&name=trustwave-logo-white.png 600w, https://www.trustwave.com/hs-fs/hubfs/Web/Logos/trustwave-logo-white.png?width=750&height=108&name=trustwave-logo-white.png 750w, https://www.trustwave.com/hs-fs/hubfs/Web/Logos/trustwave-logo-white.png?width=900&height=129&name=trustwave-logo-white.png 900w" sizes="(max-width: 300px) 100vw, 300px"></a></span> </div> <div class="header-logo header-sticky" style="display: none;"> <span id="hs_cos_wrapper_module_16910398984436_" class="hs_cos_wrapper hs_cos_wrapper_widget hs_cos_wrapper_type_logo" style="" data-hs-cos-general-type="widget" data-hs-cos-type="logo"><a href="//www.trustwave.com" id="hs-link-module_16910398984436_" style="border-width:0px;border:0px;"><img src="https://www.trustwave.com/hubfs/trustwave-logo-color.svg" class="hs-image-widget " height="330" style="height: auto;width:2287px;border-width:0px;border:0px;" width="2287" alt="trustwave-logo-color" title="trustwave-logo-color" loading=""></a></span> </div> </div> <div class="header-middle-sec"> <div class="open-menu"> <a href="javascript:%20void(0)" class="expandMenu"> <i></i> <i></i> <i></i> </a> </div> <div class="bodyclass"> <div class="headernavigation"> <div class="header-main-clswq"> <div class="mobile-menu-s"> <div class="m-first-cols"> <div class="m-left-u"> <div class="m-logo"> <span id="hs_cos_wrapper_module_16910398984436_" class="hs_cos_wrapper hs_cos_wrapper_widget hs_cos_wrapper_type_logo" style="" data-hs-cos-general-type="widget" data-hs-cos-type="logo"><a href="//www.trustwave.com" id="hs-link-module_16910398984436_" style="border-width:0px;border:0px;"><img src="https://www.trustwave.com/hubfs/trustwave-logo-color.svg" class="hs-image-widget " height="330" style="height: auto;width:2287px;border-width:0px;border:0px;" width="2287" alt="trustwave-logo-color" title="trustwave-logo-color" loading=""></a></span> </div> </div> <div class="m-right-u"> <div class="m-close-icon"> <svg clip-rule="evenodd" fill-rule="evenodd" stroke-linejoin="round" stroke-miterlimit="2" viewbox="0 0 24 24" xmlns="http://www.w3.org/2000/svg"><path d="m12 10.93 5.719-5.72c.146-.146.339-.219.531-.219.404 0 .75.324.75.749 0 .193-.073.385-.219.532l-5.72 5.719 5.719 5.719c.147.147.22.339.22.531 0 .427-.349.75-.75.75-.192 0-.385-.073-.531-.219l-5.719-5.719-5.719 5.719c-.146.146-.339.219-.531.219-.401 0-.75-.323-.75-.75 0-.192.073-.384.22-.531l5.719-5.719-5.72-5.719c-.146-.147-.219-.339-.219-.532 0-.425.346-.749.75-.749.192 0 .385.073.531.219z" /></svg> </div> </div> </div> <div class="reques-demo"> <div class="search-right"> <div class="demo-link"> <a href="#navdemo-form">Request a Demo </a> </div> </div> </div> </div> <span id="hs_cos_wrapper_module_16910398984436_" class="hs_cos_wrapper hs_cos_wrapper_widget hs_cos_wrapper_type_menu" style="" data-hs-cos-general-type="widget" data-hs-cos-type="menu"><div id="hs_menu_wrapper_module_16910398984436_" class="hs-menu-wrapper active-branch no-flyouts hs-menu-flow-horizontal" role="navigation" data-sitemap-name="default" data-menu-id="128102089380" aria-label="Navigation Menu"> <ul role="menu"> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="javascript:;" role="menuitem">Services</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="javascript:;" role="menuitem">Solutions</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="javascript:;" role="menuitem">Why Trustwave</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="javascript:;" role="menuitem">Partners</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="javascript:;" role="menuitem">Resources</a></li> </ul> </div></span> <div class="mobile-bottom-s"> <div class="mobile-indicies"> <div class="bottom-list"> <ul> <li> <a href="https://www.trustwave.com/en-us/submit-rfp/"> Submit RFP </a> </li> <li> <a href="https://www.trustwave.com/en-us/company/contact/">Contact Us </a> </li> <li class="login-megamenu-u"> <a href="javascript:void(0)">Login </a> <div class="login-section"> <div class="back-to-login"> <span class="login-arrow arrow-global"> <svg clip-rule="evenodd" fill-rule="evenodd" stroke-linejoin="round" stroke-miterlimit="2" viewbox="0 0 24 24" xmlns="http://www.w3.org/2000/svg"><path fill="#ffffff" d="m9.474 5.209s-4.501 4.505-6.254 6.259c-.147.146-.22.338-.22.53s.073.384.22.53c1.752 1.754 6.252 6.257 6.252 6.257.145.145.336.217.527.217.191-.001.383-.074.53-.221.293-.293.294-.766.004-1.057l-4.976-4.976h14.692c.414 0 .75-.336.75-.75s-.336-.75-.75-.75h-14.692l4.978-4.979c.289-.289.287-.761-.006-1.054-.147-.147-.339-.221-.53-.221-.191-.001-.38.071-.525.215z" fill-rule="nonzero" /></svg> </span> <span>login</span> </div> <div class="login-sec-inr"> <div class="login-two-row"> <div class="login-f-row"> <div class="log-logo"> <img src="https://www.trustwave.com/hubfs/fusion-logo-color-1.svg" alt="fusion-logo-color-1" loading="lazy" width="300" height="96" style="max-width: 100%; height: auto;"> </div> <div class="login-link-buton"> <a href="https://fusion.trustwave.com/" target="_blank" rel="noopener">Fusion Platform Login </a> </div> <div class="what-link"> <a href="https://www.trustwave.com/en-us/company/about-us/trustwave-fusion-platform/">What is the Trustwave Fusion Platform? </a> </div> </div> <div class="login-s-row"> <div class="login-last-bnt"> <a href="https://console.us.mailmarshal.cloud/" target="_blank" rel="noopener">MailMarshal Cloud Login </a> </div> </div> </div> </div> </div> </li> <li class="indices-menu"> <a href="javascript:void(0)">Incident Response </a> <div class="incidence-section"> <div class="indic-backmenu"> <span class="login-arrow arrow-global"> <svg clip-rule="evenodd" fill-rule="evenodd" stroke-linejoin="round" stroke-miterlimit="2" viewbox="0 0 24 24" xmlns="http://www.w3.org/2000/svg"><path fill="#ffffff" d="m9.474 5.209s-4.501 4.505-6.254 6.259c-.147.146-.22.338-.22.53s.073.384.22.53c1.752 1.754 6.252 6.257 6.252 6.257.145.145.336.217.527.217.191-.001.383-.074.53-.221.293-.293.294-.766.004-1.057l-4.976-4.976h14.692c.414 0 .75-.336.75-.75s-.336-.75-.75-.75h-14.692l4.978-4.979c.289-.289.287-.761-.006-1.054-.147-.147-.339-.221-.53-.221-.191-.001-.38.071-.525.215z" fill-rule="nonzero" /></svg> </span> <span> Incident Response</span> </div> <div class="incidence-sec-inr"> <div class="indic-two-row"> <div class="indic-f-row"> <div class="indics-title"> <h6> Experiencing a security breach? </h6> </div> <div class="indics-content"> <p>Get access to immediate incident response assistance.</p> </div> <div class="hotline-title"> 24 HOUR HOTLINES </div> </div> <div class="indic-sec-row"> <div class="hot-item-link"> <ul> <li> <span> AMERICAS </span> <span> <a href="tel:+1%20855%20438%204305">+1 855 438 4305 </a> </span> </li> <li> <span> EMEA </span> <span> <a href="tel:+44%208081687370">+44 8081687370 </a> </span> </li> <li> <span> AUSTRALIA </span> <span> <a href="tel:+61%201300901211">+61 1300901211 </a> </span> </li> <li> <span> SINGAPORE </span> <span> <a href="tel:+65%2068175019">+65 68175019 </a> </span> </li> </ul> </div> <div class="indic-last-col"> <a href="https://www.trustwave.com/en-us/company/contact/security-breach/">Recommended Actions </a> </div> </div> </div> </div> </div> </li> <li class="form-s"> <form action="/search-results"> <input id="search" value="" type="text" class="form-control" name="q" placeholder="Search trustwave.com" autocomplete="off"> </form> </li> </ul> </div> <div class="last-cols"> <div class="icon-s"> <svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" version="1.1" id="Layer_1" x="0px" y="0px" width="24px" height="24px" viewbox="0 0 24 24" enable-background="new 0 0 24 24" xml:space="preserve"> <g> <path fill="#ED1A3D" d="M12,0c6.6,0,12,5.4,12,12c0,6.6-5.4,12-12,12C5.3,24,0,18.6,0,12C0,5.4,5.4,0,12,0z M21.6,12 c0-5.3-4.3-9.6-9.6-9.6c-5.3,0-9.6,4.3-9.6,9.6c0,5.3,4.3,9.6,9.6,9.6C17.3,21.6,21.6,17.3,21.6,12z" /> <path fill="#ED1A3D" d="M10.8,10.2c0-1,0-2,0-3c0-0.6,0.4-1.1,1.1-1.2c0.6-0.1,1.1,0.3,1.3,0.8c0,0.1,0.1,0.2,0.1,0.4c0,2,0,4,0,6 c0,0.6-0.4,1.1-1,1.2c-0.5,0.1-1.1-0.3-1.3-0.8c-0.1-0.2-0.1-0.3-0.1-0.5C10.8,12.1,10.8,11.2,10.8,10.2 C10.8,10.2,10.8,10.2,10.8,10.2z" /> <path fill="#ED1A3D" d="M13.2,16.8c0,0.7-0.5,1.2-1.2,1.2c-0.7,0-1.2-0.5-1.2-1.2c0-0.7,0.5-1.2,1.2-1.2 C12.7,15.6,13.2,16.1,13.2,16.8z" /> </g> </svg> </div> <div class="last-content"> <p style="margin-top: 10px;">Trustwave Unveils 2025 Cybersecurity Threat Report for Energy and Utilities Sector. <a href="https://www.trustwave.com/en-us/resources/library/documents/trustwave-spiderlabs-research-cybersecurity-challenges-for-energy-and-utilities-in-2025/" rel="noopener" target="_blank">Learn More</a></p> <input id="hippowiz-ass-injected" type="hidden" value="true"><input id="hvmessage-toextension-listener" type="hidden" value="none"> </div> </div> </div> </div> </div> </div> </div> </div> <div class="header-right-sq"> <div class="request-two-col"> <div class="search-left"> <div class="search-s"> <svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" version="1.1" id="Layer_1" x="0px" y="0px" width="24px" height="24px" viewbox="0 0 24 24" enable-background="new 0 0 24 24" xml:space="preserve"> <path fill="#fff" d="M23.6,21.9l-4.4-4.4c1.5-1.8,2.4-4.2,2.4-6.7c0-6-4.8-10.8-10.8-10.8S0,4.8,0,10.8s4.8,10.8,10.8,10.8 c2.5,0,4.9-0.9,6.7-2.4l4.4,4.4c0.2,0.2,0.5,0.3,0.9,0.3s0.6-0.1,0.9-0.3C24.1,23.2,24.1,22.4,23.6,21.9z M2.4,10.8 c0-4.6,3.8-8.4,8.4-8.4s8.4,3.8,8.4,8.4c0,2.3-0.9,4.3-2.4,5.9c0,0.1-0.1,0.1-0.2,0.2c-1.5,1.5-3.6,2.4-5.9,2.4 C6.2,19.2,2.4,15.4,2.4,10.8z"></path> </svg> </div> <div class="search-bg"> <div class="search-data"> <div class="search-d-inr"> <form action="/search-results"> <input id="search" value="" type="text" class="form-control" name="q" placeholder="Search trustwave.com" autocomplete="off"> </form> </div> </div> </div> </div> <div class="search-right"> <div class="demo-link"> <a href="#navdemo-form">Request a Demo </a> </div> </div> </div> </div> </div> </div> </div> </div> </div> <div class="newPopupBoxSecSearch module_16910398984436" id="popupBox"> <div class="newPopupBoxTable"> <div class="newPopupBoxTableCell"> <div class="popupBoxSearchBox"> <a href="javascript:void(0)" class="searchPopClose"> <svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" version="1.1" x="0px" y="0px" viewbox="0 0 512.001 512.001" style="enable-background:new 0 0 512.001 512.001;" xml:space="preserve"> <g> <path d="M284.286,256.002L506.143,34.144c7.811-7.811,7.811-20.475,0-28.285c-7.811-7.81-20.475-7.811-28.285,0L256,227.717 L34.143,5.859c-7.811-7.811-20.475-7.811-28.285,0c-7.81,7.811-7.811,20.475,0,28.285l221.857,221.857L5.858,477.859 c-7.811,7.811-7.811,20.475,0,28.285c3.905,3.905,9.024,5.857,14.143,5.857c5.119,0,10.237-1.952,14.143-5.857L256,284.287 l221.857,221.857c3.905,3.905,9.024,5.857,14.143,5.857s10.237-1.952,14.143-5.857c7.811-7.811,7.811-20.475,0-28.285 L284.286,256.002z"></path> </g> </svg> </a> </div> <div class="download-casestudy-in"> <div class="casestudy-main-cl"> <div class="download-form"> <span id="hs_cos_wrapper_module_16910398984436_" class="hs_cos_wrapper hs_cos_wrapper_widget hs_cos_wrapper_type_form" style="" data-hs-cos-general-type="widget" data-hs-cos-type="form"><h3 id="hs_cos_wrapper_form_863734669_title" class="hs_cos_wrapper form-title" data-hs-cos-general-type="widget_field" data-hs-cos-type="text"></h3> <div id="hs_form_target_form_863734669"></div> </span> </div> </div> </div> </div> </div> </div> <div class="megamenu"> <div class="service-section megamenuRepeat" data-id="1"> <div class="service-sec-inr overlayclr"> <div class="back-menu-m service-back"> <div class="arrows-q"> <svg clip-rule="evenodd" fill-rule="evenodd" stroke-linejoin="round" stroke-miterlimit="2" viewbox="0 0 24 24" xmlns="http://www.w3.org/2000/svg"><path fill="#ffffff" d="m9.474 5.209s-4.501 4.505-6.254 6.259c-.147.146-.22.338-.22.53s.073.384.22.53c1.752 1.754 6.252 6.257 6.252 6.257.145.145.336.217.527.217.191-.001.383-.074.53-.221.293-.293.294-.766.004-1.057l-4.976-4.976h14.692c.414 0 .75-.336.75-.75s-.336-.75-.75-.75h-14.692l4.978-4.979c.289-.289.287-.761-.006-1.054-.147-.147-.339-.221-.53-.221-.191-.001-.38.071-.525.215z" fill-rule="nonzero"></path></svg> </div> <span>Services</span> </div> <div class="service-cols"> <div class="service-box"> <div class="service-box-inr"> <div class="manage-two-col"> <div class="manage-right"> <a href="https://www.trustwave.com/en-us/services/managed-detection-and-response/"></a> <div class="manage-title"> Managed Detection & Response </div> <div class="manage-content"> <p>Eliminate active threats with 24/7 threat detection, investigation, and response.</p> </div> </div> </div> </div> <div class="service-box-inr"> <div class="manage-two-col"> <div class="manage-right"> <a href="/en-us/services/co-managed-soc/"></a> <div class="manage-title"> Co-Managed SOC (SIEM) </div> <div class="manage-content"> <p>Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.</p> </div> </div> </div> </div> <div class="service-box-inr"> <div class="manage-two-col"> <div class="manage-right"> <a href="https://www.trustwave.com/en-us/services/consulting-and-professional-services/"></a> <div class="manage-title"> Advisory & Diagnostics </div> <div class="manage-content"> <p>Advance your cybersecurity program and get expert guidance where you need it most.</p> </div> </div> </div> </div> <div class="service-box-inr"> <div class="manage-two-col"> <div class="manage-right"> <a href="https://www.trustwave.com/en-us/services/penetration-testing/"></a> <div class="manage-title"> Penetration Testing </div> <div class="manage-content"> <p>Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.</p> </div> </div> </div> </div> <div class="service-box-inr"> <div class="manage-two-col"> <div class="manage-right"> <a href="https://www.trustwave.com/en-us/services/database-security/"></a> <div class="manage-title"> Database Security </div> <div class="manage-content"> <p>Prevent unauthorized access and exceed compliance requirements.</p> </div> </div> </div> </div> <div class="service-box-inr"> <div class="manage-two-col"> <div class="manage-right"> <a href="https://www.trustwave.com/en-us/services/email-security/"></a> <div class="manage-title"> Email Security </div> <div class="manage-content"> <p>Stop email threats others miss and secure your organization against the #1 ransomware attack vector.</p> </div> </div> </div> </div> <div class="service-box-inr"> <div class="manage-two-col"> <div class="manage-right"> <a href="https://www.trustwave.com/en-us/services/consulting-and-professional-services/digital-forensics-and-incident-response/"></a> <div class="manage-title"> Digital Forensics & Incident Response </div> <div class="manage-content"> <p>Prepare for the inevitable with 24/7 global breach response in-region and available on-site.</p> </div> </div> </div> </div> <div class="service-box-inr"> <div class="manage-two-col"> <div class="manage-right"> <a href="https://www.trustwave.com/en-us/services/managed-security-services/firewall-and-technology-management/"></a> <div class="manage-title"> Firewall & Technology Management </div> <div class="manage-content"> <p>Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.</p> </div> </div> </div> </div> </div> <div class="view-all-s"> <a href="https://www.trustwave.com/en-us/services/">View All Trustwave Services </a> </div> </div> </div> </div> <div class="solution-section megamenuRepeat" data-id="2"> <div class="solution-sec-inr overlayclr"> <div class="back-menu-m solution-back"> <div class="arrows-q"> <svg clip-rule="evenodd" fill-rule="evenodd" stroke-linejoin="round" stroke-miterlimit="2" viewbox="0 0 24 24" xmlns="http://www.w3.org/2000/svg"><path fill="#ffffff" d="m9.474 5.209s-4.501 4.505-6.254 6.259c-.147.146-.22.338-.22.53s.073.384.22.53c1.752 1.754 6.252 6.257 6.252 6.257.145.145.336.217.527.217.191-.001.383-.074.53-.221.293-.293.294-.766.004-1.057l-4.976-4.976h14.692c.414 0 .75-.336.75-.75s-.336-.75-.75-.75h-14.692l4.978-4.979c.289-.289.287-.761-.006-1.054-.147-.147-.339-.221-.53-.221-.191-.001-.38.071-.525.215z" fill-rule="nonzero"></path></svg> </div> <span>Solutions</span> </div> <div class="solution-two-col"> <div class="solution-left"> <div class="solution-cols"> <div class="solution-fs"> <div class="solution-fs-inr"> <div class="sol-fs-title"> BY INDUSTRY </div> <div class="sol-simp-menus"> <span id="hs_cos_wrapper_module_16910398984436_" class="hs_cos_wrapper hs_cos_wrapper_widget hs_cos_wrapper_type_simple_menu" style="" data-hs-cos-general-type="widget" data-hs-cos-type="simple_menu"><div id="hs_menu_wrapper_module_16910398984436_" class="hs-menu-wrapper active-branch flyouts hs-menu-flow-horizontal" role="navigation" data-sitemap-name="" data-menu-id="" aria-label="Navigation Menu"> <ul role="menu"> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/capabilities/by-industry/education/" role="menuitem" target="_self">Education</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/capabilities/by-industry/financial-services/" role="menuitem" target="_self"> Financial Services</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/capabilities/by-industry/government/" role="menuitem" target="_self">Government</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/capabilities/by-industry/healthcare/" role="menuitem" target="_self">Healthcare</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/capabilities/by-industry/hotels/" role="menuitem" target="_self">Hotels</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/capabilities/by-industry/legal/" role="menuitem" target="_self">Legal</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/capabilities/by-industry/manufacturing/" role="menuitem" target="_self">Manufacturing</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/capabilities/by-industry/retail/" role="menuitem" target="_self">Retail</a></li> </ul> </div></span> </div> </div> </div> <div class="solution-fs"> <div class="solution-fs-inr"> <div class="sol-fs-title"> BY REGULATION </div> <div class="sol-simp-menus"> <span id="hs_cos_wrapper_module_16910398984436_" class="hs_cos_wrapper hs_cos_wrapper_widget hs_cos_wrapper_type_simple_menu" style="" data-hs-cos-general-type="widget" data-hs-cos-type="simple_menu"><div id="hs_menu_wrapper_module_16910398984436_" class="hs-menu-wrapper active-branch flyouts hs-menu-flow-horizontal" role="navigation" data-sitemap-name="" data-menu-id="" aria-label="Navigation Menu"> <ul role="menu"> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/capabilities/by-mandate/data-privacy/" role="menuitem" target="_self">Data Privacy</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/capabilities/by-mandate/cybersecurity-maturity-model-certification/" role="menuitem" target="_self">CMMC</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/capabilities/by-mandate/fisma/" role="menuitem" target="_self">FISMA</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/capabilities/by-mandate/gdpr/" role="menuitem" target="_self">GDPR</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/capabilities/by-mandate/glba/" role="menuitem" target="_self">GLBA</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/capabilities/by-mandate/hipaa/" role="menuitem" target="_self">HIPAA</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/capabilities/by-mandate/iso/" role="menuitem" target="_self">ISO</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/capabilities/by-mandate/sox/" role="menuitem" target="_self">SOX</a></li> </ul> </div></span> </div> </div> </div> </div> </div> <div class="solution-right"> <div class="sol-r-inr"> <div class="topic-titles"> BY TOPIC </div> <div class="topic-main-s"> <div class="topic-item"> <a href="https://www.trustwave.com/en-us/company/alliance-ecosystem/technology-partners/microsoft/"></a> <div class="topic-title"> Microsoft Security </div> <div class="topic-content"> Unlock the full power of Microsoft Security </div> </div> <div class="topic-item"> <a href="https://www.trustwave.com/capabilities/by-topic/offensive-security-solutions/"></a> <div class="topic-title"> Offensive Security </div> <div class="topic-content"> Solutions to maximize your security ROI </div> </div> <div class="topic-item"> <a href="https://www.trustwave.com/en-us/capabilities/by-topic/rapidly-secure-temporary-infrastructures/"></a> <div class="topic-title"> Rapidly Secure New Environments </div> <div class="topic-content"> Security for rapid response situations </div> </div> <div class="topic-item"> <a href="https://www.trustwave.com/en-us/capabilities/by-topic/cloud-security/"></a> <div class="topic-title"> Securing the Cloud </div> <div class="topic-content"> Safely navigate and stay protected </div> </div> <div class="topic-item"> <a href="https://www.trustwave.com/en-us/capabilities/by-topic/securing-the-iot-landscape/"></a> <div class="topic-title"> Securing the IoT Landscape </div> <div class="topic-content"> Test, monitor and secure network objects </div> </div> </div> </div> </div> </div> </div> </div> <div class="trust-section megamenuRepeat" data-id="3"> <div class="trust-sec-inr overlayclr"> <div class="back-menu-m solution-back"> <div class="arrows-q"> <svg clip-rule="evenodd" fill-rule="evenodd" stroke-linejoin="round" stroke-miterlimit="2" viewbox="0 0 24 24" xmlns="http://www.w3.org/2000/svg"><path fill="#ffffff" d="m9.474 5.209s-4.501 4.505-6.254 6.259c-.147.146-.22.338-.22.53s.073.384.22.53c1.752 1.754 6.252 6.257 6.252 6.257.145.145.336.217.527.217.191-.001.383-.074.53-.221.293-.293.294-.766.004-1.057l-4.976-4.976h14.692c.414 0 .75-.336.75-.75s-.336-.75-.75-.75h-14.692l4.978-4.979c.289-.289.287-.761-.006-1.054-.147-.147-.339-.221-.53-.221-.191-.001-.38.071-.525.215z" fill-rule="nonzero"></path></svg> </div> <span>Why Trustwave</span> </div> <div class="trust-bottom-cs"> <div class="trust-col-s"> <div class="trust-cls"> <a href="/en-us/company/about-us/"></a> <div class="t-title-s"> About Us </div> <div class="t-link-s"> We reduce cyber risk and fortify organizations </div> </div> </div> <div class="trust-col-s"> <div class="trust-cls"> <a href="/en-us/company/about-us/accolades/"></a> <div class="t-title-s"> Awards and Accolades </div> <div class="t-link-s"> Recognition by analysts and media outlets </div> </div> </div> <div class="trust-col-s"> <div class="trust-cls"> <a href="/en-us/company/about-us/spiderlabs/"></a> <div class="t-title-s"> Trustwave SpiderLabs Team </div> <div class="t-link-s"> Global researchers, ethical hackers, and responders </div> </div> </div> <div class="trust-col-s"> <div class="trust-cls"> <a href="/en-us/company/about-us/trustwave-fusion-platform/"></a> <div class="t-title-s"> Trustwave Fusion Security Operations Platform </div> <div class="t-link-s"> Unprecedented security visibility and control </div> </div> </div> <div class="trust-col-s"> <div class="trust-cls"> <a href="https://www.securitycolony.com/" target="_blank" rel="noopener"></a> <div class="t-title-s"> Trustwave Security Colony </div> <div class="t-link-s"> Access to cybersecurity threat protection resources </div> </div> </div> </div> </div> </div> <div class="partner-section megamenuRepeat" data-id="4"> <div class="partner-sec-inr overlayclr"> <div class="back-menu-m solution-back"> <div class="arrows-q"> <svg clip-rule="evenodd" fill-rule="evenodd" stroke-linejoin="round" stroke-miterlimit="2" viewbox="0 0 24 24" xmlns="http://www.w3.org/2000/svg"><path fill="#ffffff" d="m9.474 5.209s-4.501 4.505-6.254 6.259c-.147.146-.22.338-.22.53s.073.384.22.53c1.752 1.754 6.252 6.257 6.252 6.257.145.145.336.217.527.217.191-.001.383-.074.53-.221.293-.293.294-.766.004-1.057l-4.976-4.976h14.692c.414 0 .75-.336.75-.75s-.336-.75-.75-.75h-14.692l4.978-4.979c.289-.289.287-.761-.006-1.054-.147-.147-.339-.221-.53-.221-.191-.001-.38.071-.525.215z" fill-rule="nonzero"></path></svg> </div> <span>Partners</span> </div> <div class="partner-bottom-col"> <div class="partn-br-s"> <div class="partn-cols"> <div class="partn-clr"> <a href="https://www.trustwave.com/en-us/company/alliance-ecosystem/technology-partners/microsoft/"> </a> <div class="title-s"> Microsoft Security </div> <div class="content-s"> Unlock the full power of Microsoft Security </div> </div> </div> <div class="partn-cols"> <div class="partn-clr"> <a href="https://www.trustwave.com/en-us/partnerone/"> </a> <div class="title-s"> Trustwave PartnerOne Program </div> <div class="content-s"> Join forces with Trustwave to protect against the most advance cybersecurity threats </div> </div> </div> </div> <div class="button-twoc-l"> <div class="button-left"> <div class="btn-q"> <a href="https://trustwave.ziftone.com/#/page/reg" target="_blank" rel="noopener">Register </a> </div> </div> <div class="button-right"> <div class="btn-q chgbtn"> <a href="https://trustwave.ziftone.com/#/page/logged-out-home" target="_blank" rel="noopener">Login </a> </div> </div> </div> </div> </div> </div> <div class="resource-section megamenuRepeat" data-id="5"> <div class="resource-sec-inr overlayclr"> <div class="back-menu-m solution-back"> <div class="arrows-q"> <svg clip-rule="evenodd" fill-rule="evenodd" stroke-linejoin="round" stroke-miterlimit="2" viewbox="0 0 24 24" xmlns="http://www.w3.org/2000/svg"><path fill="#ffffff" d="m9.474 5.209s-4.501 4.505-6.254 6.259c-.147.146-.22.338-.22.53s.073.384.22.53c1.752 1.754 6.252 6.257 6.252 6.257.145.145.336.217.527.217.191-.001.383-.074.53-.221.293-.293.294-.766.004-1.057l-4.976-4.976h14.692c.414 0 .75-.336.75-.75s-.336-.75-.75-.75h-14.692l4.978-4.979c.289-.289.287-.761-.006-1.054-.147-.147-.339-.221-.53-.221-.191-.001-.38.071-.525.215z" fill-rule="nonzero"></path></svg> </div> <span>Resources</span> </div> <div class="resource-sec-tr"> <div class="resource-cols"> <div class="resource-cl-inr"> <div class="resn-title"> BLOGS </div> <div class="resn-menu"> <span id="hs_cos_wrapper_module_16910398984436_" class="hs_cos_wrapper hs_cos_wrapper_widget hs_cos_wrapper_type_simple_menu" style="" data-hs-cos-general-type="widget" data-hs-cos-type="simple_menu"><div id="hs_menu_wrapper_module_16910398984436_" class="hs-menu-wrapper active-branch flyouts hs-menu-flow-horizontal" role="navigation" data-sitemap-name="" data-menu-id="" aria-label="Navigation Menu"> <ul role="menu"> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/resources/blogs/trustwave-blog/" role="menuitem" target="_self">Trustwave Blog</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/" role="menuitem" target="_self">SpiderLabs Blog</a></li> </ul> </div></span> </div> </div> </div> <div class="resource-cols"> <div class="resource-cl-inr"> <div class="resn-title"> UPCOMING </div> <div class="resn-menu"> <span id="hs_cos_wrapper_module_16910398984436_" class="hs_cos_wrapper hs_cos_wrapper_widget hs_cos_wrapper_type_simple_menu" style="" data-hs-cos-general-type="widget" data-hs-cos-type="simple_menu"><div id="hs_menu_wrapper_module_16910398984436_" class="hs-menu-wrapper active-branch flyouts hs-menu-flow-horizontal" role="navigation" data-sitemap-name="" data-menu-id="" aria-label="Navigation Menu"> <ul role="menu"> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/resources/upcoming/webinars/" role="menuitem" target="_self">Webinars</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/resources/upcoming/events/" role="menuitem" target="_self">Events</a></li> </ul> </div></span> </div> </div> </div> <div class="resource-cols"> <div class="resource-cl-inr"> <div class="resn-title"> MEDIA & ASSETS </div> <div class="resn-menu"> <span id="hs_cos_wrapper_module_16910398984436_" class="hs_cos_wrapper hs_cos_wrapper_widget hs_cos_wrapper_type_simple_menu" style="" data-hs-cos-general-type="widget" data-hs-cos-type="simple_menu"><div id="hs_menu_wrapper_module_16910398984436_" class="hs-menu-wrapper active-branch flyouts hs-menu-flow-horizontal" role="navigation" data-sitemap-name="" data-menu-id="" aria-label="Navigation Menu"> <ul role="menu"> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/resources/library/?resource_type=show_all&resource_industry=show_all&resource_topic=show_all" role="menuitem" target="_self">Resource Library</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/resources/library/?resource_type=overview,demo&resource_industry=show_all&resource_topic=show_all" role="menuitem" target="_self"> Video Library</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/resources/library/?resource_type=analyst_report&resource_industry=show_all&resource_topic=show_all" role="menuitem" target="_self">Analyst Reports</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/resources/library/?resource_type=webinar&resource_industry=show_all&resource_topic=show_all" role="menuitem" target="_self">Webinar Replays</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/resources/library/?resource_type=case_study&resource_industry=show_all&resource_topic=show_all" role="menuitem" target="_self">Case Studies</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/resources/security-resources/special-offers/" role="menuitem" target="_self">Trials & Evaluations</a></li> </ul> </div></span> </div> </div> </div> <div class="resource-cols"> <div class="resource-cl-inr"> <div class="resn-title"> NOTICES </div> <div class="resn-menu"> <span id="hs_cos_wrapper_module_16910398984436_" class="hs_cos_wrapper hs_cos_wrapper_widget hs_cos_wrapper_type_simple_menu" style="" data-hs-cos-general-type="widget" data-hs-cos-type="simple_menu"><div id="hs_menu_wrapper_module_16910398984436_" class="hs-menu-wrapper active-branch flyouts hs-menu-flow-horizontal" role="navigation" data-sitemap-name="" data-menu-id="" aria-label="Navigation Menu"> <ul role="menu"> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/resources/security-resources/security-advisories/" role="menuitem" target="_self">Security Advisories</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/resources/security-resources/software-updates/" role="menuitem" target="_self">Software Updates</a></li> </ul> </div></span> </div> </div> </div> <div class="resource-cols"> <div class="resource-cl-inr"> <div class="resn-title"> HELP </div> <div class="resn-menu"> <span id="hs_cos_wrapper_module_16910398984436_" class="hs_cos_wrapper hs_cos_wrapper_widget hs_cos_wrapper_type_simple_menu" style="" data-hs-cos-general-type="widget" data-hs-cos-type="simple_menu"><div id="hs_menu_wrapper_module_16910398984436_" class="hs-menu-wrapper active-branch flyouts hs-menu-flow-horizontal" role="navigation" data-sitemap-name="" data-menu-id="" aria-label="Navigation Menu"> <ul role="menu"> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/company/contact/" role="menuitem" target="_self">Contact</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/company/support/" role="menuitem" target="_self">Support</a></li> </ul> </div></span> </div> </div> </div> </div> </div> </div> </div></div> <div id="main-content"> <main class="body-container-wrapper"> <div class="container-fluid body-container"> <div class="row-fluid-wrapper"> <div class="row-fluid"> <div class="span12 widget-span widget-type-cell " style="" data-widget-type="cell" data-x="0" data-w="12"> <div class="row-fluid-wrapper row-depth-1 row-number-1 dnd_area-row-0-max-width-section-centering dnd_area-row-0-background-layers dnd-section dnd_area-row-0-padding dnd_area-row-0-background-image"> <div class="row-fluid "> <div class="span12 widget-span widget-type-cell dnd-column" style="" data-widget-type="cell" data-x="0" data-w="12"> <div class="row-fluid-wrapper row-depth-1 row-number-2 dnd-row cell_17110500074786-row-0-vertical-alignment"> <div class="row-fluid "> <div class="span12 widget-span widget-type-custom_widget module_171105000747812-vertical-alignment dnd-module" style="" data-widget-type="custom_widget" data-x="0" data-w="12"> <div id="hs_cos_wrapper_module_171105000747812" class="hs_cos_wrapper hs_cos_wrapper_widget hs_cos_wrapper_type_module" style="" data-hs-cos-general-type="widget" data-hs-cos-type="module"> <div class="relative "> <div class="content-module text-center mb:text-center text-white heading-default relative " style=""> <div class="content-wrapper"><div class="heading-default"> <h5> </h5> <h1>Resource Library</h1> <p style="color: white;">Browse our IT and security resources to find information on topics around <br>Managed Security, Security News, and more.</p> </div></div> </div> </div> </div> </div><!--end widget-span --> </div><!--end row--> </div><!--end row-wrapper --> </div><!--end widget-span --> </div><!--end row--> </div><!--end row-wrapper --> <div class="row-fluid-wrapper row-depth-1 row-number-3 dnd_area-row-1-background-color dnd-section dnd_area-row-1-background-layers"> <div class="row-fluid "> <div class="span12 widget-span widget-type-custom_widget dnd-module" style="" data-widget-type="custom_widget" data-x="0" data-w="12"> <div id="hs_cos_wrapper_widget_1734721401465" class="hs_cos_wrapper hs_cos_wrapper_widget hs_cos_wrapper_type_module" style="" data-hs-cos-general-type="widget" data-hs-cos-type="module"> <section class="resource_library flex"> <form class="resource_library-filters"> <h2>Filter by:</h2> <div class="filter-container"></div> </form> <div class="resouce_library-wrapper"> <div class="resources_wrapper"></div> <div class="pagination"></div> </div> </section> </div> </div><!--end widget-span --> </div><!--end row--> </div><!--end row-wrapper --> </div><!--end widget-span --> </div> </div> </div> </main> </div> <div id="hs_cos_wrapper_module_169103980660822" class="hs_cos_wrapper hs_cos_wrapper_widget hs_cos_wrapper_type_module" style="" data-hs-cos-general-type="widget" data-hs-cos-type="module"><div class="footer-section" id="module_169103980660822"> <div class="container"> <div class="footer-sec-inr"> <div class="footer-box"> <div class="ls-footer"> <div class="ls-footer-inr"> <div class="ls-title"> <div class="ls-title-inr"> <h2> Stay Informed </h2> </div> </div> <div class="footer-content-group"> <div class="footer-form-head"> <h5> Sign up to receive the latest security news and trends straight to your inbox from Trustwave. </h5> </div> <div class="footer-form"> <span id="hs_cos_wrapper_module_169103980660822_" class="hs_cos_wrapper hs_cos_wrapper_widget hs_cos_wrapper_type_form" style="" data-hs-cos-general-type="widget" data-hs-cos-type="form"><h3 id="hs_cos_wrapper_form_962778582_title" class="hs_cos_wrapper form-title" data-hs-cos-general-type="widget_field" data-hs-cos-type="text"></h3> <div id="hs_form_target_form_962778582"></div> </span> </div> </div> </div> </div> <div class="rs-footer"> <div class="rs-footer-inr"> <div class="menu-box"> <div class="menu-box-inr"> <div class="menu-col"> <span id="hs_cos_wrapper_module_169103980660822_" class="hs_cos_wrapper hs_cos_wrapper_widget hs_cos_wrapper_type_simple_menu" style="" data-hs-cos-general-type="widget" data-hs-cos-type="simple_menu"><div id="hs_menu_wrapper_module_169103980660822_" class="hs-menu-wrapper active-branch flyouts hs-menu-flow-horizontal" role="navigation" data-sitemap-name="" data-menu-id="" aria-label="Navigation Menu"> <ul role="menu"> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/company/about-us/leadership/" role="menuitem" target="_self">Leadership Team</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/company/about-us/our-history/" role="menuitem" target="_self">Our History</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/company/newsroom/news/" role="menuitem" target="_self">News Releases</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/company/newsroom/media/" role="menuitem" target="_self">Media Coverage</a></li> </ul> </div></span> </div> <div class="menu-col"> <span id="hs_cos_wrapper_module_169103980660822_" class="hs_cos_wrapper hs_cos_wrapper_widget hs_cos_wrapper_type_simple_menu" style="" data-hs-cos-general-type="widget" data-hs-cos-type="simple_menu"><div id="hs_menu_wrapper_module_169103980660822_" class="hs-menu-wrapper active-branch flyouts hs-menu-flow-horizontal" role="navigation" data-sitemap-name="" data-menu-id="" aria-label="Navigation Menu"> <ul role="menu"> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/company/careers/" role="menuitem" target="_self">Careers</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/submit-rfp/" role="menuitem" target="_self">Submit RFP</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/company/about-us/accolades/" role="menuitem" target="_self">Awards & Accolades</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/resources/security-resources/special-offers/" role="menuitem" target="_self">Trials & Evaluations</a></li> </ul> </div></span> </div> <div class="menu-col"> <span id="hs_cos_wrapper_module_169103980660822_" class="hs_cos_wrapper hs_cos_wrapper_widget hs_cos_wrapper_type_simple_menu" style="" data-hs-cos-general-type="widget" data-hs-cos-type="simple_menu"><div id="hs_menu_wrapper_module_169103980660822_" class="hs-menu-wrapper active-branch flyouts hs-menu-flow-horizontal" role="navigation" data-sitemap-name="" data-menu-id="" aria-label="Navigation Menu"> <ul role="menu"> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/company/contact/" role="menuitem" target="_self">Contact</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/company/support/" role="menuitem" target="_self">Support</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/resources/security-resources/security-advisories/" role="menuitem" target="_self">Security Advisories</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/resources/security-resources/software-updates/" role="menuitem" target="_self">Software Updates</a></li> </ul> </div></span> </div> </div> </div> <div class="social-box"> <ul> <li> <a href="https://www.linkedin.com/company/trustwave" target="_blank" rel="noopener"><svg style="max-width: 24px; max-height: 20px;" width="1200" height="1227" viewbox="0 0 1200 1227" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M714.163 519.284L1160.89 0H1055.03L667.137 450.887L357.328 0H0L468.492 681.821L0 1226.37H105.866L515.491 750.218L842.672 1226.37H1200L714.137 519.284H714.163ZM569.165 687.828L521.697 619.934L144.011 79.6944H306.615L611.412 515.685L658.88 583.579L1055.08 1150.3H892.476L569.165 687.854V687.828Z" fill="white"></path> </svg> </a> </li> <li> <a href="https://twitter.com/Trustwave" target="_blank" rel="noopener"><svg style="max-width: 24px; max-height: 20px;" width="1200" height="1227" viewbox="0 0 1200 1227" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M714.163 519.284L1160.89 0H1055.03L667.137 450.887L357.328 0H0L468.492 681.821L0 1226.37H105.866L515.491 750.218L842.672 1226.37H1200L714.137 519.284H714.163ZM569.165 687.828L521.697 619.934L144.011 79.6944H306.615L611.412 515.685L658.88 583.579L1055.08 1150.3H892.476L569.165 687.854V687.828Z" fill="white"></path> </svg> </a> </li> <li> <a href="https://www.youtube.com/channel/UC2CCqdrAxD9-Fv83NOdjhqA" target="_blank" rel="noopener"><svg style="max-width: 24px; max-height: 20px;" width="1200" height="1227" viewbox="0 0 1200 1227" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M714.163 519.284L1160.89 0H1055.03L667.137 450.887L357.328 0H0L468.492 681.821L0 1226.37H105.866L515.491 750.218L842.672 1226.37H1200L714.137 519.284H714.163ZM569.165 687.828L521.697 619.934L144.011 79.6944H306.615L611.412 515.685L658.88 583.579L1055.08 1150.3H892.476L569.165 687.854V687.828Z" fill="white"></path> </svg> </a> </li> </ul> </div> <div class="footer-bottom"> <div class="footer-bottom-inr"> <div class="ls-bottom"> <div class="bottom-menu"> <span id="hs_cos_wrapper_module_169103980660822_" class="hs_cos_wrapper hs_cos_wrapper_widget hs_cos_wrapper_type_simple_menu" style="" data-hs-cos-general-type="widget" data-hs-cos-type="simple_menu"><div id="hs_menu_wrapper_module_169103980660822_" class="hs-menu-wrapper active-branch flyouts hs-menu-flow-horizontal" role="navigation" data-sitemap-name="" data-menu-id="" aria-label="Navigation Menu"> <ul role="menu"> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/legal-documents/" role="menuitem" target="_self">Legal</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/legal-documents/terms-of-use/" role="menuitem" target="_self">Terms of Use</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.trustwave.com/en-us/legal-documents/privacy-policy/" role="menuitem" target="_self">Privacy Policy</a></li> </ul> </div></span> </div> </div> <div class="cr-footer"> <div class="footer-copyright"> <p>Copyright © 2025 Trustwave Holdings, Inc. All rights reserved.</p> <input id="hippowiz-ass-injected" type="hidden" value="true"><input id="hvmessage-toextension-listener" type="hidden" value="none"> </div> </div> </div> </div> </div> </div> <!--MOBILE CTA BUTTON--> <div id="mobile-cta-button" class="req-demo-mob" style="position:fixed;left:0;display:block"> </div> <!--END MOBILE CTA BUTTON--> <!--POPUP CONTAINER--> <div class="mobile-cta mfp-hide text-base heading-default text-left inherit popup popup-zoom shadow-xl rounded p-12 mb:p-8 bg-white"> <div id="mobile-cta-popup"></div> </div> <!--END POPUP CONTAINER--> </div> </div> </div> </div> <!-- <span id="hs_cos_wrapper_module_169103980660822_" class="hs_cos_wrapper hs_cos_wrapper_widget hs_cos_wrapper_type_form" style="" data-hs-cos-general-type="widget" data-hs-cos-type="form" ><h3 id="hs_cos_wrapper_form_981947271_title" class="hs_cos_wrapper form-title" data-hs-cos-general-type="widget_field" data-hs-cos-type="text"></h3> <div id='hs_form_target_form_981947271'></div> </span> --> </div> </div> <span style="display: none" class="jscheck">false</span> <!-- HubSpot performance collection script --> <script defer src="/hs/hsstatic/content-cwv-embed/static-1.1293/embed.js"></script> <script src="https://cdnjs.cloudflare.com/ajax/libs/jquery/3.5.1/jquery.min.js"></script> <script src="https://cdnjs.cloudflare.com/ajax/libs/jquery-migrate/3.3.1/jquery-migrate.min.js"></script> <script defer src="https://www.trustwave.com/hs-fs/hubfs/hub_generated/template_assets/1/81597448358/1738839900893/template_plugins.min.js"></script> <script defer src="https://www.trustwave.com/hs-fs/hubfs/hub_generated/template_assets/1/81597439004/1738839908809/template_main.min.js"></script> <script defer src="//www.trustwave.com/hubfs/hub_generated/template_assets/1/82153728608/1735314724496/template_child.min.js"></script> <script> var hsVars = hsVars || {}; hsVars['language'] = 'en-us'; </script> <script src="/hs/hsstatic/cos-i18n/static-1.53/bundles/project.js"></script> <script src="https://www.trustwave.com/hs-fs/hubfs/hub_generated/module_assets/1/128102279083/1738779860605/module_Global-Header.min.js"></script> <!--[if lte IE 8]> <script charset="utf-8" src="https://js.hsforms.net/forms/v2-legacy.js"></script> <![endif]--> <script data-hs-allowed="true" src="/_hcms/forms/v2.js"></script> <script data-hs-allowed="true"> var options = { portalId: '21158977', formId: '92358282-9e9e-4fe6-a21f-c30c1e55336d', formInstanceId: '1579', pageId: '103150220405', region: 'na1', pageName: "Resource Library | Trustwave", inlineMessage: "<p style=\"text-align: center;\"><strong>Thank You<\/strong><\/p>\n<p style=\"text-align: center;\"><img style=\"height: auto; max-width: 100%; width: 258px;\" src=\"https:\/\/21158977.fs1.hubspotusercontent-na1.net\/hubfs\/21158977\/Red%20Line.png\" alt=\"Red Line\" loading=\"lazy\" width=\"258\" height=\"22\"><\/p>\n<p style=\"text-align: center;\">Browse our latest <span style=\"color: #0096b3;\"><a style=\"color: #0096b3;\" href=\"https:\/\/www.trustwave.com\/en-us\/resources\/blogs\/trustwave-blog\/\" rel=\"noopener\">blogs<\/a><\/span> or visit our <span style=\"color: #0096b3;\"><a style=\"color: #0096b3;\" href=\"https:\/\/www.trustwave.com\/en-us\/resources\/library\/\" rel=\"noopener\">Resource Library<\/a><\/span>.<\/p>", rawInlineMessage: "<p style=\"text-align: center;\"><strong>Thank You<\/strong><\/p>\n<p style=\"text-align: center;\"><img style=\"height: auto; max-width: 100%; width: 258px;\" src=\"https:\/\/21158977.fs1.hubspotusercontent-na1.net\/hubfs\/21158977\/Red%20Line.png\" alt=\"Red Line\" loading=\"lazy\" width=\"258\" height=\"22\"><\/p>\n<p style=\"text-align: center;\">Browse our latest <span style=\"color: #0096b3;\"><a style=\"color: #0096b3;\" href=\"https:\/\/www.trustwave.com\/en-us\/resources\/blogs\/trustwave-blog\/\" rel=\"noopener\">blogs<\/a><\/span> or visit our <span style=\"color: #0096b3;\"><a style=\"color: #0096b3;\" href=\"https:\/\/www.trustwave.com\/en-us\/resources\/library\/\" rel=\"noopener\">Resource Library<\/a><\/span>.<\/p>", hsFormKey: "b5615c68f6eea04c19cc3e5c5d13ec39", css: '', target: '#hs_form_target_form_863734669', contentType: "standard-page", formsBaseUrl: '/_hcms/forms/', formData: { cssClass: 'hs-form stacked hs-custom-form' } }; options.getExtraMetaDataBeforeSubmit = function() { var metadata = {}; if (hbspt.targetedContentMetadata) { var count = hbspt.targetedContentMetadata.length; var targetedContentData = []; for (var i = 0; i < count; i++) { var tc = hbspt.targetedContentMetadata[i]; if ( tc.length !== 3) { continue; } targetedContentData.push({ definitionId: tc[0], criterionId: tc[1], smartTypeId: tc[2] }); } metadata["targetedContentMetadata"] = JSON.stringify(targetedContentData); } return metadata; }; hbspt.forms.create(options); </script> <script src="https://www.trustwave.com/hubfs/hub_generated/module_assets/1/182409662493/1735317532635/module_resource-library-js.min.js"></script> <script defer src="https://www.trustwave.com/hs-fs/hubfs/hub_generated/module_assets/1/128101228672/1736859569667/module_Global-Footer.min.js"></script> <script data-hs-allowed="true"> var options = { portalId: '21158977', formId: '68741a11-8e56-4f23-ba7f-b2307e77714c', formInstanceId: '1411', pageId: '103150220405', region: 'na1', pageName: "Resource Library | Trustwave", inlineMessage: "<p>Thank you for your email! You will soon receive the Trustwave newsletter<\/p>", rawInlineMessage: "<p>Thank you for your email! You will soon receive the Trustwave newsletter<\/p>", hsFormKey: "2d2bcf9f3fff963dc67589324a17f78b", css: '', target: '#hs_form_target_form_962778582', contentType: "standard-page", formsBaseUrl: '/_hcms/forms/', formData: { cssClass: 'hs-form stacked hs-custom-form' } }; options.getExtraMetaDataBeforeSubmit = function() { var metadata = {}; if (hbspt.targetedContentMetadata) { var count = hbspt.targetedContentMetadata.length; var targetedContentData = []; for (var i = 0; i < count; i++) { var tc = hbspt.targetedContentMetadata[i]; if ( tc.length !== 3) { continue; } targetedContentData.push({ definitionId: tc[0], criterionId: tc[1], smartTypeId: tc[2] }); } metadata["targetedContentMetadata"] = JSON.stringify(targetedContentData); } return metadata; }; hbspt.forms.create(options); </script> <script> $(document).ready(function() { let windowLocation = window.location.pathname; let contactPageUrls = [ '/en-us/company/contact/', '/en-us/company/global-locations/', '/en-us/company/support/', '/en-us/company/contact/government-support/', '/en-us/company/contact/security-breach/', '/en-us/company/contact/government-security-breach/' ]; let formID = contactPageUrls.includes(windowLocation) ? '361db4f3-34d0-484c-9d02-f28084e99b92' : '0ba582d8-a14e-4ce6-9ec3-def133446115'; if (window.matchMedia('(max-width: 768px)').matches) { hbspt.forms.create({ portalId: "21158977", formId: formID, target: "#mobile-cta-popup" }); } }); </script> <script data-hs-allowed="true"> var options = { portalId: '21158977', formId: '0ba582d8-a14e-4ce6-9ec3-def133446115', formInstanceId: '311', pageId: '103150220405', region: 'na1', pageName: "Resource Library | Trustwave", inlineMessage: "<p style=\"text-align: center;\"> <\/p>\n<p style=\"text-align: center;\"> <\/p>\n<p style=\"text-align: center;\"><strong>Thank You<\/strong><\/p>\n<p style=\"text-align: center;\">One of our sales specialists will be in touch with you shortly. <\/p>\n<p style=\"text-align: center;\"><img style=\"height: auto; max-width: 100%; width: 258px;\" src=\"https:\/\/21158977.fs1.hubspotusercontent-na1.net\/hubfs\/21158977\/Red%20Line.png\" alt=\"Red Line\" loading=\"lazy\" width=\"258\" height=\"22\"><\/p>\n<p style=\"text-align: center;\">Browse our latest <span style=\"color: #0096b3;\"><a style=\"color: #0096b3;\" href=\"https:\/\/www.trustwave.com\/en-us\/resources\/blogs\/trustwave-blog\/\" rel=\"noopener\">blogs<\/a><\/span> or visit our <span style=\"color: #0096b3;\"><a style=\"color: #0096b3;\" href=\"https:\/\/www.trustwave.com\/en-us\/resources\/library\/\" rel=\"noopener\">Resource Library<\/a><\/span>.<\/p>\n<p style=\"text-align: center;\"> <\/p>\n<p style=\"text-align: center;\"> <\/p>\n<p style=\"text-align: center;\"> <\/p>", rawInlineMessage: "<p style=\"text-align: center;\"> <\/p>\n<p style=\"text-align: center;\"> <\/p>\n<p style=\"text-align: center;\"><strong>Thank You<\/strong><\/p>\n<p style=\"text-align: center;\">One of our sales specialists will be in touch with you shortly. <\/p>\n<p style=\"text-align: center;\"><img style=\"height: auto; max-width: 100%; width: 258px;\" src=\"https:\/\/21158977.fs1.hubspotusercontent-na1.net\/hubfs\/21158977\/Red%20Line.png\" alt=\"Red Line\" loading=\"lazy\" width=\"258\" height=\"22\"><\/p>\n<p style=\"text-align: center;\">Browse our latest <span style=\"color: #0096b3;\"><a style=\"color: #0096b3;\" href=\"https:\/\/www.trustwave.com\/en-us\/resources\/blogs\/trustwave-blog\/\" rel=\"noopener\">blogs<\/a><\/span> or visit our <span style=\"color: #0096b3;\"><a style=\"color: #0096b3;\" href=\"https:\/\/www.trustwave.com\/en-us\/resources\/library\/\" rel=\"noopener\">Resource Library<\/a><\/span>.<\/p>\n<p style=\"text-align: center;\"> <\/p>\n<p style=\"text-align: center;\"> <\/p>\n<p style=\"text-align: center;\"> <\/p>", hsFormKey: "4166438368444fe3a28b284f8ac69849", css: '', target: '#hs_form_target_form_981947271', contentType: "standard-page", formsBaseUrl: '/_hcms/forms/', formData: { cssClass: 'hs-form stacked hs-custom-form' } }; options.getExtraMetaDataBeforeSubmit = function() { var metadata = {}; if (hbspt.targetedContentMetadata) { var count = hbspt.targetedContentMetadata.length; var targetedContentData = []; for (var i = 0; i < count; i++) { var tc = hbspt.targetedContentMetadata[i]; if ( tc.length !== 3) { continue; } targetedContentData.push({ definitionId: tc[0], criterionId: tc[1], smartTypeId: tc[2] }); } metadata["targetedContentMetadata"] = JSON.stringify(targetedContentData); } return metadata; }; hbspt.forms.create(options); </script> <!-- Start of HubSpot Analytics Code --> <script type="text/javascript"> var _hsq = _hsq || []; _hsq.push(["setContentType", "standard-page"]); _hsq.push(["setCanonicalUrl", "https:\/\/www.trustwave.com\/en-us\/resources\/library\/"]); _hsq.push(["setPageId", "103150220405"]); _hsq.push(["setContentMetadata", { "contentPageId": 103150220405, "legacyPageId": "103150220405", "contentFolderId": null, "contentGroupId": null, "abTestId": null, "languageVariantId": 103150220405, "languageCode": "en-us", }]); </script> <script type="text/javascript" id="hs-script-loader" async defer src="/hs/scriptloader/21158977.js"></script> <!-- End of HubSpot Analytics Code --> <script type="text/javascript"> var hsVars = { render_id: "133ee857-1ab3-429b-b156-054171e498e0", ticks: 1739835167756, page_id: 103150220405, content_group_id: 0, portal_id: 21158977, app_hs_base_url: "https://app.hubspot.com", cp_hs_base_url: "https://cp.hubspot.com", language: "en-us", analytics_page_type: "standard-page", scp_content_type: "", analytics_page_id: "103150220405", category_id: 1, folder_id: 0, is_hubspot_user: false } </script> <script defer src="/hs/hsstatic/HubspotToolsMenu/static-1.393/js/index.js"></script> <script> // Function to erase the cookie: function eraseCookie(name, path = '/', domain = '.trustwave.com') { document.cookie = `${name}=; expires=Thu, 01 Jan 1970 00:00:00 GMT; path=${path}; domain=${domain};`; } // Clear the cookie that hides the welcome message from Chat eraseCookie('hs-messages-hide-welcome-message'); </script> </body></html>