Hi [[ session.user.profile.firstName ]]

Cloud Security and Compliance

  • Date
  • Rating
  • Views
  • The Current State of Cyber Security is a 24x7x365 Game
    The Current State of Cyber Security is a 24x7x365 Game Paul Le Page, Senior Solutions Architect, Alert Logic Recorded: Oct 18 2018 45 mins
    The lack of awareness around cyber threats and the risk that these pose to an organisation is a worrying state of affairs. Data breaches, hacks and various cyber-attacks dominate the headlines on a regular basis. Unfortunately protecting an organisation against a cyber threat becomes impossible if you don’t know that the threat exists. So how do you protect your organisations against known and unknown threats? Security is constantly changing. To stay ahead of threats, you need to leverage software plus services to augment your security team and capabilities.

    Join Paul Le Page, Senior Solutions Architect, as he shares insights from Alert Logic’s 2018 Critical Watch Report, based upon findings from verified security incidents from thousands of companies around world.

    Highlights Include:
    • Insights from Alert Logic's 2018 Critical Watch Report
    • Realities for scaling threat detection & response across on-prem to cloud environments
    • Understand how today’s vulnerabilities are being exploited
    • Learn how to augment your security team and capabilities without breaking the bank
  • SOC Stories: Inside the Front Lines of Cyber Defense
    SOC Stories: Inside the Front Lines of Cyber Defense Ben Nguyen, Roy Bray, and Mobeen Khan, Security Analysts at Alert Logic Recorded: Oct 11 2018 51 mins
    A Security Operations Center (SOC) provides proactive threat monitoring, threat detection, and advice to stop threats quickly. But you may be surprised at what goes on behind the scenes to keep you safe.

    Hear first-hand how our SOC team works tirelessly to thwart attackers — from the analysts themselves. We’ll also discuss Alert Logic’s new cybersecurity report which shows how broad, continuous assaults of massive scale dominate today’s attacks.

    Real cyber threat experts will share:
    • The critical role a SOC plays in a defensive cybersecurity strategy across any platform
    • Techniques used to defend against attempted attacks and breaches
    • Strategies to help you proactively identify and address high risk areas

    Our SOC gives you the edge over cyber adversaries. Join us and learn how.
  • Understanding the Attack Landscape – Your Best Cyber Security Defense
    Understanding the Attack Landscape – Your Best Cyber Security Defense Matt Downing and Carlos Castillo, Threat Intelligence Researchers, Alert Logic Recorded: Sep 27 2018 33 mins
    With smart attackers seeking the weakest spots in network defenses and retooling to understand the changing attack surface – you need to get, and stay, ahead of the game.

    As we reflect on the state of security this past year, it’s evident that cybercriminals continue to be successful with a trusted set of techniques proven effective against common vulnerabilities and misconfigurations. Attackers looking to make a buck prey on businesses of all sizes.

    Fortunately, by understanding what the attack landscape looks like, where the next attacks will be coming from, and what your attackers might be after, you can achieve top-strength security. Join this session to hear how attackers are infiltrating enterprise environments and how you can learn from them. We’ll dive into real case studies and provide actual code samples.

    We’ll discuss recent breaches and share:

    • An overview of the timeline announcement to public proof-of-concept release
    • Alert Logic’s immediate coverage with generalized web coverage on our threat manager appliances
    • The number of attacks over time
    • Categorizing attacker payloads to define their initial compromise goals and intentions
    • A look at understanding victim targeting
    • Common outcomes in incidents where the attacks were successful

    What you’ll take away:

    • An understanding of the critical timing to patch vulnerable systems
    • How Alert Logic’s SOC with Active Intelligence can carry the load for detection and response
    • Ways to detect common attacker goals and intentions

    Join us for these key take-aways and more, as we share critical insights for understanding today’s attack landscape.
  • Protect Your AWS Containers
    Protect Your AWS Containers Dan Pitman, Senior Solutions Architect - Alert Logic and Richard Marshall, Head of Platforms - Wealth Wizards Recorded: Sep 18 2018 59 mins
    Protect against a wide array of cyberattacks that target your AWS containers with a solution designed for real-time detection of known and unknown exploits for AWS-deployed Docker, Kubernetes, Elastic Beanstalk, and Elastic Container Service (ECS).

    Container adoption is skyrocketing, growing 40% in the last year. Security concerns are also growing and the top roadblock to container deployment. Steps like process monitoring, vulnerability management, and configuration management are available to alleviate security concerns. But without the ability to inspect the network traffic that targets containers, security teams continue to struggle. This enables suspicious activity within your container environments to go undetected and leaves you susceptible to a container or base host compromise.
    Alert Logic recently announced the industry’s first network detection for containers allowing customers to inspect network traffic for malicious activity provide them with faster detection of compromises, and reduced risk of attacks to their cloud workloads on AWS.

    Learn more in this impactful webinar as Dan Pitman, Senior Solutions Architect at Alert Logic presents a timeline demonstrating what happens when a container threat is detected, and how Alert Logic prioritise it and proactively escalates it with visual context and remediation advice. Also, Richard Marshall from Wealth Wizards will share the best practices learnt from the past 18 months of working with Kubernetes and Containers.

    Highlights include:
    - A snapshot of the differences between Docker and Kubernetes containers
    - What you need to know to stay ahead of attacks on containers
    - Best practices to avoid compromising your containers and base hosts
    - Security hygiene for containers
    - Customer Case study: Life with Kubernetes and containers
  • AWS Security: Advanced Threat Detection and Response
    AWS Security: Advanced Threat Detection and Response Paul Le Page, Solutions Architect at Alert Logic Recorded: Sep 6 2018 58 mins
    Security tools alone are not enough as your AWS environment becomes more complex, and the need for comprehensive security – including people, process, and technology – becomes apparent. Cyber threats continue to increase in volume and sophistication, so where do you start when incorporating advanced threat detection and response capabilities into your security strategy?

    Start here with Paul Le Page, Solutions Architect at Alert Logic as he lists the top considerations to better protect your AWS workloads and applications. Learn the core fundamentals to a stronger AWS cloud security strategy.

    Register now for this engaging webinar and gain key security insights including:
    - Understanding your AWS environment and the exposures your web apps face
    - Learnings from top configuration vulnerabilities involving root, S3, IAM, security groups, and more
    - The use of multiple data sources to attain a “defense in depth” security strategy
    - Threat detection capabilities and creating an effective incident response plan
  • AWS Security: Advanced Threat Detection and Response
    AWS Security: Advanced Threat Detection and Response Paul Le Page, Solutions Architect at Alert Logic Recorded: Aug 23 2018 58 mins
    Security tools alone are not enough as your AWS environment becomes more complex, and the need for comprehensive security – including people, process, and technology – becomes apparent. Cyber threats continue to increase in volume and sophistication, so where do you start when incorporating advanced threat detection and response capabilities into your security strategy?

    Start here with Paul Le Page, Solutions Architect at Alert Logic as he lists the top considerations to better protect your AWS workloads and applications. Learn the core fundamentals to a stronger AWS cloud security strategy.

    Register now for this engaging webinar and gain key security insights including:
    - Understanding your AWS environment and the exposures your web apps face
    - Learnings from top configuration vulnerabilities involving root, S3, IAM, security groups, and more
    - The use of multiple data sources to attain a “defense in depth” security strategy
    - Threat detection capabilities and creating an effective incident response plan
  • Threat Hunting, the Difference Between Safe and Sorry
    Threat Hunting, the Difference Between Safe and Sorry Dr. Jonny Milliken, Threat Intelligence Manager, Alert Logic; Holger Schulze, CEO, Cybersecurity Insiders Recorded: Aug 2 2018 46 mins
    Think Threat Hunting is a nice-to-have, or just a buzz word? Think again. Threat hunting is critical for early detection of unknown threats and advanced attacks that turn into undetected breaches.

    In today’s complex cybersecurity landscape, threats are becoming more sophisticated, frequent, and elusive. It’s no longer enough to depend on traditional, reactive security to stay safe – incorporating threat hunting techniques in your cybersecurity strategy is a necessity.

    Threat hunting puts security on the offense. Rather than just waiting for an attack to trip an alarm, threat hunting takes a comprehensive, holistic approach to proactively monitor for and identify suspicious or potentially malicious activity, so you can take action earlier.

    Hear from experts on how and why threat hunting is critical for your cybersecurity strategy. In this webinar, we’ll cover:

    • How these advanced multi-step attacks work and go undetected
    • How to find evidence of emerging threats and preserve indicators of compromise
    • Logs, and why they are a threat hunter’s best friend
    • Using techniques like honey pots to draw out malicious insiders and would-be cyber attackers
  • Tales from the SOC: Live Simulated Hack
    Tales from the SOC: Live Simulated Hack Graeme McMillan, Solutions Architect, Alert Logic Recorded: Jul 19 2018 26 mins
    Watch this 3-stages Live Simulated Hack Demo from Alert Logic's Cloud Security Summit as we show you the impact of reconnaissance tactics to identify vulnerable systems. We also demonstrate how easy it is for cyber criminals to gain foothold in remote environments, the latest tricks attackers are using, and what you should focus on to keep data and systems secure. An exciting and very important demonstration for anyone who develops applications, manages websites or is interested in security.

    Join Graeme McMillan, Alert Logic’s Sales Engineer, as e demonstrated the importance of understanding the risk and your attack surface of your business-critical applications. Make sure to identify high risk areas, before the cyber criminals get there first.
  • Observation of Trifles - Sherlock Holmes' Lessons on Machine Learning & Security
    Observation of Trifles - Sherlock Holmes' Lessons on Machine Learning & Security Ben Banks, Global Director of Cybersecurity, Ensono Recorded: Jul 19 2018 28 mins
    Join Ensono Global Director of Cybersecurity Ben Banks for a timely and informative session on machine learning and security.

    In this webinar you will learn:
    - Making correct inferences and deductions from small indicators combined with larger datasets (should we start to correlate data about our clients share prices and related news items).
    - The importance of the reveal (integrability) i.e. "Holmes....how the devil did you know?"
    - The importance of people-centric analysis and 'profiling' i.e. motive
    - Moriarty i.e. expect your enemy to be as good as - if not better - than you
  • To SIEM or not to SIEM: Protecting Applications in Cloud and Hybrid Environments
    To SIEM or not to SIEM: Protecting Applications in Cloud and Hybrid Environments Dan Pitman, Senior Solutions Architect, Alert Logic Recorded: Jul 19 2018 16 mins
    Today’s security information and event management (SIEM) solutions are powerful tools that promise to make use of your endpoint, network, and system log data while empowering you with direct control to configure what constitutes a real in your unique environment. However, their success and efficacy depend on the thought and effort that goes into how they are configured, deployed, used and maintained.

    When considering a SIEM for security, there a few factors that are often overlooked:
    * Challenges of aligning SIEM with today’s security challenges
    * Difficulty of improving outputs to be accurate, actionable and relevant
    * Underestimating total effort and cost required to meet objectives

    For most companies, desired outcomes circle around shrinking the attack surface, accurate threat detection, reducing dwell time and most importantly, addressing the current threat landscape. These goals are achievable at lower cost in terms of TCO, staff hours and infrastructure management burden. Simply put, there is a better way.

Embed in website or blog