Hi [[ session.user.profile.firstName ]]

Cybereason

  • Date
  • Rating
  • Views
  • Revealing Cyber-Attacks in Real Time: Science or Fiction? Revealing Cyber-Attacks in Real Time: Science or Fiction? Lital Asher-Dotan, Yonatan Striem-Amit Recorded: Mar 4 2015 47 mins
    In a world of advanced threats and complex hacking operations detecting the adversary is increasingly difficult as even the best protected organizations are being breached.

    In this webinar we will discuss new methodologies for detecting the adversary post-breach.

    Join us to learn how to:
    1 - reveal in real time the attacker's actions in the network, including: privilege escalation, process injection, lateral movement, communication with the command and control server (C&C), and more.
    2 - track in real time the attack's timeline, root cause, communication and effect on endpoints and users.
    3 - Accelerate incident investigation by automatically eliminating false alerts and providing context to detected incidents.

    The webinar will be led by Yonatan Striem-Amit, Cybereason CTO and Co-Founder and Lital Asher-Dotan, Marketing Director.
  • Are Hackers Ahead of the Game? 6 Ways to Close the Security Gap Are Hackers Ahead of the Game? 6 Ways to Close the Security Gap Yonatan Striem Amit, CTO, Cybereason Recorded: Dec 18 2014 47 mins
    Did you know the average security breach goes undetected for 210 days, and that it usually takes an additional month for security teams to respond?

    Join us to discuss six common security drawbacks and practical ways to accelerate detection and response. This webinar will be presented by Yonatan Striem Amit, Cybereason’s CTO and Lital Asher-Dotan, Marketing Director at Cybereason. Yonatan brings over 15 years of government and military cyber security experience and Lital brings over 10 years of experience in technology and innovation. Recent data shows that the average cost of a breach is 3.5 million dollars, so why wait?