Hi [[ session.user.profile.firstName ]]

Cisco Umbrella

  • Date
  • Rating
  • Views
  • Anatomy of the attacks: WannaCry ransomware & Google OAuth phishing
    Anatomy of the attacks: WannaCry ransomware & Google OAuth phishing Alex Chiu, threat researcher for Cisco Talos, and Brad Antoniewicz, security researcher for Cisco Umbrella Recorded: Jun 12 2017 53 mins
    On May 3rd, over a million Gmail users granted a fake, but convincing, application full access to their emails and contacts. Two weeks later, a major ransomware attack spread rapidly and affected a multitude of organizations across the world. Needless to say, it’s been a busy month in the infosec world.

    Now that the dust has started to settle, join our security researchers Alex Chiu, threat researcher for Cisco Talos, and Brad Antoniewicz, security researcher for Cisco Umbrella, as they take you through the details of the recent attacks.

    In the session, our researchers will share:

    - Key findings from their research

    - Details uncovered about the attackers’ infrastructure, including analysis of the malware, domains, and IPs used in the attack

    - How Cisco identified and blocked the attacks, including a timeline of events

    - Steps you can take to protect your organization

    We’ll also look ahead at how these types of attacks could potentially evolve over time and how you can better prepare.
  • How Threat Intelligence is Streamlining Security Operations
    How Threat Intelligence is Streamlining Security Operations Dr. Dhia Mahjoub, Principal Engineer of Cisco Umbrella Research, & Daniel Hatheway, Sr. Technical Analyst at Recorded Future Recorded: May 2 2017 49 mins
    Manually turning data on cyber attacks, vulnerabilities, and exploits into actionable threat intelligence requires a significant investment of time and resources.

    With security talent and budget in short supply, you need to get more from your data, faster.

    Join Dr. Dhia Mahjoub, Principal Engineer of Cisco Umbrella Research, and Daniel Hatheway, Senior Technical Analyst at Recorded Future, to see how you can gain a more complete view of the threat landscape through a new, exciting integration.

    Attendees will learn how to accelerate incident response and streamline security operations, now. Learn how:

    -Cisco Umbrella Investigate provides access to a live view of domains, IPs, ASNs, and malware file hashes, enabling incident responders to pinpoint attackers’ infrastructures and predict potential threats.

    -Recorded Future expands upon the Investigate data from technical, open and dark web sources to further reduce the risk of attackers in the shortest amount of time.

    -Together, they automate threat intelligence across the broadest set of sources to provide the single best defense against threats.

    Register today to see how you can make more informed decisions, faster.
  • Introducing the industry's first Secure Internet Gateway in the cloud.
    Introducing the industry's first Secure Internet Gateway in the cloud. Brian Roddy, Engineering Executive, Cloud Security and Bobby Guhasarkar, Director Product Marketing, Cisco Umbrella Recorded: Mar 29 2017 57 mins
    The world is evolving… from how we work to where we work and how we access our sensitive data. Is your security keeping pace with the changes?

    Find out how you can block threats like never before with the industry’s first Secure Internet Gateway in the cloud.

    Join Cisco Security Experts: Brian Roddy, Engineering Executive, Cloud Security and Bobby Guhasarkar, Director Product Marketing, Cisco Umbrella, on Wednesday, March 22nd at 10am PT for a can’t miss review of what needs to be your first line of defense in 2017.

    Attendees will see why Cisco Umbrella provides visibility unlike any other security platform:

    -Protects users on and off network
    -Provides broadest coverage of malicious destinations and files
    -Defends against known and emergent threats over all ports and protocols

    Register and learn why you need a Secure Internet Gateway that’s easy to deploy and manage, uncovers attacks before they launch AND integrates with your existing security investments.

    Your security starts here.
  • Hunting & Disrupting Cyber-Criminals
    Hunting & Disrupting Cyber-Criminals Jeremy Linden, Sr. Product Manager Cisco Umbrella, Dhia Mahjoub, Principal Engineer Cisco Umbrella Recorded: Feb 28 2017 62 mins
    Warning. It’s Hunting Season.

    Hackers don’t wear blaze orange. Sophisticated adversaries are targeting you, your employees and your data. Let’s face it, yesterday’s traditional security defenses leave you exposed and render your corporate network open terrain. Take the target and put it on the attacker’s back.

    Join a panel of security experts: Jeremy Linden, Sr. Product Manager Cisco Umbrella, Dhia Mahjoub, Principal Engineer Cisco Umbrella, Craig Williams, Sr. Technical Leader, Cisco Talos, and Robert Simmons, Director of Research, ThreatConnect, for an inside look at how to identify attackers, stalk their internet infrastructures and disrupt cyber-criminals before they disrupt you. Hunt or be hunted.
  • DNS - A New and Effective Way To Stop Ransomware Without Impacting Performance
    DNS - A New and Effective Way To Stop Ransomware Without Impacting Performance John Kindervag, Vice President, Principal Analyst at Forrester and OpenDNS Senior Product Manager, Barry Fisher Recorded: Nov 29 2016 58 mins
    Seasons change. Trends change. Isn’t it time your approach to security changes, too?

    DNS is used by any device on your network. DNS can see any connection destined to anywhere on the Internet, both on or off the corporate network. Are you taking advantage of this secret weapon?

    Join keynote speaker John Kindervag, Vice President, Principal Analyst at Forrester and OpenDNS Senior Product Manager, Barry Fisher, as they discuss the latest challenges facing security practitioners and how using DNS can be an effective way to stop malware, like ransomware, without impacting performance.

    Attendees will learn:
    -The value of identifying and understanding attacker internet infrastructures used to stage threats.
    -Why signature-based antivirus, firewalls, and proxy gateways miss most command & control (C2) callbacks.
    -How DNS can prevent threats and provide a new layer of breach protection for organizations.

    Whether you are a small business without a dedicated security team or a large enterprise, leveraging DNS in your security stack can block 50% more threats than AV or firewalls alone.
  • The Holy Grail of Incident Response: A Single, Correlated Source of Intelligence
    The Holy Grail of Incident Response: A Single, Correlated Source of Intelligence Atheana Fulgencio & Jeremy Linden Recorded: Oct 18 2016 27 mins
    Time is of the essence when you’re investigating security incidents. While it’s critical to find out as much as you can about the incident from internal sources (logs, network activity, endpoint data, etc.), you also need context about what type of threat you’re facing.

    When you come across an domain, IP, or file hash during investigations, you need to answer dozens of questions ASAP.

    -Is this malicious? What’s known about it?
    -What other domains, IPs, or file hashes are related?
    -Is this a widespread threat or more targeted?

    And to answer these questions today, you probably need to go to multiple sources and manually piece the puzzle together. What if you had a single, correlated source of intelligence instead?

    OpenDNS Investigate now includes malware file data from Cisco AMP Threat Grid. Join our webcast to learn how Investigate provides the most complete view of the infrastructure used in attacks. With Investigate, you can:

    -Instantly validate malicious domains, IPs, and file hashes
    -Identify the Internet infrastructure and malware files related to attacks
    -Uncover infrastructure being staged for future attacks
    -Speed up investigations and stay ahead of threats
  • The modern way of hunting  - How three CTOs tackle incident response
    The modern way of hunting - How three CTOs tackle incident response OpenDNS CTO, Dan Hubbard, Lancope CTO, TK Keanini, and Threat Grid CTO, Dean De Beer Recorded: Aug 22 2016 53 mins
    Your corporate network is open terrain. And it's hunting season. Malware, ransomware, and phishing scams are lurking. It's time to identify these threats to the enterprise earlier in the kill-chain and protect your employees, your data, and your network. The next evolution of Incident Response is here.

    Isn't it time you adapted your security stack to gain visibility into threats across you endpoints, network, and cloud? We can arm you with the tools you need most to see what’s happening not just on your network and your endpoints, but also out on the Internet in the wild.

    Join the product CTO’s from both OpenDNS and our Advanced Threats Groups, Dan Hubbard, Dean De Beer, and TK Keanini as they review how to modernize your response with critical solutions that provide visibility into the network, endpoint, and cloud and additionally talk about how to use these tools to investigate threats in the present, retrospectively, and into the future.

    Join not one, but three CTOs from OpenDNS, AMP Threat Grid and Lancope for a complete review of what it takes to accelerate investigations, decrease incident response times, and uncover potential attacks before they are launched.

    Hear from OpenDNS CTO, Dan Hubbard, Lancope CTO, TK Keanini, and Threat Grid CTO, Dean De Beer on August 22nd at 10am PT. You’ll learn:

    -Strategies for addressing customer incident response challenges across Network, Endpoint and Cloud
    -Three unique approaches for digging deeper into what happened before, during, and after an attack
    -How together OpenDNS, AMP Threat Grid and Lancope combine to give you the best incident response portfolio

    Register now and let the hunting begin.
  • Are ransomware attacks holding the healthcare industry hostage?
    Are ransomware attacks holding the healthcare industry hostage? Barry Fisher, Sr. Product Manager at OpenDNS Recorded: Jun 29 2016 57 mins
    Healthcare has become criminals most lucrative target. Why? Because medical records are worth 10 times that of credit cards. The recent digitization of the healthcare industry has rapidly expanded the attack surface to include electronic healthcare records, patient portals, IoT-enabled medical devices and more.

    Imagine losing access to all of your patient data—only to find out you are being extorted by criminals who require payment to get it back. This type of attack can disrupt life & death technologies that medical practitioners rely on to perform their jobs. Ransomware adds up to a significant threat to the healthcare industry.

    But, there are steps you can take to actively reduce the number of ransomware infections across your organization. OpenDNS and Cisco are on the forefront of helping our healthcare customers against various versions of ransomware.

    Hear from Barry Fisher, Sr. Product Manager at OpenDNS, to learn the simplest way for healthcare security practitioners to stay ahead of Ransomware attacks. You’ll learn how to:

    -Reduce ransomware infections across your organization
    -Identify the infrastructure used by attackers to connect, control and transfer the encryption keys
    -Protect medical IoT endpoints, patients’ devices and even devices that don’t run agents, like heart monitors and infusion pumps

    Register now to learn how to start covering your healthcare security gaps.
  • The Best Way to Operationalize Threat Intelligence
    The Best Way to Operationalize Threat Intelligence Barry Fisher, Sr. Product Marketing Manager at OpenDNS, and Joe Malenfant, Product Marketing Manager at Cisco AMP Threat Grid Recorded: Apr 26 2016 54 mins
    Based on our research, it takes 100-200 days for most organizations just to detect a new threat–before any action can be taken. How many more days go by before new threat intelligence is enforced?

    Where are you gathering this intelligence from? Where and how are you enforcing it? Feed providers, network appliances, endpoint agents, or everywhere?

    In this webinar, you’ll learn how:
    -Both time-to-detection and attack dwell time is reduced by orders of magnitude through security automation.
    -Integrating threat analytics in your security stack creates intelligence specific to your organization.
    -You’ll prioritize investigating malicious domains and files involved with severe threats compromising critical systems.
  • Tracking the most significant cyber threat: Ransomware
    Tracking the most significant cyber threat: Ransomware Dan Hubbard, CTO at OpenDNS, and Dean De Beer, Principal Engineer at AMP Threat Grid Recorded: Apr 13 2016 52 mins
    Imagine losing access to all of your critical data — only to find out you are being extorted by criminals who require payment in order to get it back. This is happening at an alarming rate and is commonly referred to as Ransomware.

    While these attacks are most prevalent on employee laptops, ransomware is now targeting departmental file servers and other critical infrastructure.

    But, there are steps you can take to better protect your company and reduce the risk of ransomware infections — and OpenDNS and Cisco have been at the forefront helping our customers against various versions of ransomware.

    Join this webcast with experts from Cisco including Dan Hubbard, CTO at OpenDNS, and Dean De Beer, Principal Engineer at AMP Threat Grid, as they discuss steps you can take to reduce the risk of ransomware infections.

    Learn how:
    - Ransomware has evolved and what we know about it today
    - To predict what ransomware might do next
    - You can identify the Internet infrastructure used by the attackers to connect, control, and transfer the encryption keys

Embed in website or blog