Hi [[ session.user.profile.firstName ]]


  • Date
  • Rating
  • Views
  • Stealthy or Die: How to evade adversary detection
    Stealthy or Die: How to evade adversary detection
    Tony Meehan, VP of Engineering Recorded: May 24 2016 35 mins
    Sophisticated adversaries are tampering and disabling defensive security stack. They hide and adapt their behavior upon detection of any traditional security tools. Enterprises must be stealthy and hide their presence from these advanced and adaptive adversaries.

    Endgame VP of Engineering, Tony Meehan will talk about why it is essential for organizations to be stealthy to rapidly detect and stop adversaries in enterprise network. In this webinar you will learn:
    - Why stealth matters
    - What does being stealthy mean
    - How do you avoid detection from adversaries
  • Hunting for Malware with Machine Learning
    Hunting for Malware with Machine Learning
    Hyrum Anderson Recorded: Mar 24 2016 49 mins
    Defense strategies have run their course. The traditional security stack no longer provides the mission assurance enterprises need. Endgame brings offense to the enterprise by automating the hunt for adversaries that bypass the traditional security stack.

    In this talk our expert will talk about how Endgame uses automated malware classification techniques to hunt for cyber adversaries within enterprise networks.
  • Hunting for Sentient Adversaries
    Hunting for Sentient Adversaries
    Mike Nichols, Prinicipal Product manager Recorded: Feb 5 2016 40 mins
    This webinar will talk through:
    - Why enterprises need to hunt
    - Who should hunt in the network
    - How do you begin hunting for adversaries
  • Detecting and Preventing Weaponized Exploitation
    Detecting and Preventing Weaponized Exploitation
    Cody Pierce, Senior Director of Vulnerability Research at Endgame Recorded: Nov 17 2015 43 mins
    This webinar will go over:
    * Common strategies for exploiting software vulnerabilities
    * How mitigations disrupt and increase the cost of developing exploits
    * What is the current state-of-the-art
    * How Endgame is approaching the problem
    * Endgame research prototypes in practice

Embed in website or blog