Hi [[ session.user.profile.firstName ]]


  • Date
  • Rating
  • Views
  • Top Cybersecurity Predictions for 2019
    Top Cybersecurity Predictions for 2019
    Brian Robison, moderator with expert panelists: Ryan Permeh, Greg Silberman, Steve Mancini and Scott Scheferman Recorded: Jan 17 2019 63 mins
    Cylance® Chief Evangelist Brian Robison hosts a panel of seasoned Cylance leaders in discussion about what your organization should expect in the year ahead. They cover a wide range of topics, including predictions about the future threat landscape, new and emerging business and technology investment priorities, and what organizations can do to better protect themselves in 2019.
  • Hacking Exposed: Testing Defenses
    Hacking Exposed: Testing Defenses
    Brian Robison, Chief Evangelist at Cylance Recorded: Nov 15 2018 56 mins
    The previous Hacking Exposed episodes introduced you to many of the tools and techniques real-world adversaries use to evade endpoint security products. We will put these concepts into practice and conduct full-scale, multi-phased, endpoint compromises. The techniques and tactics you will learn in this Hacking Exposed session will provide valuable tools for testing the effectiveness of your current defenses.

  • The Evolution of Endpoint Detection and Response
    The Evolution of Endpoint Detection and Response
    Fernando Montenegro, 451 Research and Ed Metcalf of Cylance Recorded: Oct 4 2018 52 mins
    Endpoint Detection and Response products were introduced to the market in the early 2010’s and have focused on detecting signs of a compromised system by recording behaviors then alerting humans. Unfortunately, the scale and pace of attacks often overwhelm even the best security analysts and teams.

    As technology improves, new approaches to performing endpoint detection and response emerge. Artificial Intelligence and Machine Learning are new technologies that have been succesfuly applied to the traditional anti-virus problem of detecting “infected” or malicious files without the need for manually created signatures. It is now possible to extend this technology to the problem of detecting, and preventing attacks based on the new techniques that do not rely on infected files, but rather on the malicious behavior of systems regaurdless of the technique used for the attack.

    Join Fernando Montenegro of 451 Research and Ed Metcalf of Cylance for this webinar about how endpoint detection and response can evolve by incorporating newer capabilities, and better support defenses in the modern threat environment.
  • Cylance and Amar Singh at Infosecurity Europe 2018
    Cylance and Amar Singh at Infosecurity Europe 2018
    Amar Singh (Cyber Management Alliance) | Matt Stephenson (Cylance) Recorded: Jun 19 2018 9 mins
    Join Matt Stephenson, Cylance and Amar Singh, Cyber Management Alliance live from Infosecurity Europe 2018
  • [Webcam Panel] Trends Discussed at Infosecurity Europe 2018
    [Webcam Panel] Trends Discussed at Infosecurity Europe 2018
    Amar Singh (Cyber Management Alliance) | Matt Stephenson (Cylance) | Danny Eastman (Cyber Fortified) | Paul Simmonds (CSA) Recorded: Jun 13 2018 57 mins
    Join this post-conference panel for an in-depth look into the biggest trends and cyber threats covered during the Infosecurity Europe 2018 conference in London.

    Tune in for an interactive Q&A panel with industry experts as they discuss:
    - What are the biggest threats to security in 2018?
    - Key steps to take today to better secure your critical data assets
    - Top technological advancements powering security
    - CISO strategy in the age of breaches
  • Red Team Exercises: How to Defend Against Cyber Attacks
    Red Team Exercises: How to Defend Against Cyber Attacks
    Anthony Paimany, Principle Red Team Consultant at Cylance® Recorded: Apr 19 2018 41 mins
    Defending from increasingly advanced and targeted cyberattacks is a constant challenge. Organizations need to gain a true understanding of their network security gaps and vulnerabilities from the perspective of an attacker in order to better address the risk these gaps and vulnerabilities can place on their operations.

    Join Anthony Paimany, Principle Red Team Consultant at Cylance®, as he demonstrates how cyberattacks are executed to test assumptions at every level of detection and response and discusses:

    - Cyberattackers’ primary tools, techniques, and procedures
    - How to determine gaps in defensive controls
    - How to identify and prioritize these risks through penetration tests, assessments, and social engineering
  • The Role of Machine Learning In Improving Endpoint Security
    The Role of Machine Learning In Improving Endpoint Security
    Doug Cahill, ESG Senior Analyst Recorded: Nov 17 2017 4 mins
    Listen to the new survey findings from Enterprise Strategy Group (ESG) to gain insights on the threat landscape and what your IT peers deem as the top cybersecurity concerns. Bad actors focus their energy on developing sophisticated attacks. In fact, 46% of organizations have been the victim of ransomware in the last year.

    Learn more about their top concerns and how they’re turning to machine learning as a strategic technology to prevent future infections.

    The video was commissioned by Cylance and is being distributed under license from ESG.
  • Endpoint Security: The Final Frontier
    Endpoint Security: The Final Frontier
    Ed Metcalf, Senior Director Product Marketing, Cylance Recorded: Nov 16 2017 46 mins
    Whether it is a new ransomware campaign or stealthy targeted attack, your endpoints are being attacked and are often the last line of defense in your fight against the cybercriminals. In this webinar, you will understand how endpoints are the final frontier for security and how you must be resilient in using the latest prevention and protection technologies.

    Learn how the power of machine learning and artificial intelligence are changing the endpoint protection landscape. Gone are the days of daily signature updates, maxed out performance impact, and the lack of security effectiveness against both known and unknown threats. It is time explore the new world of endpoint security.
  • Protecting Against Fileless Malware
    Protecting Against Fileless Malware
    Chad Skipper, VP Industry Relations & Product Testing & Brian Robison, Sr. Dir., Security Technology Recorded: Sep 21 2017 60 mins
    How do you defend your enterprise against cyberattacks that don’t use disk-based files but, instead, execute their payloads using machine memory? This attack vector, fileless malware, requires an innovative solution that goes beyond signature-based antivirus tools.

    In this webinar, you will learn about the dangers of fileless malware and how CylancePROTECT® uses memory protection and script control to prevent advanced threats from executing on your organization’s endpoints in real time.

    Watch this webinar to:

    •Educate yourself on this attack technique and how it is impacting businesses worldwide
    •Watch a live demo of CylancePROTECT preventing fileless malware attacks
    •Understand how CylancePROTECT uses multiple protection elements to defend endpoints from advanced exploitation and evasion techniques.
  • Lessons from the Equifax Data Breach for Improving Cybersecurity
    Lessons from the Equifax Data Breach for Improving Cybersecurity
    Brian Robison (Cylance), Michael Davis (CounterTack), Stephan Chenette (AttackIQ), Kevin Flynn (Skybox Security) Recorded: Sep 19 2017 54 mins
    Join this interactive Q&A panel to discover the biggest lessons of the recent Equifax breach and how to apply them toward improving your and your organizations cyber security.

    Viewers will learn:
    - The magnitude of the impact of this breach across consumers and industries
    - The true costs of a breach
    - How to discover if your personal information has been exposed and what you can do about it
    - What to expect in terms of cyber threats in the future
    - How can to protect your data and secure your organization
    - Expert recommendations on improving breach protection, detection and response

    - Brian Robison, Sr. Director of Security Technology, Cylance
    - Stephan Chenette, CEO, AttackIQ
    - Michael Davis, CTO, CounterTack
    - Kevin Flynn, Global Director of Products, Skybox Security

Embed in website or blog