Hi [[ session.user.profile.firstName ]]

illusive networks

  • Date
  • Rating
  • Views
  • THE FUTURE OF RANSOMWARE THE FUTURE OF RANSOMWARE Bob Bragdon - VP and Publisher of CSO, Ofer Israeli - Founder, VP of R&D illusive networks Recorded: Aug 11 2016 31 mins
    Advanced Ransomware Threats (ART) have emerged as the newest significant cyber concern. Our expert panel – including CSO’s Bob Bragdon and the founders of illusive networks—will explore what the threat looks like today, where it’s headed and what you need to shore up your network.
  • A JOURNEY THROUGH THE DARK MATTER OF YOUR NETWORK A JOURNEY THROUGH THE DARK MATTER OF YOUR NETWORK Hanan Levin - illusive networks VP Product Recorded: Jun 30 2016 31 mins
    The threat landscape is evolving beyond traditional defense measures at an alarming rate. By 2020, Gartner predicts that 60% of enterprise IT Security budgets will shift towards rapid detection and response approaches. But identifying the weaknesses in your network and detecting the threat before sensitive data is compromised is a challenge. Join Hanan Levin, illusive networks VP of Product for a private tour of the places on your network you've never seen before: the hidden cyber attack paths used by Advanced Attackers, cyber criminals, and malicious insiders. You will learn:
    - How Fortune 500 enterprises used Attacker View to map their network and identify hidden threats they didn't know were there
    - Post-breach remediation strategies and tactics used
  • CYBER WAR: Lessons learned and a framework for defense CYBER WAR: Lessons learned and a framework for defense Major General Brett Williams and Chad Gasaway Recorded: Jun 23 2016 41 mins
    We learn from our mistakes but when it comes to the cyber battlefield, there is no room for error.  Poor planning and poor execution could result in a catastrophic event exposing valuable digital assets to attackers.  As former Director of Operations at U.S. Cyber Command, Major General Brett Williams was responsible for the global operations and defense of DOD networks and knows firsthand how to build a defense framework ​​to counter the most advanced attacks.  The hackers are moving much faster than the defenders and the cost of a breach makes cybersecurity a strategic business issue.  Just because your network has been penetrated, does not mean you have to suffer a breach. Join us as he shares insights and experiences from the front lines, and walk away with an innovative post-penetration framework and strategy.

Embed in website or blog