Hi [[ session.user.profile.firstName ]]

RiskIQ

  • Date
  • Rating
  • Views
  • Who's Minding the Store? Protecting your mobile apps in the app store ecosystem Who's Minding the Store? Protecting your mobile apps in the app store ecosystem Terry Bishop, EMEA Solutions Architect, RiskIQ Recorded: Nov 24 2016 30 mins
    The size, complexity, and dynamic nature of the global app store ecosystem make it increasingly difficult for brands to monitor their mobile presence and protect their customers from fraud. Once published, mobile apps can rapidly proliferate from official stores throughout the app store ecosystem, spreading to new stores and web download locations without the developer’s knowledge or consent and increasing the threat of apps being exploited, attacked or copied.

    In this session we will:

    - Explore the complexities of the worldwide app store ecosystem
    - Examine year over year RiskIQ research on mobile apps owned by or leveraging the brands of top UK organisations.
    - Highlight recent examples of malware, app re-packaging, data leakage and intellectual property violations presented by fraudulent and unauthorized apps
    - Show you how you can regain control of your mobile apps and take a proactive stance against malicious and rogue apps, taking them down before they compromise your organisation or your customers
  • What’s in an email? Your Attacker’s Footprint for Starters What’s in an email? Your Attacker’s Footprint for Starters Brandon Dixon, PassiveTotal Co-founder Recorded: Nov 7 2016 54 mins
    Every day, threat actors send hundreds of thousands of malicious emails across the Internet to the inboxes of their targets. Subjects range from ad campaigns soliciting views of a particular product to sophisticated attacks masked as friendly correspondence between colleagues. For security analysts, these emails offer an immense source of information—particularly infrastructure data.

    RiskIQ’s PassiveTotal harnesses the power of big data analytics to surface the footprint of an attacker, making threat investigations and incident response quicker and more efficient than ever before. In this webinar, Brandon Dixon, creator of PassiveTotal, will break down a malicious email in real time to shed light on its nefarious sender.

    Don't already have a PassiveTotal account? Sign up here for free so you can follow along with the live investigation during the webinar.
  • Turbocharge your cyber investigations, Part 2 Turbocharge your cyber investigations, Part 2 Jeff Lenton, Solutions Architect, RiskIQ Recorded: Nov 3 2016 35 mins
    While their cyber tactics may be continuously changing, bad actors can’t avoid interacting with core components of the internet. These interactions leave a trail that when connected through rigorous threat infrastructure analysis, can reveal the full scale of an attack and provide the information needed to determine the best response. The key to this analysis is access to a variety of global datasets and the ability to correlate and pivot between them in your investigation.

    In this two part series we will look at a range of global datasets and how each can be used to shed additional light on your adversary’s infrastructure. This session will focus on SSL Certs, Host Pairs and Trackers. We will also demonstrate how security analysts can use the free community version of RiskIQ’s PassiveTotal to gain access to and pivot across these global datasets.
  • Subdomain Infringement - The Unseen Threat That’s Running Rampant Subdomain Infringement - The Unseen Threat That’s Running Rampant Beckie Neumann, Product Manager, RiskIQ Recorded: Nov 1 2016 25 mins
    Subdomain infringement degrades consumer trust in your brand and puts your customers at risk of giving up sensitive, potentially damaging information. Unfortunately, the traditional way of monitoring registrations leaves a lot to be desired—most don’t dig deeper than root domains, leaving the millions of fraudulent subdomains in use by threat actors undetected.

    In this webinar, find out how to leverage passive DNS data to go beyond WHOIS lookups and turn domain infringement detection into domain threat detection. Also learn:

    * How free and cheap domain registration and advanced tactics like domain shadowing enable threat actors to attain root domains and subdomains
    * How passive DNS helps threat researchers map their adversary’s infrastructure and make more connections about who is behind a brand infringement attack
    * How RiskIQ’s sophisticated crawling infrastructure and analysis platform gives security teams context around how an infringing domain is being used, and what level of threat it poses to the organization
  • Crucial Components of Digital Risk Monitoring Crucial Components of Digital Risk Monitoring Nick Hayes - Forrester Research, Security and Risk Analyst, Forrester Research - Arian Evans - VP Product Strategy Recorded: Nov 1 2016 59 mins
    RiskIQ Webinar feature Forrester Research

    The network perimeter that organizations have long relied on for protection from cyber-threats has evaporated. Businesses are engaging with their customers, vendors and partners across web, social and mobile channels. Threat actors are following suit, increasing the digital risk that organizations face. According to The Forrester Wave™: Digital Risk Monitoring, Q3 2016 (which cited RiskIQ as a Leader):,”Without comprehensively and persistently monitoring risk in digital channels, companies remain susceptible to a wide variety of brand, cyber, and physical risk events”. Every CISO and security leader must consider implementing a Digital Risk Monitoring strategy, or be at risk due to their expanding attack surface.

    In this one-hour presentation RiskIQ VP of Product Strategy Arian Evans and guest Forrester Research analyst Nick Hayes will cover:

    * Expanding threat landscape via digital—web, social and mobile—channels
    * Requirements for a comprehensive digital risk monitoring (DRM) strategy
    * Necessary security technology elements for DRM program implementation
    Join this live webinar to learn more about this growing digital risk landscape, and how you can help better protect your organization’s most critical assets, its customers, and brand.
  • Risks Facing Financial Services During their digital Transformation Risks Facing Financial Services During their digital Transformation Aarij Khan, Head of Product Marketing, RiskIQ Recorded: Nov 1 2016 42 mins
    Most banks are in some stage of digital transformation initiatives that help them stay relevant in a highly competitive market. In fact, McKinsey & Co. estimates that "digital laggards" could see over a third of their net profit erode, while the leaders could realize a profit upside of 40% or more.

    But as financial institutions charge ahead with their adoption of digital channels for front-end sales, marketing, back-end operations and customer interaction, they must not ignore the dramatic increase in cyber security risk their digital transformation introduces.

    Join RiskIQ to learn about the ways cybercriminals could exploit banks' increased digital presence, and how to manage these enhanced levels of risk while realizing the benefits of your innovation.
  • Turbocharge your Cyber Investigations, Part 1 Turbocharge your Cyber Investigations, Part 1 Jeff Lenton, Solutions Architect, RiskIQ Recorded: Oct 13 2016 32 mins
    While their cyber tactics may be continuously changing, bad actors can’t avoid interacting with core components of the internet. These interactions leave a trail that when connected through rigorous threat infrastructure analysis, can reveal the full scale of an attack and provide the information needed to determine the best response. The key to this analysis is access to a variety of global datasets and the ability to correlate and pivot between them in your investigation.

    In this two part series we will look at a range of global datasets and how each can be used to shed additional light on your adversary’s infrastructure. This session will focus on Passive DNS, Whois and Malware data. We will also demonstrate how security analysts can use the free community version of RiskIQ’s PassiveTotal to gain access to and pivot across these global datasets.