Hi [[ session.user.profile.firstName ]]


  • Date
  • Rating
  • Views
  • Decoding the Matrix: Deception-Borne Threat Intelligence
    Decoding the Matrix: Deception-Borne Threat Intelligence
    John Bradshaw, Sr. Director, Solutions Engineering at Acalvio Technologies Recorded: Oct 25 2018 44 mins
    Deception-based solutions can provide a wealth of information about how adversaries behave as they attempt to complete their mission. Depending on the level of engagement organizations desire to setup in their deception solution, information gleaned can include basic network connection information or every keystroke, command and action taken when a system is accessed. Understanding where in the attack life-cycle your deception information is coming from is critical to knowing how to utilize that information to strengthen your SOC / IR Operational Workflows. This webinar will discuss the types of information that can be gathered by Deception Solutions based on different levels of engagement and how that information can be used in the most effective manner with your Threat Intelligence and Security Analytics platforms.

    About the Speaker:

    John Bradshaw, Sr. Director, Solutions Engineering at Acalvio Technologies, has more than 25 years of experience in the Cyber Security industry focusing on advanced, targeted threats. He held senior leadership roles at Mandiant, ArcSight, Internet Security Systems, Lastline, and UUNET.
  • TAG-Cyber's Ed Amoroso Interviews Acalvio
    TAG-Cyber's Ed Amoroso Interviews Acalvio
    Ed Amoroso and John Bradshaw Recorded: Jul 14 2018 22 mins
    TAG-Cyber's Ed Amoroso Interviews Acalvio's John Bradshaw about advanced threats, deception and more.
  • Three Minutes Until the Apocalypse
    Three Minutes Until the Apocalypse
    John Bradshaw, Director, Solutions Engineering, Acalvio Recorded: Mar 20 2018 47 mins
    Three minutes. In general, front-line security operations analysts have three minutes to evaluate an alert on their front pane of glass and determine if it warrants further investigation or can be dismissed as "not impactful to the organization". Your analysts must be right every single time in order to prevent a breach that could cost millions of dollars, the adversary - they only need to be right one time.

    This session will illustrate:

    - How SOC / IR teams can utilize high-fidelity alerts such as those generated by Deception-based solutions.
    - Power of correlation and data analytics to reduce the time it takes to answer basic triage questions on an alert.
    - How to develop actionable visualizations that improve the hunt for adversaries in your network.
  • Will Artificial Intelligence Strengthen Your Security Stance?
    Will Artificial Intelligence Strengthen Your Security Stance?
    Chris Roberts, Acalvio | Chris Morales, Vectra | Vikram Kapoor, Lacework | Willy Leichter, Virsec Recorded: Feb 15 2018 59 mins
    The volume and frequency of cyber-attacks makes it impossible for security analysts to use manual threat analysis to keep up with a rapidly changing threat landscape.

    Innovations in artificial intelligence (AI) now make it possible to automate mundane security operations, and provide security analysts with access to large data sets. The benefits are significant: analyst time is freed-up, and they have access to better information enabling smarter, faster decisions about how to continually improve the security posture of their organization.

    Join this Q&A panel on how AI can help improve your organization's overall security.

    - Chris Roberts, Chief Security Architect, Acalvio
    - Chris Morales, Head of Security Analytics, Vectra
    - Vikram Kapoor, Co-Founder and CTO, Lacework
    - Willy Leichter, Vice President of Marketing, Virsec
  • Fusion of Deception and AI for Active Defense
    Fusion of Deception and AI for Active Defense
    Satnam Singh, PhD, Chief Data Scientist at Acalvio Recorded: Jan 17 2018 44 mins
    Recent cyber attacks and data breaches clearly show that traditional perimeter-based information security tools are ineffective against ransomware attacks, insider attacks, multi-stage attacks, and APTs.

    Cyber criminals have crafted tools and devised techniques that enable them to evade detection by traditional security tools. Also, even if real alerts are triggered, they can either get lost among a large number of false alerts or lost in a deluge of alerts, resulting in very low signal/noise ratio.

    Deception provides an alternative tool to traditional tools with nearly 0% false positive rate to detect, engage, trap and remediate inside-network attacks. Furthermore, by fusing deception with AI, one does not need to boil the ocean to detect anomalies in raw data. Instead anomalies are surfaced itself when an attacker bumps into the deceptions. Using AI, deception alerts are correlated with other data sources to provide actionable insights about the adversary profile, lateral movements and attack tactics. In this talk, we share our work on the fusion of deception and AI for active defense.
  • Detecting Attackers Within Your Networks Using Autonomous Deception
    Detecting Attackers Within Your Networks Using Autonomous Deception
    John Bradshaw, Sr. Director, Solutions Engineering at Acalvio Technologies and Rick Moy, CMO, Acalvio Technologies Recorded: Jan 11 2018 60 mins
    This session will discuss the ongoing problem of identifying attackers who have successfully evaded prevention technologies such as firewalls, IPS and antivirus. It will focus on deception technology and its practical approaches to quickly detecting attackers already inside your network. Special attention will be given to working with SIEMs to validate alerts, as well as incident response and forensic procedures.
  • Agentless Defense Against Ransomware
    Agentless Defense Against Ransomware
    Raj Gopalakrishna, Acalvio and Vijay Chuahan, Splunk Recorded: Aug 22 2017 56 mins
    Agentless Defense Against Ransomware with Splunk and Acalvio
  • Power To The People - Knowledge Is Power
    Power To The People - Knowledge Is Power
    Debra Farber, ITSPmagazine | Chris Roberts, Acalvio | Dr. Christopher Pierson, Viewpost | Arun Vishwanath, SUNY Buffalo Recorded: Jul 26 2017 50 mins
    - Broadcast LIVE from Las Vegas during Black Hat 2017 -
    As a society, we continue to focus on the capabilities that new technological products and services bring to bear, leaving the security - or rather, the safety - conversation for a later date and time… if at all.

    Why is this? Perhaps it’s because we don’t care. Or, perhaps it’s because we don’t understand how things work. Or, maybe it’s because we don’t know all the technical mumbo jumbo. Or, it could just be that we expect “someone else” to take care of it for us. For example, every car has a seat belt, right? We don’t have to ask for the car dealer to add seat belts for us and there really aren’t different types of seat belts available in the commercial car arena. Cars just come with seat belts - period. We expect them to be there - even if some people choose to not wear them.

    Regardless of the reason(s) behind the lack of conversation surrounding cybersecurity, we should all be able to agree on one simple fact: we use these new gadgets and services completely unfettered - with little to no regard to the risks we face for our privacy and even our safety.

    Attend this session to gain the initial knowledge necessary by:
    - Learning to ask is this thing secure?
    - Understanding how or why it is or isn’t safe to use.
    - Identifying your role in your own cyber safety and that of those around you.

    It’s time to open our eyes and become aware of our surroundings. Join us to become aware.

    - Debra Farber, Host of The Privacy Pact, ITSPmagazine

    - Chris Roberts, Chief Security Architect, Acalvio Technologies
    - Dr. Christopher Pierson, CSO and General Counsel, Viewpost
    - Arun Vishwanath, Associate Professor at SUNY Buffalo & Black Hat Presenter
  • Teaching Computers to Lie to Defend Themselves
    Teaching Computers to Lie to Defend Themselves
    Professor Mohammed Almeshekah Recorded: Jul 19 2017 54 mins
    This presentation will cover some Practical Applications of Deception and use cases with examples from professor Mohammed Almeshekah, PhD from Purdue and MSc from RHUL. He is currently an assistant professor at KSU and actively consulting. He has worked with Google's Chrome security team, Firefox, and published dozens of papers and chapters in security, as well as built a number of tools.
  • NotPetya: Wiper or Ransomware & How to Protect Yourself
    NotPetya: Wiper or Ransomware & How to Protect Yourself
    Chris Roberts (Acalvio), John Bambenek (Fidelis), Jay Beale (Inguardians), Vince in the Bay Recorded: Jul 7 2017 60 mins
    Join this interactive Q&A session and learn the facts about the recent NotPetya attack on the Ukraine and the collateral damage it caused by crippling large businesses and organizations worldwide.

    Topics that will be discussed during this live Q&A panel will include:
    - How is NotPetya different from Petya and Wannacry?
    - Timeline of the attack
    - Impact and aftermath
    - What's next? How can companies better protect their data against similar attacks in the future?

    - Vincent Tocce of the Vince in the Bay Podcast

    - Chris Roberts, Chief Security Architect at Acalvio
    - Jay Beale, COO & CTO of Inguardians
    - John Bambenek, Threat Systems Manager at Fidelis Cybersecurity

Embed in website or blog