Hi [[ session.user.profile.firstName ]]

Hold Security

  • Date
  • Rating
  • Views
  • Facts and Myths about Stolen Credentials
    Facts and Myths about Stolen Credentials
    Alex Holden, CISO, Hold Security Recorded: Feb 19 2019 62 mins
    The simplest way to compromise systems is not by hacking but through use of previously stolen information like credentials that would let the bad guys walk in through the front door and take everything.
    Therefore, stolen credentials have a high demand on the Dark Web and we are constantly barraged by news about massive credentials thefts.
    You should be protecting your users from losing their credentials and subsequent abuse. However, you should also protect them against misinformation about "new" credentials cache discoveries.

    After being credited with the largest legitimate stolen credentials discoveries, I feel like one of the world's foremost experts to provide you with insights about critical thefts.
  • Cybersecurity of Tomorrow
    Cybersecurity of Tomorrow
    Alex Holden, CISO, Hold Security Recorded: Jan 15 2019 62 mins
    Learn what kind of challenges the next generations of technology will bring to cybersecurity and what kind of safeguards we are building. From our history of technologies becoming obsolete, to the rise and fall of hacker techniques; we can derive our lessons and not only fantasize about our future but predict it based on a solid track record from the past.
  • Threat Landscape Forecast of 2019
    Threat Landscape Forecast of 2019
    Alex Holden, CISO, Hold Security Recorded: Dec 12 2018 58 mins
    With 2018 almost behind us, let’s examine what advances did hackers make recently, and what is in store for us in 2019.

    Join this interactive webinar to learn more about trends in:
    - Ransomware
    - Phishing
    - 0-day Exploitation
    - DDoS, and others.

    Also, practical advice about building defenses, policies, and team work to meet the 2019 challenges and beyond.
  • Detecting a Breach – Dark Web Perspective
    Detecting a Breach – Dark Web Perspective
    Alex Holden, CISO of Hold Security Recorded: Sep 17 2018 61 mins
    We try to fortify our perimeter against the hackers. The truth is that some of them get through, and in most dire cases, they take your data with them to the Dark Web. We will discuss detection of the breaches from the Dark Web perspective. What hackers do with your data, and how to tune your tools to detect your breached data outside of your perimeter.
  • HealthCare Data – Hacker Magnet
    HealthCare Data – Hacker Magnet
    Alex Holden, CISO of Hold Security Recorded: Aug 15 2018 62 mins
    What do hackers want to do with your medical data? These are practical examples from the Dark Web of real HealthCare data abuse. What is important to the bad guys, what is not? Learn about the hackers’ perspective and how to defend the data against abuses.
  • Breach Detection and Response Handbook
    Breach Detection and Response Handbook
    Alex Holden, CISO of Hold Security Recorded: Jun 6 2018 61 mins
    With GDPR at our doorstep, getting breached not only carries losses due to hackers but the potential of penalties from the regulators and government. What is the best advice on how to deal with breaches, besides not getting breached? Let’s discuss the basics to show a measured standard for detecting malicious events, classifying them, and responding with at most efficiency.
  • Data Breach Price Tag
    Data Breach Price Tag
    Alex Holden, CISO of Hold Security Recorded: Apr 25 2018 63 mins
    Most breaches cannot be simply mitigated with technology or cyber insurance. Breaches have short-term and long-term price tags that come with loss of reputation with customers and stakeholders. We will discuss the true costs of breaches and what you can do to minimize the impact they cause.

    About the Presenter:
    Alex Holden is the founder and CISO of Hold Security, LLC. Under his leadership, Hold Security played a pivotal role in information security and threat intelligence, becoming one of the most recognizable names in its field. Holden is credited with the discovery of many high-profile breaches including Adobe Systems, initial vendor breach that led to the discovery of the JPMorgan Chase breach, the independent discovery of the Target breach and the Veraz (Equifax Argentina) breach. In 2014, he discovered the largest breach of data to-date. Dubbed the CyberVor breach, he recovered a cache of over 1.2 billion stolen credentials gathered from over 420,000 exploited web sites. Considered one of the leading security experts, he regularly voices his professional opinion in mainstream media.
  • Don't Panic - Practical Guide to Dealing with Security Incidents
    Don't Panic - Practical Guide to Dealing with Security Incidents
    Alex Holden, CISO of Hold Security Recorded: Mar 22 2018 63 mins
    If your organization has never been breached, think again, it probably happened and more than once. If you have dealt with a data breach before, you know how stressful and painful this can be. But let’s take a step back and examine:
    - The basics for the incident response
    - How to deal with the worst that the hackers can throw at you and still re-emerge successfully.
  • War of the Machines
    War of the Machines
    Alex Holden, CISO of Hold Security Recorded: Jan 17 2018 64 mins
    Understanding the hacker advances in AI is critical to stop the new generation of cyber threats. At the same time, what techniques can we teach our AI's to examine and prevent new exploitations.

    About the Presenter:
    Alex Holden is the founder and CISO of Hold Security, LLC. Under his leadership, Hold Security played a pivotal role in information security and threat intelligence, becoming one of the most recognizable names in its field. Holden is credited with the discovery of many high-profile breaches including Adobe Systems, initial vendor breach that led to the discovery of the JPMorgan Chase breach, the independent discovery of the Target breach and the Veraz (Equifax Argentina) breach. In 2014, he discovered the largest breach of data to-date. Dubbed the CyberVor breach, he recovered a cache of over 1.2 billion stolen credentials gathered from over 420,000 exploited web sites.
    Considered one of the leading security experts, he regularly voices his professional opinion in mainstream media.
  • Uber Data Breach: Impact and Lessons for CISO's
    Uber Data Breach: Impact and Lessons for CISO's
    Alex Holden (Hold Security) | Jesper Johansson (Yubico) | Nathan Wenzler (AsTech) Recorded: Nov 30 2017 60 mins
    Uber recently disclosed a massive data breach in which the personal information of 57 million Uber customers and drivers were stolen by hackers in October 2016. What are some of the lessons we can draw from this latest breach?

    Join this interactive panel of experts as they review:
    - What is the impact of this breach?
    - What should Uber users do in response to this breach?
    - What are the most common reasons for breaches?
    - What should organizations be doing to better tighten their security?

    Speakers:
    - Alex Holden, CISO of Hold Security
    - Jesper Johansson, Chief Security Architect, Yubico
    - Nathan Wenzler, Chief Security Strategist, AsTech Consulting

Embed in website or blog