Hi [[ session.user.profile.firstName ]]

Pwnie Express

  • Date
  • Rating
  • Views
  • Securing Critical Systems in the Age of IoT
    Securing Critical Systems in the Age of IoT Aaron Turner, IANS IoT Research Faculty & Dimitri Vlachos, VP Marketing, Pwnie Express Recorded: Jun 21 2017 48 mins
    Smart stadiums, connected healthcare, personalized retail experiences are just a few industries where the Internet of Things (IoT) is fundamentally changing the boundaries of cyber and physical security. Once separate, isolated business critical systems are now connected. Medical devices monitoring patient health during operations sit side by side with guest wifi networks. HVAC and coach communication systems run in the same environment as the interactive fan experience, all critical to today’s stadium experience. Retail point of sale (POS) systems are connected to inventory management robots in grocery stores.

    Join this webinar and learn more about:

    - How security programs must adapt to an IoT connected world
    - Why isolation is no longer a practical solution for protecting critical systems
    - Cybersecurity risks stemming from the IoT

    This talk will explore and discuss how security programs must adapt to an IoT connected world where isolation is no longer a practical solution for protecting critical systems and their customers. As the IoT is integrated into nearly every aspect of a modern business, cyber-related risks elevate from a primary focus on data, to that of physical facilities integrity and business availability.
  • ISSA Breach Report Analysis Panel
    ISSA Breach Report Analysis Panel Dr. Larry Ponemon, Bhavesh Chauhan, and Yolonda Smith Recorded: Jun 12 2017 118 mins
    Are we dealing with ransomware attacks the way we should?

    This session will review:
    - The latest breach reports
    - Insight into current trends
    - IoT based incidents and breaches
    - Evaluate potential solutions

    Speakers:

    Dr. Larry Ponemon - Dr. Larry Ponemon is Chairman and Founder of Ponemon Institute. Because of his expertise in information security and data privacy, he has served on the Advisory Committee for Online Access & Security for the United States Federal Trade Commission and the Data Privacy and Integrity Advisory Committee for the DHS.

    Bhavesh Chauhan - Principal Client Partner - Security Evangelist within Verizon CTO organization. Previously lead the Security Engineering and Professional services for the North East Region of Americas, which includes Enterprise, Government and Education customers for Verizon. Bhavesh has over 15 plus years in Cyber Security and Business Continuity Solutions.

    Yolonda Smith - Director of Product Management - Pwnie Express, is responsible for the development and launch of solutions, features and capabilities which provide security professionals with the visibility they need to identify, characterize and neutralize threats from the wired and wireless devices in their environments.
  • Protect Your Network From Employee Owned Devices
    Protect Your Network From Employee Owned Devices Colby, Lead Information Security Analyst & Security Architect Recorded: Jun 12 2017 52 mins
    Colby, Lead Information Security Analyst & Security Architect, is responsible for all things security at a leading energy company. Join this webinar to learn how Colby uses Pwnie Express to provide the open, BYOD IT environment his business demands, while meeting the strict compliance regulations of the energy sector.

    Colby will outline how he uses Pwnie’s security platform to detect and assess all devices threats - wired, wireless, bluetooth and cellular - across all sites. With enterprise-wide visibility, and integrated vulnerability assessment, Colby is able to enforce network access and usage policies for all employee and company owned devices, across all sites. He will also highlight how he uses Pwnie sensors to run built-in open source tools, like OpenVas, and 3rd party security tools throughout his enterprise.
  • Wireless Networks & Devices - the Glaring Weak Link in Security
    Wireless Networks & Devices - the Glaring Weak Link in Security Larry Pesce Recorded: Jun 12 2017 57 mins
    Wireless is the defacto standard for network access today. With the explosion of BYOD and IoT, there is no question that in 2017 wireless security is going to be more important than ever. Join us for exciting webinar with Wireless Security Expert Larry Pesce as he walks through just how easy it is to gain access to a company's network, systems and data via wireless.

    What Larry will cover:

    - How to address the most common wireless implementation failures that leave organizations exposed and vulnerable

    - Real life case studies of successful wireless penetrations tests from the Fortune 500 including companies in Healthcare, Financial Services and Retail.

    - Why understanding what devices are in your environment, both on and around your network, is critical for incident response

    - How easy it is to get around NAC and WIPS/WIDS when doing wireless or wired penetration testing


    Larry Pesce:

    Larry Pesce is the Director of Research at InGuardians leading up research efforts, concentrating especially on IoT. His history with hardware hacking began with the family TV when he was a kid, rebuilding it after it caught on fire. Both times.

    His core specialties include hardware and wireless hacking, architectural review, and traditional pentesting, often in the financial, energy and healthcare industries.

    Larry holds GAWN, GCISP, GCIH, GCFA, and ITIL certifications, and has been a certified instructor with SANS for 5 years, where he trains the industry in advanced wireless and Industrial Control Systems (ICS) hacking.

    He’s also the co-author of multiple papers and books, including Linksys WRT54G Ultimate Hacking, Using Wireshark and Ethereal, and How to Cheat at Configuring Open Source Security Tools, and the technical editor of Wireless Reconnaissance for Penetration Testing and The Blue Team Handbook: Incident Response Edition. He also regularly gives talks at DEF CON, ShmooCon, DerbyCon, and various BSides.
  • POS Systems Are The Weakest Link In PCI Security and What To Do About I
    POS Systems Are The Weakest Link In PCI Security and What To Do About I Jeff Man, Information Security Expert Recorded: Jun 5 2017 54 mins
    How mobile and distributed POS systems are making PCI security harder than ever.

    Reports of data breaches against merchants targeting Point of Sale (POS) systems at retail locations has become a regular occurrence for the past several years, and there seems to be no slowing down.

    The growing popularity of alternative payment methods using various mobile applications and mobile POS solutions are also intended to reduce data theft, but does using these payment methods introduce other avenues of potential compromise?


    What We're Going to Cover

    - How do I maintain PCI security while adopting new payment systems
    - How do you achieve this with minimal IT staff and on premise head count
    - Why being PCI COMPLIANT is not enough anymore. You need to be PCI SECURE and we'll show you how

    About Jeff Man:

    Jeff Man is a respected Information Security expert, adviser, and evangelist. He has over 33 years of experience working in all aspects of computer, network, and information security, including risk management, vulnerability analysis, compliance assessment, forensic analysis and penetration testing.

    Earlier in his career, Jeff held security research, management and product development roles with NSA, the DoD and private-sector enterprises. Jeff served as a QSA for nearly 10 years, first with TrustWave, then with VeriSign and finally AT&T Consulting. In this role he has provided PCI consulting and advisory services to many of the nation's best known brands.
  • You Thought Going to High School Was Tough? Try Running Cyber Security For One
    You Thought Going to High School Was Tough? Try Running Cyber Security For One Neal Richardson - CISSP, GCIH, GCIA, GSEC Director of Technology and Emergency Management Monadnock Regional School District Recorded: Jun 5 2017 55 mins
    High school isn't what it was 30 years ago when "The Breakfast Club" was released. Today, technology permeates every aspect of a school. Homework is assigned and submitted online, kids text and email before they actually talk to each other. Teachers have their own computers where tests, grades and records are stored. Protecting student data and school information is a serious endeavor, as challenging as any enterprise environment

    Join our webinar to learn how Neal Richardson, Director of Technology and Emergency Management at Monadnock Regional School District, secures and protects the Monadnock Regional School District with Pwnie Express.

    You will learn how Neal:

    - Secures the 1,700+ Chromebooks that are assigned to each student for their entire 4 years of high school
    - Monitors and protects both wired and wireless networks from unauthorized devices and threats
    - Performs continuous, passive and active vulnerability assessments of all his devices
    - Provides students with network access while protecting sensitive information - grades, PHI, PII and IEP (Individual Education Program) data
    - Leverages Pwnie Express as his go to security solution, first, before turning to IDS and SIEM
  • Are You Serious? Now I Have to Worry About BYOD and IoT Threats?
    Are You Serious? Now I Have to Worry About BYOD and IoT Threats? John Pescatore, Director of emerging security trends at SANS & Paul Paget, CEO of Pwnie Express Recorded: Jun 1 2017 60 mins
    We know it sucks, but BYOD and IoT are changing the way employees access your company's data. Next year more than 50% of the devices connecting to enterprise networks will be owned by employees. Within 3 years, IoT devices will have a significant presence in the enterprise. So why should you care about all these new devices showing up in your office? They carry all your company's critical data, and none of the security tools you have today can even see them. The security implications of this shift are huge, and already being felt.

    In this webinar John Pescatore will examine how to apply the CIS Critical Controls in an BYOD and IoT world. John, together with Pwnie Express CEO Paul Paget, will explore how to gain visibility and control over all wired, wireless, bluetooth and cellular network devices in and around an enterprise.


    Speaker Bios:

    John Pescatore joined SANS as director of emerging security trends in January 2013. He has 35 years' experience in computer, network and information security.

    Paul Paget brings more than 30 years of leadership experience in the technology and information security markets to his role as CEO of Pwnie Express.
  • Why You Need to Take Another Look at Network Security in 2017
    Why You Need to Take Another Look at Network Security in 2017 Jeff Man, Information Security expert Recorded: May 1 2017 53 mins
    After watching you'll walk away knowing:

    - How network security is evolving in response to BYOD and IoT
    - What companies are doing today to prevent their networks and devices from being hacked
    - What you can do after this webinar to protect your networks from hackers in 2017


    About Jeff Man:

    Jeff is a respected Information Security expert, adviser, and evangelist. He has over 33 years of experience working in all aspects of computer, network, and information security, including risk management, vulnerability analysis, compliance assessment, forensic analysis and penetration testing.

    Earlier in his career, Jeff held security research, management and product development roles with NSA, the DoD and private-sector enterprises. Jeff served as a QSA for nearly 10 years, first with TrustWave, then with VeriSign and finally AT&T Consulting. In this role he has provided PCI consulting and advisory services to many of the nation's best known brands.
  • Protecting Patient Data in a Sea of Connected Medical Devices
    Protecting Patient Data in a Sea of Connected Medical Devices Shawn Campbell, Ciena’s Chief Information Security Officer Recorded: May 1 2017 50 mins
    How Ciena Healthcare Protects Patient Data While Enhancing Care with Connected Devices

    In this webcast, Shawn Campbell, Ciena’s Chief Information Security Officer, shows how Ciena is able to improve patient care while managing the security and compliance risks introduced by connected medical devices.

    How were Shawn and his security team able to do this? By focusing on complete vision and awareness of all connected devices on Ciena’s network.

    You will learn how Shawn and Ciena:

    - Perform continuous network asset discovery for all wired, wireless and Bluetooth medical devices in a highly distributed environment
    - Monitor all wired and wireless networks and devices across their 80+ sites
    - Ensure mission-critical devices are not connecting to insecure or untrusted networks and devices
    - Meet HIPAA compliance regulations
    - Achieve all of this with a two-person security staff
  • How to Prevent an IT Security Epidemic for the Healthcare Industry
    How to Prevent an IT Security Epidemic for the Healthcare Industry Tony Sager, Director of SANS Innovation & Aaron Turner, IoT security advisor at Pwnie Express Recorded: Apr 13 2017 56 mins
    In this webcast, Tony Sager, Director of SANS Innovation along with IoT security advisor at Pwnie Express, Aaron Turner, discuss the state of IoT security in healthcare and provide a framework for adapting IT security programs to address emerging healthcare risks and threats.

    The healthcare industry is being transformed by the IoT. Patient monitoring, drug administration and payment processing are just a few examples of how connected devices are revolutionizing the delivery of healthcare.

    In this webcast, you will learn about:

    - The different IT security challenges connected medical devices pose
    - Ways to combat risks and threats presented by these devices
    - A framework for adapting IT security programs
    - ...and much more

Embed in website or blog