Hi [[ session.user.profile.firstName ]]

Threat Hunting Academy

  • Date
  • Rating
  • Views
  • Tracking Hackers - AI cybersecurity for APIs
    Tracking Hackers - AI cybersecurity for APIs Bernard Harguindeguy, CEO, ElasticBeam Recorded: Feb 27 2018 49 mins
    What do oBike, a bicycle rental company, Instagram, and the IRS have in common? Answer -- hackers used APIs to access their customers sensitive information forcing these organizations to announce breaches. Although these API attacks were exposed, most API-based attacks go undetected these days – particularly attacks that used compromised credentials.

    This webinar will discuss API cyberattack examples and the techniques used by hackers to breach APIs. It will also review how AI-based security ​solutions can effectively stop these attacks and provide deep visibility into your API sessions for forensic and compliance reporting. Topics covered in this webinar include:
    - API cyberattack trends
    - Review of recent API attacks
    - How to monitor and protect your API activity
    - How to detect and block API attacks on your data/apps (live demo)
    - How to deliver reports with detailed traffic insight for any API
    - Best practices for securing APIs
  • Threat Hunting Series: Rethinking Persistency
    Threat Hunting Series: Rethinking Persistency Adi Ashkenazy, VP Product for XM Cyber Recorded: Feb 20 2018 41 mins
    In this episode of the Threat Hunting series, Adi Ashkenazy will follow some of the approaches hackers use to counter the methods of defenders trying to remove them from their target networks. Adi Ashkenazy will also discuss the evolution of persistency in cyber-attacks, and focus on modern and predicted trends.

    About the Speaker:
    Adi Ashkenazy is the VP Product for XM Cyber, an innovative cyber security start-up developing a revolutionary breach and attack simulation solution, capable of identifying critical attack paths towards key organizational assets, while providing actionable prioritized remediation. Prior to XM Cyber, Adi served as deputy director of an elite cyber technology department in the prime minister's office in Israel, leading Israel's finest engineers and security professionals through some of the most complex cyber security challenges in the world today.
  • Will Artificial Intelligence Strengthen Your Security Stance?
    Will Artificial Intelligence Strengthen Your Security Stance? Chris Roberts, Acalvio | Chris Morales, Vectra | Vikram Kapoor, Lacework | Willy Leichter, Virsec Recorded: Feb 15 2018 59 mins
    The volume and frequency of cyber-attacks makes it impossible for security analysts to use manual threat analysis to keep up with a rapidly changing threat landscape.

    Innovations in artificial intelligence (AI) now make it possible to automate mundane security operations, and provide security analysts with access to large data sets. The benefits are significant: analyst time is freed-up, and they have access to better information enabling smarter, faster decisions about how to continually improve the security posture of their organization.

    Join this Q&A panel on how AI can help improve your organization's overall security.

    - Chris Roberts, Chief Security Architect, Acalvio
    - Chris Morales, Head of Security Analytics, Vectra
    - Vikram Kapoor, Co-Founder and CTO, Lacework
    - Willy Leichter, Vice President of Marketing, Virsec
  • Addressing The Cyber Skills Gap
    Addressing The Cyber Skills Gap Greg Reber, CEO, AsTech | Bret Fund, CEO, SecureSet | Dan Lohrmann, CSO, Security Mentor Recorded: Feb 7 2018 61 mins
    A maturing information security field and more sophisticated cyber-attack capabilities demands skilled information security professionals who are increasingly scarce. Cybercriminals are increasing in numbers and deepening their skillsets. The ‘good guys’ are struggling to keep pace. Where will these resources and skillsets come from? Organizations need to build sustainable recruiting practices as well as develop and retain the talent they already have to boost the organization’s cyber resilience.

    Businesses must prepare to build information security capabilities across the organization and position the executive team to recognize and retain talent, both those who have come up through the ranks and newer employees who have worked in a digital environment and business roles. Moving forward, there will be a need to be more aggressive about getting the skill sets that the organization needs. While the industry continues to attract the right level of interest, as a whole, the industry must realize that there is a skills gap problem that needs to be resolved.

    - Greg Reber, CEO, AsTech
    - Bret Fund, CEO, SecureSet
    - Dan Lohrmann, CSO, Security Mentor
  • Cyber Threat Predictions & Security for 2018
    Cyber Threat Predictions & Security for 2018 Diana Kelley | Mark Weatherford | Jon Green | David McGuire | Ashton Mozano Recorded: Dec 14 2017 61 mins
    With major breaches exposing the personal information of hundreds of millions of Americans and disruptive ransomware attacks shaking the world in 2017, we'll examine the lessons learned from these events as a guide to shape CISO strategy for 2018.

    This interactive Q&A panel with security industry experts will explore:
    - The biggest threats on the horizon
    - Key vulnerabilities and how to protect against them
    - Measures for breach prevention, detection and response
    - Which areas to focus on in 2018
    - Recommendations for CISOs

    - Diana Kelley, Cybersecurity Field CTO, Microsoft
    - David McGuire, CEO, SpecterOps
    - Ashton Mozano, CTO, Circadence
    - Mark Weatherford, Chief Cybersecurity Strategist, vArmour
    - Jon Green, VP and Chief Technologist for Security at Aruba, a Hewlett Packard Enterprise Company
  • Threat Hunting – What Is It, and Why Should You Do It
    Threat Hunting – What Is It, and Why Should You Do It Dennis Leber & Adrian Kirk, Kentucky Cabinet of Health and Family Services Recorded: Sep 19 2017 21 mins
    Join this interactive webinar to learn more about threat hunting:
    - What is a Threat Hunting Program?
    - What is included in it?
    - The reasons and benefits of why a business should have a threat hunting program.

    - Dennis Leber, CISO at Commonwealth of Kentucky Cabinet of Health and Family Services
    - Adrian Kirk, Information Security and Compliance Analyst - Kentucky Cabinet of Health and Family Services
  • Wear Camouflage While Hunting Threats
    Wear Camouflage While Hunting Threats Lance Cottrell, Chief Scientist at Ntrepid Recorded: Aug 29 2017 49 mins
    Threat hunting has become a major trend but most is focused within the perimeter. Important threats and valuable threat intelligence waits to be found outside your firewall in the wilds of the internet. Join this episode of the Threat Hunting series to learn more about:
    - The particular risks of threat hunting in the wild
    - The importance of camouflage and armor
    - Best practices and techniques for employing digital camouflage and armor.

    About the Speaker:
    Lance Cottrell founded Anonymizer in 1995, which was acquired by Ntrepid (then Abraxas) in 2008. Anonymizer’s technologies form the core of Ntrepid’s Internet misattribution and security products. As Chief Scientist, Lance continues to push the envelope with the new technologies and capabilities required to stay ahead of rapidly evolving threats.

    Lance is a well-known expert on security, privacy, anonymity, misattribution and cryptography. He speaks frequently at conferences and in interviews. Lance is the principle author on multiple Internet anonymity and security technology patents. He started developing Internet anonymity tools in 1992 while pursuing a PhD. in physics, eventually leaving to work on those technologies full time.
  • An ACE Up the Sleeve: Designing Active Directory DACL Backdoors
    An ACE Up the Sleeve: Designing Active Directory DACL Backdoors Will Schroeder, Security Research / SpecterOps and Andy Robbins, Adversary Resilience Lead / SpecterOps Recorded: Aug 15 2017 61 mins
    Active Directory (AD) object discretionary access control lists (DACLs) are an untapped offensive landscape, often overlooked by attackers and defenders alike. The control relationships between AD objects align perfectly with the "attackers think in graphs" philosophy and expose an entire class of previously unseen control edges, dramatically expanding the number of paths to complete domain compromise.

    While DACL misconfigurations can provide numerous paths that facilitate elevation of domain rights, they also present a unique chance to covertly deploy Active Directory persistence. It's often difficult to determine whether a specific AD DACL misconfiguration was set intentionally or implemented by accident. This makes Active Directory DACL backdoors an excellent persistence opportunity: minimal forensic footprint, and maximum plausible deniability.

    This talk will cover Active Directory DACLs in depth, our "misconfiguration taxonomy," and enumeration/analysis with BloodHound's newly released feature set. We will cover the abuse of AD DACL misconfigurations for the purpose of domain rights elevation, including common misconfigurations encountered in the wild. We will then cover methods to design AD DACL backdoors, including ways to evade current detections, and will conclude with defensive mitigation/detection techniques for everything described.
  • Attack and Defense Training: Saving Mr Robot’s WordPress with the Free AppArmor
    Attack and Defense Training: Saving Mr Robot’s WordPress with the Free AppArmor Jay Beale, Co-founder and CTO of InGuardians Recorded: Aug 10 2017 61 mins
    In this webinar Jay Beale, co-founder and CTO of InGuardians, will demonstrate how an attacker gains access on a server running WordPress and then teach you how to break the same attack with a free, open source tool called AppArmor that’s been part of the Linux kernel for years.

    With his black hat on, he’ll show you how to use Kali Linux to attack the WordPress server, where he’ll install a web shell and begin scanning for more machines to compromise.

    Next, Jay will don his white hat and show you how to configure AppArmor to prevent that same attack.

    Come to this BrightTalk session and get a sneak peak at Jay’s Black Hat training course!
  • Hunter Spotlight with Samuel Alonso: Gaining Network Visibility
    Hunter Spotlight with Samuel Alonso: Gaining Network Visibility Samuel Alonso, Senior Cybersecurity Analyst Recorded: Aug 10 2017 28 mins
    In this half-hour interview, Sqrrl sits down with experienced hunter Samuel Alonso for his best advice on threat hunting, focusing on:

    - Gaining network visibility (best tools, data sources, and more)
    - Samuel's experience as a threat hunter and lessons learned
    - Practical tips for both new and experienced hunters

    About the Threat Hunter:
    Samuel is a Senior Cybersecurity Analyst, formerly working at KPMG. He has extensive experience in threat hunting, information security practices, and business development,

Embed in website or blog