Hi [[ session.user.profile.firstName ]]

Armis Security

  • Date
  • Rating
  • Views
  • NotPetya - 3 Steps to Prepare for the Next Ransomware Attack
    NotPetya - 3 Steps to Prepare for the Next Ransomware Attack Nadir Izrael, CTO & Co-Founder, Armis Recorded: Jul 17 2017 44 mins
    Much of the world was still scrambling to patch and clean up from WannaCry ransomware attack when the (not)Petya attack hit. While (not)Petya relied on Eternal Blue, just as WannaCry did, it had a few new tricks.
    - No Kill Switch – There doesn’t appear to be a kill switch URL, so (not)Petya can’t be shut down simply by purchasing a domain name.
    - Lateral Movement – The new attack includes additional exploits so it can move laterally through the network and infect other devices.
    - New Unmanaged Devices – Reports say the attack hit point of sale devices and ATMs, in addition to the laptops and desktops.

    Join Nadir Izrael, CTO of Armis, and former Captain in the Israel Intelligence 8200 Group, to discuss the 3 steps you should take to prepare for the next ransomware attack. And, why your weakest link now exposures your entire enterprise.

    About the Presenter:
    As co-founder and CTO, Nadir Izrael guides the technology vision behind Armis to protect unmanaged and IoT devices. He co-founded the company in 2015 with its CEO, Yevgeny Dibrov. Prior to Armis, worked at Google as senior software engineer. Before Google, Nadir spent six years in the Israeli army, specifically in unit 8200, where he designed and programmed software projects and systems, served as team leader and did officer’s training attaining the rank of captain.
  • NotPetya Attack - Cybercrime or Cyberwar?
    NotPetya Attack - Cybercrime or Cyberwar? Malcolm Harkins (Cylance), Erika Noerenberg (LogRhythm Labs), Nadir Izrael (Armis), Michael Landewe (Avanan) Recorded: Jul 12 2017 64 mins
    The NotPetya pandemic that started in late June and disrupted the operations across companies, utilities, government agencies across France, Russia, Spain, Ukraine and the United States, happened just weeks after the WannaCry ransomware attack. Was NotPetya a financially motivated ransomware attack or an act of cyberwar?

    Join this interactive Q&A session with industry experts and find out the answers to your Petya/NotPetya questions. The topics up for discussion will include:
    - Difference between cybercrime and cyberwar
    - Industries targeted in the NotPetya attack
    - Short-term and long-term impact of this attack
    - Requirements and recommendations for strengthening cyber defense

    Speakers:
    - Malcolm Harkins, CSO of Cylance
    - Erika Noerenberg, Threat Research Engineer, LogRhythm Labs
    - Nadir Izrael, CTO of Armis

    Moderator:
    - Michael Landewe, Co- Founder of Avanan Cloud Security

Embed in website or blog