Hi [[ session.user.profile.firstName ]]

Armis Security

  • Date
  • Rating
  • Views
  • Eliminate the IoT Security Blind Spot
    Eliminate the IoT Security Blind Spot
    Nadir Izrael, Co-founder and CTO, Armis Recorded: Jun 12 2018 58 mins
    Enterprises face an exploding number of unmanaged and IoT devices, which face with the increasing number of cyber attacks targeting these devices. How should IT security managers respond? Join Armis to discuss:

    • Why these devices are the new, insecure endpoint
    • The new attack vectors out of today’s kill chain
    • Why networks segmentation will fail in the IoT Age
    • 5 critical items needed to secure the enterprise

    Presenter: Nadir Izrael

    Bio: Co-founder and CTO, Nadir Izrael guides the technology vision behind Armis to protect unmanaged and IoT devices. He co-founded the company in 2015 with its CEO, Yevgeny Dibrov. Prior to Armis, Nadir worked at Google as senior software engineer. Before Google, Nadir spent six years in the Israeli army, specifically in unit 8200, where he designed and programmed software projects and systems, served as team leader and did officer’s training, attaining the rank of captain.
  • Eliminate the IoT Security Blind Spot with Armis
    Eliminate the IoT Security Blind Spot with Armis
    Nadir Izrael - CTO Co-Founder Recorded: Oct 24 2017 39 mins
    Our current security architecture is broken. We need a new approach to address the evolving IoT endpoint. Join Armis CTO Nadir Izrael as he discusses:

    -Where current architecture is falling short
    -What next-generation architecture should look like
    -How to address vulnerabilities found in IoT devices/the unmanaged endpoint.

    About Armis:

    Armis eliminates the IoT security blind spot, protecting enterprises from the threat of unmanaged or rogue devices and networks. Customers including Samsung Research America and IDT Corporation trust Armis’ agentless IoT security platform to see and control any device or network. Armis is a privately held company and headquartered in Palo Alto, California.
  • New Attack Vector “BlueBorne” Exposes 5B+ Devices – Learn How It Works
    New Attack Vector “BlueBorne” Exposes 5B+ Devices – Learn How It Works
    Nadir Izrael, CTO, Armis Recorded: Sep 20 2017 59 mins
    As Fortune reported on Tuesday, the new Blueborne attack vector exposed 5B+ devices to hacking, endangering major mobile, desktop, and IoT operating systems, including Android, iOS, Windows, and Linux. Blueborne attacks devices via Bluetooth in a manner never seen before, and spreads through the air (airborne). Users do not need to be on the Internet, take any action, or even pair with another device to be impacted. Blueborne has been called “Bluetooth’s Stagefright moment.”

    Watch this webinar to learn:

    • Understand the 8 zero-day vulnerabilities (4 critical)
    • Which devices are affected
    • How Blueborne can take over a device
    • How BlueBorne can be used for a Man in the Middle Attack
    • What’s involved in protecting your network

    About the Speaker:
    As co-founder and CTO, Nadir Izrael guides the technology vision behind Armis to protect unmanaged and IoT devices. He co-founded the company in 2015 with its CEO, Yevgeny Dibrov. Prior to Armis, worked at Google as senior software engineer. Before Google, Nadir spent six years in the Israeli army, specifically in unit 8200, where he designed and programmed software projects and systems, served as team leader and did officer’s training attaining the rank of captain.
  • NotPetya - 3 Steps to Prepare for the Next Ransomware Attack
    NotPetya - 3 Steps to Prepare for the Next Ransomware Attack
    Nadir Izrael, CTO & Co-Founder, Armis Recorded: Jul 17 2017 44 mins
    Much of the world was still scrambling to patch and clean up from WannaCry ransomware attack when the (not)Petya attack hit. While (not)Petya relied on Eternal Blue, just as WannaCry did, it had a few new tricks.
    - No Kill Switch – There doesn’t appear to be a kill switch URL, so (not)Petya can’t be shut down simply by purchasing a domain name.
    - Lateral Movement – The new attack includes additional exploits so it can move laterally through the network and infect other devices.
    - New Unmanaged Devices – Reports say the attack hit point of sale devices and ATMs, in addition to the laptops and desktops.

    Join Nadir Izrael, CTO of Armis, and former Captain in the Israel Intelligence 8200 Group, to discuss the 3 steps you should take to prepare for the next ransomware attack. And, why your weakest link now exposures your entire enterprise.

    About the Presenter:
    As co-founder and CTO, Nadir Izrael guides the technology vision behind Armis to protect unmanaged and IoT devices. He co-founded the company in 2015 with its CEO, Yevgeny Dibrov. Prior to Armis, worked at Google as senior software engineer. Before Google, Nadir spent six years in the Israeli army, specifically in unit 8200, where he designed and programmed software projects and systems, served as team leader and did officer’s training attaining the rank of captain.
  • NotPetya Attack - Cybercrime or Cyberwar?
    NotPetya Attack - Cybercrime or Cyberwar?
    Malcolm Harkins (Cylance), Erika Noerenberg (LogRhythm Labs), Nadir Izrael (Armis), Michael Landewe (Avanan) Recorded: Jul 12 2017 64 mins
    The NotPetya pandemic that started in late June and disrupted the operations across companies, utilities, government agencies across France, Russia, Spain, Ukraine and the United States, happened just weeks after the WannaCry ransomware attack. Was NotPetya a financially motivated ransomware attack or an act of cyberwar?

    Join this interactive Q&A session with industry experts and find out the answers to your Petya/NotPetya questions. The topics up for discussion will include:
    - Difference between cybercrime and cyberwar
    - Industries targeted in the NotPetya attack
    - Short-term and long-term impact of this attack
    - Requirements and recommendations for strengthening cyber defense

    Speakers:
    - Malcolm Harkins, CSO of Cylance
    - Erika Noerenberg, Threat Research Engineer, LogRhythm Labs
    - Nadir Izrael, CTO of Armis

    Moderator:
    - Michael Landewe, Co- Founder of Avanan Cloud Security

Embed in website or blog