Hi [[ session.user.profile.firstName ]]

Skybox Security

  • Date
  • Rating
  • Views
  • Unified IT-OT Security Management: Strengthening Critical Infrastructure Defense
    Unified IT-OT Security Management: Strengthening Critical Infrastructure Defense Terry Olaes, Sales Engineering Lead, Central US Skybox Security Recorded: Aug 16 2018 57 mins
    Critical infrastructure — from energy production to manufacturing to public utilities — is becoming a more prevalent attack vector for nation-state threat actors as well as the common cybercriminal. These attackers are frequently exploiting the interconnectedness of IT and operational technology (OT) networks, finding their foothold in the disconnect between their security management.

    In response, many organizations are looking to unify and align their IT-OT security programs to better understand and tackle cyber risks in both environments. In this session, Skybox Security SE Terry Olaes will cover what challenges to expect in this an endeavor, and how to use comprehensive visibility and contextual intelligence to overcome them.

    In this webinar, you will learn:
    - What are the inherent risks to OT security and how the continued integration with IT impact risk in both environments
    - What are the key concerns for IT and OT security teams and how can they can align to improve security throughout the organization
    - Which elements and capabilities needed to gain seamless visibility of on-prem, cloud and OT networks
    - How to use modeling and analytics to put risk in the context of your attack surface and effectively prioritize response
  • Fighting Blind: Why Vulnerability Management Demands More Than Scan-and-Patch
    Fighting Blind: Why Vulnerability Management Demands More Than Scan-and-Patch Alastair Williams, EMEA Technical Director, Skybox Security Recorded: Jul 18 2018 49 mins
    Too many vulnerability management programs operate on incomplete or out-of-date scan data. What’s more, this data is rarely if ever correlated to their host’s place in the network, meaning efforts can be wasted on remediating already protected vulnerabilities while ignoring those left exposed to attack.

    To have a real impact on lowering your risk of cyberattack, organizations need to centralize and analyze data from their entire attack surface to narrow focus on the vulnerabilities most likely to be used in a cyberattack.

    In this webinar, you will learn:
    -What scanners miss in discovery, prioritization, remediation and oversight processes and how to fill in the gaps
    -How the intersection of your assets, networks, business and the threat landscape impact vulnerability risk
    -Why context-based approaches target remediation at your riskiest vulnerabilities and help identify patching alternatives
    -Insights from Skybox’s 2018 Vulnerability and Threat Trends Report mid-year update

    Join Alastair Williams, EMEA technical director for Skybox Security, as he explores how to get more value out of your data, visualize your attack surface and centralize vulnerability management to systematically reduce your risk of cyberattack.
  • Life After May 25: Sustainable GDPR Compliance With Visibility and Automation
    Life After May 25: Sustainable GDPR Compliance With Visibility and Automation Peter Hughes, Technical Director, Sales, Skybox Security Recorded: May 24 2018 46 mins
    Deadline day for the European Union’s General Data Protection Regulation (GDPR) has been looming large for security programs around the world. But is your organization ready to efficiently and effectively maintain compliance beyond May 25?

    Join Skybox Security for the BrightTALK webinar on simplifying compliance management with comprehensive attack surface visibility and automation.

    In this webinar, you’ll learn:
    • How network modeling provides fundamental visibility to understand what data is at risk and what resources you have to protect it
    • Which automated processes will have the greatest benefit on reducing an organization’s data security risk
    • How combining visibility and automation can systematically tighten access and improve security process efficiency and impact
    • The benefits of visibility and automation in compliance-related use cases such as firewall auditing, change management, rule life cycle management, vulnerability management and more
  • More, More, More: Targeting Risk With Context-Aware Vulnerability Management
    More, More, More: Targeting Risk With Context-Aware Vulnerability Management Sean Pike, program vice president of security products, IDC Recorded: May 23 2018 33 mins
    Vulnerability management is about more than scanning, severity levels and patching. To have a real impact on lowering your risk of cyberattack, you need to centralize and analyze data from your entire attack surface. This type of approach means using more data sources in vulnerability discovery, more context in prioritization, more options in remediation and more accountability in oversight..

    In this webinar you will learn:

    What data sources are needed for accurate, comprehensive vulnerability data on demand

    Why relying on scanners alone leaves blind spots in discovery, prioritization, remediation and oversight processes

    How to contextualize vulnerability data from asset, network, business and threat perspectives

    Why context-based approaches target remediation at your riskiest vulnerabilities

    How to use network context to find patching alternatives

    Join Sean Pike, program vice president of security products at IDC, and Skybox Security’s Global Director of Technical Product Marketing Sean Keef in a webinar that explores how to get more value out of your data and take vulnerability management from scan-and-patch to a systematic, risk-fighting program.
  • Using Queryable Infrastructure To Understand Vulnerability Risk
    Using Queryable Infrastructure To Understand Vulnerability Risk Josh Zelonis, senior analyst, Forrester Recorded: Apr 25 2018 38 mins
    Vulnerability scan data can only provide insight into the existence of vulnerabilities in your infrastructure. To prioritize remediation efforts, it’s essential to have additional information about the impacted assets and the environment in which they exist. Building “queryable infrastructure” allows you to have a real-time snapshot of which vulnerable assets are exposed or are adequately protected by compensating controls. The addition of threat intelligence feeds further helps to narrow focus, as knowing how a vulnerability can be exploited will reveal which systems are most likely to be attacked.

    In this webinar you will learn:

    What blind spots can be left by scanning and how to fill in the holes

    Why it’s important for vulnerability management solutions to be vendor agnostic and able to merge and centralize data

    How to use queryable infrastructures in vulnerability management processes

    How automation simplifies the maintenance of a queryable infrastructure and risk-based vulnerability analysis

    Join Skybox Security Global Director of Technical Product Marketing Sean Keef and featured speaker Josh Zelonis, Forrester senior analyst, in a webinar that considers why “queryable infrastructure” is crucial to effective, informed vulnerability management.
  • Managing Security In Hybrid IT-OT Environments
    Managing Security In Hybrid IT-OT Environments Peter Hughes, Technical Director, Skybox Security Recorded: Mar 28 2018 40 mins
    The cyberthreat to critical infrastructure — from utilities to energy production, transportation, manufacturing and more — is very real. Operational technology (OT) is becoming a more prevalent attack vector for nation–state threat actors as well as the common cybercriminal. And attackers of all sorts are frequently exploiting the interconnectedness of IT and OT networks.

    In this session, we will cover:

    The evolution of OT security challenges and the major threats looking to exploit them

    The inherent characteristics of OT networks that complicate incorporating them under traditional IT security programs

    How OT connectivity with IT affects risks to both networks with real–world examples of successful cyberattacks on connected environments

    The security management use cases supported by comprehensive visibility and business benefits
  • Vulnerability and Threat Trends 2018
    Vulnerability and Threat Trends 2018 Marina Kidron, Senior Security Analyst and Group Leader of Skybox Research Lab Recorded: Feb 28 2018 34 mins
    What Happened in 2017? Your Job Got Harder
    Cyber defenders are facing a better outfitted landscape than ever before. According to findings of the Vulnerability and Threat Trends Report 2018 — which examines vulnerabilities, exploits and threat in play — in 2017:

    - The amount of newly published CVEs doubled, rising to 14,000
    - The monthly average of new sample exploit code rose 60%
    - New vulnerabilities impacting operational technology grew by 120%

    Register for this on-demand webinar to examine what’s behind these and other trends, including the state of the exploit kit industry, the top malware to follow and more.
  • Complying with the General Data Protection Regulation
    Complying with the General Data Protection Regulation Benjamin Wright, Sr. Instructor SANS Institute Recorded: Nov 14 2017 63 mins
    The General Data Protection Regulation or GDPR is the latest amplification of the European Unions data security requirements that articulates measures to protect individuals and holds organizations accountable for data security.

    When it goes into effect, GDPR can apply widely to various organizations, including many without a physical presence in the European Union. In this webcast, we will explore this lengthy, complex regulation by focusing on the key steps your organization needs to take in order to comply. This includes how to get ready for the regulation; how to identify a Data Protection Officer and what this person needs to know to be effective in this role; as well as steps toward and a checklist for compliance with concise, practical information your organization can begin using now.
  • GDPR Myths and Misperceptions
    GDPR Myths and Misperceptions Duncan Brown, IDC Associate Vice President of European Security Recorded: Nov 14 2017 61 mins
    Learn what’s really required under the new regulation from an expert on questions that may still be troubling you. Duncan Brown, IDC’s Associate Vice President of European Security and one of the leading voices on EU GDPR will cover topics including:

    -Where and to which organizations the law applies (most likely, to yours!)

    -What fines will actually be enforced and what price tag they carry

    -What it means to be non-compliant (e.g., does the law apply in the absence of a breach?)

    -How EU GDPR compares to other regulations, such as PCI

    The clock is ticking — don’t get caught out. Register today and get the insight needed to effectively implement an EU GDPR strategy in time.
  • Automating Cloud Security to Mitigate Risk
    Automating Cloud Security to Mitigate Risk Dave Shackleford, SANS Analyst Recorded: Nov 14 2017 56 mins
    As your enterprise migrates to a private, public or hybrid cloud solution, what potential threats and challenges should you plan for in today’s security environment? How do you get visibility into your cloud solution, understand the architecture and manage it? This webcast outlines the potential security challenges enterprises face as they migrate to any kind of cloud set-up, and looks closely at how threat modeling, vulnerability assessment and automated operations can improve cloud security management.

Embed in website or blog