Hi [[ session.user.profile.firstName ]]


  • Date
  • Rating
  • Views
  • Is The Next Cyber Threat is Already Inside Your Network?
    Is The Next Cyber Threat is Already Inside Your Network? Usama Fayyad, OODA Health, Chenxi Wang, Rain Capital Recorded: Apr 3 2018 58 mins
    While many people focus on detecting the next cyber threat to wreak havoc, more attention should be paid to detecting precursors to attacks that may already be within your network. In many major attacks, malware and vulnerabilities dwell within networks for months or years before the full exploit is launched. Machine Learning is being applied to detect new threats in the wild, but these techniques can be equally effective when applied internally, to map acceptable application behavior and react quickly if there is a real attack. Join noted security experts for an interactive discussion on strategies to protect your organization from these lurking threats.
  • Can We Protect Critical Infrastructure from Cyberattacks?
    Can We Protect Critical Infrastructure from Cyberattacks? Paul Forney, Chief Security Architect, Schneider Electric; Satya Gupta, Founder & CTO, Virsec Recorded: Mar 27 2018 53 mins
    The past year has seen a sharp increase in cyberattacks targeting critical infrastructure such as power plants, water treatment facilities, oil & gas refineries and elsewhere. High-impact attacks such as StuxNet, HaveX, Black Energy, Industroyer, Triton and others have used advanced hacking techniques and memory exploits to hijack control, cause disruption, shut down critical systems or worse. These technique bypass conventional network security tools and have been considered “indefensible” by many security experts.

    Hear ICS and security experts discuss how to defend against advanced attacks and protect infrastructure from unknown threats.
  • The Memory Attack Battleground
    The Memory Attack Battleground Satya Gupta, CTO, Willy Leichter, VP, Virsec Recorded: Mar 20 2018 58 mins
    The multitude of recent cyberattacks have a number of things in common: they are sophisticated, multi-pronged, use fileless techniques, and target applications at in process memory – largely invisible to conventional security products.

    Attacks including WannaCry, Petya, NotPetya, SystemD, Industroyer, and Apache Struts all leveraged memory-based attacks to infiltrate, pivot, and hijack valuable data. What used to be viewed as arcane, theoretical attacks have now become easily accessible through the Shadow Brokers leak of advanced memory corruption tool kits.

    Learn from Virsec experts:
    •Why memory attacks are under the radar of most security
    •How to map correct memory usage and detect deviations
    •New models for protecting applications from the inside
  • [Ep.4] Ask the Expert: Getting Serious About Cybercrime
    [Ep.4] Ask the Expert: Getting Serious About Cybercrime Joseph Carson (Thycotic) | William Leichter (Virsec) | Chenxi Wang Recorded: Mar 7 2018 61 mins
    This webinar is part of BrightTALK’s "Ask the Expert" Series. As attacks increase and start to have a significant impact, not just on companies’ bottom lines, but on their ability to carry out everyday business, cybersecurity has become much more of a boardroom issue than ever before. Increasingly this is causing forward looking organizations of all sizes to examine how security can be better integrated into business as normal.

    No business is immune from cybercrime and the theft of personal information and intellectual property will increase as the ability to turn raw data into money-spinning opportunities increases. The response to cybercrime is a business decision – and is all about risk management. Between human error and malicious insiders, time has shown us the majority of data breaches originate inside company walls. Employees and negligence are the leading causes of security incidents but remain one of the least reported issues. The fightback starts not in the organization but with people and increasingly in the home. More and more security professionals need to be re-assessing the risks to company data at a personal level - mobile/consumer devices, internet connected devices, cloud access and storage both inside and outside the corporate environment.

    - Joseph Carson, Chief Security Scientist, Thycotic
    - William Leichter, VP Marketing, Virsec
    - Dr. Chenxi Wang, Founder of The Jane Bond Project & Vice Chair, Board of Directors, OWASP

    Audience members are encouraged to send questions to the expert, which will be answered during the live session.
  • Security Without Guessing
    Security Without Guessing Ray DeMeo, Virsec Recorded: Mar 2 2018 2 mins
    Ray DeMeo, COO of Virsec discusses a new model for security using deterministic, memory-based protection to stop attacks in real-time while eliminating false positives.
  • Protecting Against "Indefensible" Attack: Interview with Atiq Raza, CEO
    Protecting Against "Indefensible" Attack: Interview with Atiq Raza, CEO Atiq Raza, CEO, Virsec Recorded: Feb 27 2018 2 mins
    Atiq Raza, CEO of Virsec and tech industry luminary, discusses a unique approach to protecting against today's advanced fileless and memory attacks in real-time.
  • Will Artificial Intelligence Strengthen Your Security Stance?
    Will Artificial Intelligence Strengthen Your Security Stance? Chris Roberts, Acalvio | Chris Morales, Vectra | Vikram Kapoor, Lacework | Willy Leichter, Virsec Recorded: Feb 15 2018 59 mins
    The volume and frequency of cyber-attacks makes it impossible for security analysts to use manual threat analysis to keep up with a rapidly changing threat landscape.

    Innovations in artificial intelligence (AI) now make it possible to automate mundane security operations, and provide security analysts with access to large data sets. The benefits are significant: analyst time is freed-up, and they have access to better information enabling smarter, faster decisions about how to continually improve the security posture of their organization.

    Join this Q&A panel on how AI can help improve your organization's overall security.

    - Chris Roberts, Chief Security Architect, Acalvio
    - Chris Morales, Head of Security Analytics, Vectra
    - Vikram Kapoor, Co-Founder and CTO, Lacework
    - Willy Leichter, Vice President of Marketing, Virsec
  • Uber, Equifax and the Year of Data Breaches
    Uber, Equifax and the Year of Data Breaches Chris Morales (Vectra Networks) | Jason Kent (AsTech) | Willy Leichter (Virsec Systems) Recorded: Dec 7 2017 60 mins
    Massive data breaches are a dime a dozen these days, affecting more people than before and exposing the highly personal information of millions of consumers. Uber is the latest company to disclose a major breach, joining Equifax from a few months ago, in which the names, addresses and other personal data got stolen by hackers.

    Join this interactive Q&A panel discussion to learn more about:
    - Impact and lessons learned from the Uber breach
    - What should enterprises do to better protect their customer data?
    - How can we address the growing threat of cyber attacks?

    Some of the industry's top minds will provide their insights on the impact of the recent breaches on consumers, organizations and policy.

    - William Leichter, VP Marketing, Virsec Systems (Moderator)

    - Chris Roberts, Chief Security Architect, Acalvio Technologies
    - Chris Morales, Head of Security Analytics, Vectra Networks
    - Jason Kent, CTO, AsTech Consulting
  • Equifax Breach Lessons: How to Stop the Next Breach - Or Slow it Down
    Equifax Breach Lessons: How to Stop the Next Breach - Or Slow it Down Rick Holand (Digital Shadows), Chris Sullivan (Core Security), Josh Shaul (Akamai), William Leichter (Virsec) Recorded: Sep 29 2017 61 mins
    What are the lessons learned from the recent slate of mega-breaches (Equifax, CIA, NSA)? How can we apply these lessons toward educating our workforce and strengthening our organizations' security posture?

    Join this interactive panel with cyber security experts to learn more about:
    - Why the Equifax data breach was inevitable
    - How to prepare against the next big one
    - How to detect breaches faster
    - The first 24 hours after a breach
    - The importance of employee security training
    - What CISOs can learn from this breach

    - Rick Holand, VP Strategy, Digital Shadows
    - Chris Sullivan, SVP, Chief Information Security Office, Core Security
    - Josh Shaul, VP of Product Management, Akamai

    - William Leichter, VP Marketing, VIrsec Security
  • Equifax Hack and Improving Data Protection
    Equifax Hack and Improving Data Protection Satya Gupta (Virsec Systems), Shawn Burke (SungardAS), Vamshi Sriperumbudur (CipherCloud), William Leichter (Virsec) Recorded: Sep 21 2017 61 mins
    In the aftermath of the Equifax data breach, both consumers and enterprises are scrambling for ways to minimize the impact. Since highly personal information was exposed (social security numbers, addresses, birthdays), the implications of this breach could haunt us in the long-term future.

    What are the lessons of this breach to individuals, as well as organizations?

    Join this interactive panel discussion with security experts to learn:
    - The short and long-term effects of this data breach
    - What you can do to protect yourself and your organization
    - How to protect against future scams
    - Why breaches happen and how organizations can improve their breach prevention efforts, as well as employ technologies and process for faster breach detection and response
    - How to improve cyber security going into 2018

    - Satya Gupta, CTO, Virsec Systems
    - Shawn Burke, Global Chief Security Officer, Sungard Availability Services
    - Vamshi Sriperumbudur, VP Marketing, CipherCloud

    - William Leichter, VP Marketing, Virsec Systems

Embed in website or blog