Hi [[ session.user.profile.firstName ]]

Virsec

  • Date
  • Rating
  • Views
  • Spectre Will Haunt Us for a Long Time
    Spectre Will Haunt Us for a Long Time
    Satya Gupta, CTO; Shauntinez Jakab, Dir. of Product Mkt.; Willy Leichter, VP of Marketing Recorded: Oct 31 2018 58 mins
    Learn How to Defend Your Business Now

    Since Spectre and Meltdown burst onto the scene in early 2018, and vendors have been scrambling to deploy patches, but we are not close to eliminating this 20-year-old vulnerability, and new variants continue to emerge. According to the researchers who discovered Spectre, “it is not easy to fix, it will haunt us for quite some time.”

    Business must, of course, go on but ignoring elephant-in-the-room threats is never wise. Solutions are emerging that look deeper into processor caching and memory usage, and selectively limit speculative execution, without recompiling code or hobbling performance.

    Join security experts from Virsec for a deep dive into how Spectre works, the latest variants, the limitations of current patches, and how to disrupt attacks without a performance hit.
  • Defending Your Business from Attacks that Weaponize at Runtime (WRT)
    Defending Your Business from Attacks that Weaponize at Runtime (WRT)
    Vinay Mamidi, Sr. Dir. Product Mgt., Shauntinez Jakab, Dir. Product Mkt., Willy Leichter, VP of Marketing Recorded: Oct 11 2018 46 mins
    The vast majority of security solutions are focused on an out-of-date model of chasing known malware that is already weaponized – ready to do damage. Today’s security landscape has shifted away from this, with the majority of modern attacks bypassing conventional security systems by delivering benign-looking data. These benign components subvert interpreters and assemble to create dangerous weaponized code that can derail applications, expose sensitive data, or damage critical infrastructure. 

    Join experts from Virsec for an interactive webinar discussing the emergence of WRT attacks and new strategies organizations need to use to protect applications in memory in real time.
  • Can We Rein in the Global Cybersecurity Crisis?
    Can We Rein in the Global Cybersecurity Crisis?
    Troels Oerting, Head of Global Centre for Cybersecurity, World Economic Forum; Usama Fayyad, CIO OODA Health Recorded: Sep 25 2018 54 mins
    The World Economic Forum has elevated cyberattacks as one of the top global risks in terms of likelihood and impact, ahead of all other types of technological, economic, political or terrorist risks. The easy availability of advanced hacking tools combined with our aging infrastructure and outdated security models is a recipe for disaster. To tackle this looming crisis, we need to rethink our approach to security and develop new strategies to protect our most critical applications and infrastructure.

    Join renowned security experts Troels Oerting, CIO of the World Economic Forum for an interactive discussion on new strategies to preempt this global crisis.
  • Is Security the Achilles' Heel of IoT?
    Is Security the Achilles' Heel of IoT?
    Prith Banerjee, Sr. Client Partner, Korn Ferry; Willy Leichter, Virsec Recorded: Sep 20 2018 45 mins
    New Security Strategies to Keep Up with IT/OT Convergence

    With the explosion of IoT and increased convergence between IT systems and industrial Operational Technology (OT), is security an afterthought? While the potential of IoT seems limitless, inadequate security could significantly dampen growth and put much of our industrial infrastructure at risk.

    Join us for an interactive discussion with renowned security and IoT expert Prith Banerjee, Senior Client Partner at Korn Ferry and former EVP and CTO at Schneider Electric.
  • Protecting Critical Infrastructure from Cyberattacks
    Protecting Critical Infrastructure from Cyberattacks
    Maj. Gen. Robert Wheeler, USAF (Retired); Willy Leichter, Virsec Recorded: Sep 11 2018 52 mins
    New Mindsets and Strategies for Proactive Defense

    There is no doubt that our infrastructure is under attack, and new vulnerabilities are being revealed daily. A perfect storm of political forces, aging infrastructure, increased automation, and advanced decentralized hacking all mean that we can’t be complacent about the security of our nation’s industrial backbone. To tackle today’s threats, we can’t rely on outdated security models and need a shift in mindset and defensive strategies that are up to the task.

    Join us for an interactive discussion with Maj. Gen. Robert Wheeler, a renowned security expert and former Deputy Chief Information Officer for Command, Control, Communications and Computers (C4) and Information Infrastructure Capabilities (DCIO for C4IIC).
  • Are You Expecting Too Much from Your WAF?
    Are You Expecting Too Much from Your WAF?
    Vinay Mamidi, Sr. Director of Product Management; Shauntinez Jakab, Director of Product Marketing Recorded: Aug 16 2018 49 mins
    Learn How to Improve Security While Reducing Your WAF Dependency

    Web application firewalls are a popular line of defense, but they can also be difficult to manage, require too much expert tuning, and deliver floods of false positives. And many advanced attacks such as the Equifax breach have easily bypassed WAFs. Perhaps we’re asking too much from a tool that sits at the network perimeter and has limited application context.

    Join experts from Virsec for an interactive webinar discussing next-generation technology that can augment WAF protection, dramatically reduce false positives, reduce your reliance on patching, and stopping advanced attacks that weaponize at runtime (WRT).
  • The Next Cybersecurity Challenge: Attacks that Weaponize at Runtime
    The Next Cybersecurity Challenge: Attacks that Weaponize at Runtime
    Troels Oerting, Head of Global Centre for Cybersecurity, World Economic Forum Recorded: Jul 24 2018 3 mins
    Troels Oerting, Head of the World Economic Forum Centre for Cybersecurity discussed a new class of cyber attack that exploits fileless and memory-based techniques. These attacks bypass conventional security and only weaponize as programs execute in runtime.
  • The Next Security Battleground: Attacks that Weaponize at Run-time
    The Next Security Battleground: Attacks that Weaponize at Run-time
    Satya Gupta, CTO, Virsec, Frank Walsh, Chief Security Architect, Virsec Recorded: Jun 27 2018 37 mins
    Most security solutions are locked into an out-of-date mindset, looking for known malware that has been constructed by hackers and delivered already weaponized – ready to do damage. But today’s advanced hacks are increasingly bypassing conventional security systems by delivering benign-looking data that only gets weaponized when applications are live, in runtime memory. By subverting interpreters and manipulating legitimate processes and memory, these attacks can assemble benign components to create dangerous weaponized code that can derail applications, expose sensitive data, or damage critical infrastructure.

    Join experts from Virsec for an interactive webinar discussing the emergence of WRT attacks and new strategies organizations need to use to protect applications in memory in real time.
  • Preventing a Meltdown - Presentation at ICS Singapore 2018
    Preventing a Meltdown - Presentation at ICS Singapore 2018
    Paul Forney, Chief Security Architect, Schneider Electric; Satya Gupta, CTO, Virsec Recorded: Apr 25 2018 19 mins
    Paul Forney, Chief Security Architect for Schneider Electric and Satya Gupta, CTO of Virsec delivered a joint presentation at the ICS Singapore Conference in April 2018, discussing the explosion of fileless and memory-based attacks, and strategies for protecting critical infrastructure.
  • Is The Next Cyber Threat is Already Inside Your Network?
    Is The Next Cyber Threat is Already Inside Your Network?
    Usama Fayyad, OODA Health, Chenxi Wang, Rain Capital Recorded: Apr 3 2018 58 mins
    While many people focus on detecting the next cyber threat to wreak havoc, more attention should be paid to detecting precursors to attacks that may already be within your network. In many major attacks, malware and vulnerabilities dwell within networks for months or years before the full exploit is launched. Machine Learning is being applied to detect new threats in the wild, but these techniques can be equally effective when applied internally, to map acceptable application behavior and react quickly if there is a real attack. Join noted security experts for an interactive discussion on strategies to protect your organization from these lurking threats.

Embed in website or blog