Hi [[ session.user.profile.firstName ]]

EC-Council | Security Channel

  • Date
  • Rating
  • Views
  • The Data Breach War: How banks can step up their line of defence The Data Breach War: How banks can step up their line of defence JP Vergne (Scotiabank Lab, Ivey B-School), Nik Walser (EY), Mario Maawad (CaixaBank), Lawrence Chin (Palo Alto Networks) Recorded: Oct 19 2016 62 mins
    As holders of valuable client and financial data, banks have been prime targets for hackers and thieves. Entire payment systems can be compromised in the blink of an eye and clients also risk having their identities stolen.

    Join this panel session where our experts will discuss:

    -Best practices for preventing cyberattacks at every stage
    -Top mistakes banks and financial institutions make when dealing with valuable data
    -What makes you a target?
    -Using real-time analytics to identify anomalies and act on them immediately
    -Malware, threat prevention, next-generation security — what are they, what do you need to know?
  • Turbocharge your Cyber Investigations, Part 1 Turbocharge your Cyber Investigations, Part 1 Jeff Lenton, Solutions Architect, RiskIQ Recorded: Oct 13 2016 32 mins
    While their cyber tactics may be continuously changing, bad actors can’t avoid interacting with core components of the internet. These interactions leave a trail that when connected through rigorous threat infrastructure analysis, can reveal the full scale of an attack and provide the information needed to determine the best response. The key to this analysis is access to a variety of global datasets and the ability to correlate and pivot between them in your investigation.

    In this two part series we will look at a range of global datasets and how each can be used to shed additional light on your adversary’s infrastructure. This session will focus on Passive DNS, Whois and Malware data. We will also demonstrate how security analysts can use the free community version of RiskIQ’s PassiveTotal to gain access to and pivot across these global datasets.
  • Using machines to combat criminals Using machines to combat criminals Lloyd Webb, Sales Engineering Director, Cylance Recorded: Oct 13 2016 39 mins
    2016 is turning out to be a landmark year in terms of Ransomware and there’s no sign of these threats slowing down any time soon. Ransomware is not new, it is just getting more sophisticated and is inflicting major damage to companies, organisations and individuals, shaping up to be a frighteningly lucrative year for cybercriminals, where any person with a computer can be exploited and used as a revenue source with the potential for vast profits.

    Learn how Cylance have revolutionized the industry by utilizing data science and security experts to provide a next-generation cybersecurity technology that proactively prevents, rather than detects the execution of advanced persistent threats and malware in real time before they ever cause harm.
  • One Step Ahead of Phishing Attacks One Step Ahead of Phishing Attacks Greg Maudsley, Senior Director Product Marketing, Menlo Security Recorded: Oct 12 2016 56 mins
    Phishing is serious business. It is the most common targeted method of cyber attacks, and the main perpetrators for phishing attacks are organized crime syndicates and state-affiliated actors.* Despite multiple security defense layers and many hours and dollars spent on end-user training, phishing continues to create headaches for security administrators.

    Join this webinar to learn:

    · New phishing prevention techniques

    · How to stop ransomware, malware and drive-by-exploits enabled by email phishing

    · Updated security research findings

    · Real-life case studies for using isolation techniques to prevent phishing attacks
    Speaker Bio:
    Greg Maudsley has over 15 years of IT security experience and is responsible for strategy development and threat isolation innovations at Menlo Security. Previously, Maudsley was a product marketing leader for F5 and Juniper Networks' Junos Pulse Business Unit. His responsibilities spanned the security spectrum, including application security, anti-fraud, cloud security, DDoS prevention, DNS sec, secure access, NAC, mobile security, application delivery and WAN Optimization. Maudsley holds an MBA from Santa Clara University Leavey School of Business, and a B.S. in Physics from the University of Redlands.
  • The Magic Bullet: How Social Engineering is the Key The Magic Bullet: How Social Engineering is the Key Jenny Radcliffe, Head Trainer, Jenny Radcliffe Training Recorded: Oct 12 2016 38 mins
    The human side of security is beginning to be acknowledged as at least as important as the technical side in terms of awareness and training programs for most organisations.

    In this webinar, Social Engineer and Trainer Jenny Radcliffe shares some advice as to what happens beyond acknowledging the threat, what, if anything, can an organisation do to turn Social Engineering to its advantage? Is there really a "magic bullet" that can engage staff, change security culture and contribute to a more secure organisation?
  • Solving the dilemma of securing private data in the cloud Solving the dilemma of securing private data in the cloud Sunil Choudrie, Global Solutions Marketing Mngr - Symantec & Robert Arandjelovic, Security Strategy Director EMEA - Bluecoat Recorded: Oct 12 2016 64 mins
    The cloud allows open sharing of data, allowing people to access information at home, in the office or on the move. This openness has come at a price, putting security and data privacy at risk.

    Research shows that on average, organisations are aware of less than 10% of all cloud applications used by their staff, providing a massive blind spot. If you don’t know where your sensitive data is, how do you secure it? In this 45 minute webinar we will outline the Symantec three-part framework for managing the Information Protection lifecycle and show how this applies to securing the cloud. The webinar will address:
    · The opportunities and risks of moving data to the cloud
    · Security and privacy implications
    · The Symantec three-part framework
    o How to ensure only trusted users and devices can access data
    o How to classify and discover sensitive data, and gain full visibility into the cloud
    o How to protect data through the application of encryption technology
    · Future direction and recommendations

    So if you are struggling with the dilemma of providing open access to sensitive data, register for this webinar today.
  • Understanding the Risks from DDoS Attacks Understanding the Risks from DDoS Attacks Rohit Kinra, Director - Product Technology, Verisign Recorded: Oct 11 2016 29 mins
    Recent DDoS attacks trends indicate that DDoS attacks are becoming more sophisticated and persistent. What do these DDoS trends mean for your organization, especially during the upcoming holiday season?

    Join Rohit Kinra, Director, Product Technology, Verisign, as he discusses the behavioral shifts observed by Verisign in recent DDoS attacks and what should concern you. Rohit will also share recommendations on how your organization can prepare and defend against DDoS attacks.
  • The role of Threat Intelligence Feeds in the Battle Against Evolving Cybercrime The role of Threat Intelligence Feeds in the Battle Against Evolving Cybercrime Nahim Fazal, Head of Cybersecurity Development at ‎Blueliv Recorded: Oct 11 2016 45 mins
    Today, advanced cyber threats form part of the risk landscape we encounter every day in our increasingly digital lives. Cybercrime is known for its complex, chameleon characteristics – it’s a highly lucrative industry with fast-paced innovation at its core. The evolution of cybercriminal techniques enables it to thrive, and we need to sprint to keep up. Organizations must respond with security solutions nimble enough to compete with the bad guys. Sounds like a job for MRTI, and we think we’ve got just the ticket.

    This webinar intends to be an educational piece for any Security team in need of having a better understanding of the value provided by Threat Intelligence feed in order to complement traditional security real estate. This is not intended for those who already have a strong expertise and understanding of the fundamentals of threat intelligence delivered via a feed.
  • Privacy vs. Security Privacy vs. Security Steve Durbin, Managing Director, ISF Ltd Recorded: Oct 11 2016 48 mins
    In May 2018 the EU’s General Data Protection Regulation (GDPR) will take effect. The GDPR upholds the protection of personal data and increases the accountability of organisations processing any personal details belonging to EU citizens- with severe penalties for those who do not comply.

    In this webinar Steve Durbin, Managing Director at the ISF, discusses why it is important for the security and data privacy teams to work together to run risk assessments on their most critical information assets and to develop checklists, policies and procedures that can be implemented internally and with third party suppliers. Only by taking this approach will organisations be able to remain agile, maintain customer confidence and demonstrate that they are ‘GDPR ready.’
  • Stop Taking a Reactive Approach to Network Security Stop Taking a Reactive Approach to Network Security Patrick Grillo, Senior Director, Security Solutions, Fortinet Recorded: Oct 11 2016 42 mins
    Preparation and advance planning are key words for a number of activities but when it comes to securing a network, it seems that being reactive is more the norm.

    This session will focus on the consequences of not taking a proactive approach: dealing with the consequences of past decisions while trying to respond to the challenges of today.

Embed in website or blog