Hi [[ session.user.profile.firstName ]]

EC-Council | Security Channel

  • Date
  • Rating
  • Views
  • Panel Discussion: Cyber Security Strategies and Trends in 2017 Panel Discussion: Cyber Security Strategies and Trends in 2017 Jeff Costlow, ExtraHop Networks; Francois Raynaud, DevSecCon; Rami Mizrahi, TopSpin Security & Josh Downs, BrightTALK Live 60 mins
    These days it's not a matter of if you'll be breached, but when. Security teams in the modern enterprise must accept that as well as efforts to protect their perimeter, they must also focus on understanding their east-west traffic.

    This panel discussion will look at the trends and technologies influencing cyber security strategy in 2017, in particular those that deal with effectively monitoring your network to ensure your organisation handles vulnerabilities and stays breach free.

    Panelists:

    - Josh Downs, Community Manager - Information Security, BrightTALK (moderator)

    - Jeff Costlow, Director of Security, ExtraHop Networks

    - Rami Mizrahi, VP of R&D, TopSpin Security

    - Francois Raynaud, Founder, DevSecCon

    Tune into this panel conversation if you're a network or security professional looking to hear the latest trends and security best-practices to defend against a constantly evolving opponent.
  • Best Practices for Protecting Your Applications on Azure Best Practices for Protecting Your Applications on Azure Vince Bryant, Cloud Platform Partner Executive Recorded: Feb 15 2017 35 mins
    Microsoft Azure is experiencing enormous growth as an increasing number of organizations turn to Azure to more easily launch and scale applications and services, and achieve the benefits of using the cloud. Azure offers several native platform capabilities and services to help ensure these workloads are secure, easy to manage, and able to scale to meet demand. Organizations are rethinking their approach to securing these dynamic environments, not because cloud platforms are insecure themselves, but because the vast majority of legacy on-premises security products and strategies do not work for cloud workloads. 

    Join Alert Logic team member Vince Bryant, Cloud Platform Partner Executive, for an in-depth webinar where we will discuss best practices for securing applications running on Azure and in multi-cloud deployments, including: 

    • Five things you must consider when securing applications running on Azure or multi-cloud deployments 
    • Tips for addressing your responsibilities in the Microsoft Azure Shared Security Model 
    • Case study: Learn how Bentley Systems addressed customer and compliance requirements in their multi-cloud deployments
  • Forrester's Mastering The Endpoint: Addressing your core endpoint security needs Forrester's Mastering The Endpoint: Addressing your core endpoint security needs Chris Sherman, Senior Analyst at Forrester Research & Nima Baiati, Senior Director of Product Management at Absolute Recorded: Feb 9 2017 45 mins
    Security and risk professionals are dealing with staggering amounts of endpoint-related data loss and risk exposure. To help mitigate these risks, security pros need to rethink their current endpoint security strategies and move past traditional security technologies. Join guest speaker Chris Sherman, Senior Analyst at Forrester Research, as he discusses Forrester’s "Targeted-Attack Hierarchy of Needs”. In this webinar, he will highlight the core endpoint security needs critical to an enterprise security strategy. Attendees will learn how to deal with the multitude of threats targeting their user endpoints through a balance of attack surface reduction and threat detection, with orchestration and automation as key components.
  • The Foundations and Future of PKI: Yes, it’s Alive and Kicking The Foundations and Future of PKI: Yes, it’s Alive and Kicking Asaf Lerner, PKI product development at Gemalto Recorded: Feb 6 2017 59 mins
    According to a report from the Ponemon Institute, 62% of businesses surveyed regard cloud-based services as the most important trend driving the deployment of applications using PKI, an increase from 50% in 2015. While 28% say IoT will drive PKI deployment. PKI is once again in the spotlight, thanks to the growing number of use cases.

    The foundations of PKI technology and it’s future potential will help professionals determine the best security strategy for the long term. This session will go over the building blocks of a PKI ecosystem and discusses the functionality and use cases of the technology. Whether you’re a security professional looking for a PKI refresher or you are starting from scratch, you will find this webinar useful.

    During our webinar, The Foundations and Future of PKI: Yes, it’s Alive and Kicking, we will cover:

    •Brief overview of PKI technology and it’s components
    •PKI for identity and data protection
    •Advanced security functions of PKI
    •Basic PKI practices
    •PKI vertical use cases
    •The brave new world of PKI – a look at emerging trends and technology
  • Preparing for Cyber Threats in 2017 Preparing for Cyber Threats in 2017 Richard Davis, Director Cybersecurity & Adenike Cosgrove, Snr. Product Marketing Manager, Proofpoint Recorded: Feb 2 2017 51 mins
    Despite increased investment in the enterprise security landscape, cyber threats in the coming year will continue to evolve and adapt to even the most sophisticated defenses.

    To help you and your company prepare, we've put together our top cybersecurity recommendations for 2017.

    Join Proofpoint for "How to Prepare for Cyber Threats in 2017" and learn:

    * What we predict for the threat landscape in 2017

    * Key actions you can take to prepare

    * What top resources will help support your security efforts
  • Redefining Endpoint Incident Response with Behavioral Analysis Redefining Endpoint Incident Response with Behavioral Analysis Mike Vien, former CounterTack Sales Engineer and current Malware And Forensic Expert Recorded: Feb 1 2017 63 mins
    Incident response is changing. IR professionals and security teams consistently need tools that provide a deeper level of intelligence around threats impacting their environments. The capability to drill down into information on incidents upon alerts from other tools is critical when investigating root cause and ultimately impact. 

    CounterTack is dedicated to helping incident response and forensics teams leverage behavioral intelligence to track attacks and determine exactly how to work that knowledge into the response workflow. Leveraging behavioral traits and predictive analytics through its products, CounterTack understands the demands IR teams face for improving response time and accuracy.

    This webinar will feature an interactive demonstration of exactly how an IR professional would leverage CounterTack’s industry-leading Responder PRO tool to reverse engineer key risk indicators. This demo will detail real-world uses of not just features in the solution, but show you how to investigate common and uncommon types of threats through a forensic lens.

    Attendees of this session will receive a limited-time only incentive to buy Responder PRO.

    Register Today.
  • Speed and Scalability Matter: SANS Review of LogRhythm 7 SIEM Platform Speed and Scalability Matter: SANS Review of LogRhythm 7 SIEM Platform Dave Shackleford, sr. sans analyst, and Seth Goldhammer, Director of Product Management Recorded: Jan 31 2017 61 mins
    Enterprise-level security is no easy task. To detect, respond, and remediate advanced threats (and the vulnerabilities that cause them) security teams must get the most out of each security tool they use. For those with immense and complicated IT environments, your security intelligence platform should scale—incorporating cutting-edge security analytics to support everything from incident response case management and automated workflow. All of this should utilise automation to maximise the use of hunters and responders through more efficient searching, reporting, quantifying and visualisation processes.

    In this webcast, learn how LogRhythm reduces mean time to detect (MTTD) and mean time to respond (MTTR) through machine-driven, real-time behavioural analytics, rapid forensic search and automated response.

    Learn about:

    • LogRhythm platform’s overall platform performance
    • LogRhythm 7’s streamlined administration capabilities for reduced operating costs
    • Accuracy of LogRhythm’s event prioritisation
    • LogRhythm’s automation of security orchestration capabilities, with granular risk ratings and built-in case management
  • Security in the Age of Social Media Security in the Age of Social Media Jeff Lenton, Solutions Architect, RiskIQ Recorded: Jan 26 2017 33 mins
    Social Media has come of age. Collectively, social platforms have attracted two-thirds of the world’s internet users with more joining every day. This ubiquity has led many organisations to make social an integral part of their digital channels strategy, along with their web presence and mobile apps.

    For organisations engaging in social media, the importance of having an advanced social media strategy is more critical than ever.


    During the session you will learn:
    * The attack methods hackers use to exploit social media platforms and profiles.
    * Which weaknesses cyber criminals look for so you can protect your company’s social media reputation.
    * How to strengthen your security approach to combat social media threats.
    * The defense techniques an organization must employ to prevent social phishing attacks, brand impersonation, recruiting scams, customer service impersonations, malware attempts, RDC, and more.
  • Seeing the Forest and the Trees – Unique Security Challenges of Financial Data Seeing the Forest and the Trees – Unique Security Challenges of Financial Data Kim Ellery, Director, Product Marketing, Absolute Recorded: Jan 25 2017 28 mins
    Financial organizations are entrusted with the some of the most sensitive data and face a constant onslaught of attempts by insiders and hackers to steal incredibly valuable and easily monetized data. In this informative webinar, Kim Ellery, Director Product Marketing at Absolute, will discuss the increasing risk from both advanced attacks and insider threats. Attendees will gain actionable insights on how to balance the emphasis between detecting threats and preventing them in the first place, starting with visibility and actionable intelligence, to gain complete visibility and control of every endpoint device … no matter if they’re on or off the network.

    Join the Absolute team on January 25th for an informative webinar on improving your visibility, get actionable insights and strategies to help you detect threats faster or prevent them entirely
  • Exploit kits: getting in by any means necessary Exploit kits: getting in by any means necessary Scott Simkin, Senior Threat Intelligence Manager, Palo Alto Networks Recorded: Jan 25 2017 50 mins
    By understanding the inner workings of exploit kits, you’ll be better equipped to protect your organization from them. Join Scott Simkin from Unit 42 as he breaks down how today’s attackers are automatically exploiting vulnerabilities in common systems.

    You’ll learn about:

    - Why exploit kits are increasing in popularity
    - The process for launching exploit kit campaigns
    - How to defend your organization from exploits

Embed in website or blog