Hi [[ session.user.profile.firstName ]]

EC-Council | Security Channel

  • Date
  • Rating
  • Views
  • Top cyber threats in the financial sector
    Top cyber threats in the financial sector Candid Wueest, Principal Threat Researcher, Symantec Recorded: Nov 16 2017 49 mins
    Financial institutions are increasingly facing attacks on multiple fronts.

    Cyber criminals continue to target online banking using malware to hijack customer transactions and banking sessions. While there has been an overall drop in infections related to these consumer threats, financial institutions are now facing new types of attacks in the form of large-scale financial heists.

    Attack groups such as Fin7 and Lazarus are deliberately targeting financial institutions in audacious attacks that are reaping large rewards. They are using living off the land and fileless attack tactics similar to APT groups. But also extortion with DDoS attacks or business email compromise (BEC) scams are increasingly bothering financial corporations.

    In this webcast on the current financial threat landscape, Symantec takes a look at the most prevalent and significant financial threats.

    In this webcast we will review:
    - The top threats facing financial institutions with statistics and examples
    - Explore the most common techniques employed in financial attacks
    - Provide case studies of the most high-profile financial attacks of the past 12 months
  • Achieving Digital Trust: Turning New Threats into Customer Loyalty
    Achieving Digital Trust: Turning New Threats into Customer Loyalty Jeffrey Ritter Recorded: Nov 15 2017 43 mins
    Dynamic, volatile, innovative. Cloud security is all of these and more. Join this webinar to learn more about:
    - How can cloud service vendors turn the constant parade of new threats into a continuing opportunity to increase customer loyalty?
    - How can customers gain trust in their service vendors despite the parade?
  • Defending from Attack: Winning the Cyber Conflict
    Defending from Attack: Winning the Cyber Conflict Griff James, Director, Damrod Analysis Ltd. Recorded: Nov 14 2017 31 mins
    Effective responses to modern IT risks requires a transition from cyber security to cyber defense. This presentation introduces analysis based on proven military tools to understand, assess, and defend against cyber-attack. See how Petya worked its way in, and how to defend against it. Take away valuable tools and frameworks to develop your defenses.

    Presenter:

    Griff is trained as a Canadian Infantry Officer and is a graduate of the Johnson-Shoyama Graduate School of Public Policy. After a two-year stint as a Strategic Policy Analyst at the Treasury Board Secretariat in Ottawa, he moved to London where he completed a Master’s Degree at the LSE. Unable to find “real” work, he got into software development as a Scrum Master, leading the development of a web based application. This experience fostered an interest in cybersecurity, and Griff went on to a boutique start-up providing application security to Fortune 500 companies. Frustrated by the disconnect between technologies and poor analysis within cyber security, Griff founded cyber defense firm Damrod Analysis in 2017. He is London based, where he and his wife are expecting their first child shortly.
  • The 2018 Threatscape: Cyber clairvoyance and divination
    The 2018 Threatscape: Cyber clairvoyance and divination Peter Wood, CEO, First Base Technologies Recorded: Nov 14 2017 47 mins
    What have we learned from 2017's biggest breaches and how will we deal with 2018's emerging threats? Attempting to look both backward and forward over the cyber landscape, Peter Wood will review lessons learned and apply them to the evolving threatscape.
  • Seeing through the Clouds: How Visibility Reduces Security Failures
    Seeing through the Clouds: How Visibility Reduces Security Failures Dominic Vogel, Chief Security Strategist, Cyber.SC Recorded: Oct 25 2017 47 mins
    As organizations continue to ramp-up their migration to cloud-based environments, they will need to account for the associated security and control risks. There are hidden dangers and blind spots that arise through the use of virtualization technology in the data center. These hidden dangers and blind spots become more prevalent as business-critical applications are increasingly deployed on the public cloud. This is a problem considering that an organization’s operations are dependent on a cloud environment that inherently has a huge visibility gap.

    Many are now making the necessary changes to keep data secure in the cloud. This talk will focus on how to pragmatically accomplish cloud security through increased emphasis on cloud network visibility and cloud access security brokers. Enterprises that can properly implement appropriate cloud network visibility and cloud access security brokers will experience a third fewer security failures. Learn about practical steps and tools that you can use for accomplishing cloud security in your organization.
  • [Panel] Protecting Data in the Next Generation of the Cloud
    [Panel] Protecting Data in the Next Generation of the Cloud Amar Singh (Cyber Management Alliance); Klaus Gheri (Barracuda Networks), Daniele Catteddu (CSA) Recorded: Oct 25 2017 58 mins
    Cloud computing is an increasingly vital element of information security. It’s used to protect sensitive data; for identity and access management; for network security and to aid with incident response. However it’s not without it’s own set of risks and has been hit in the past with significant and newsworthy breaches.

    Join this interactive Q&A panel with top cloud and security experts as they discuss the future of the cloud and considerations to take for protecting sensitive data when it's held in the Cloud.

    Moderator:
    - Amar Singh, Cyber Management Alliance

    Speakers:
    - Daniele Catteddu, CTO, Cloud Security Alliance
    - Klaus Gheri, VP and GM, Network Security, Barracuda Networks
  • The Future of Cloud Security: Next Generation Threat-based Testing
    The Future of Cloud Security: Next Generation Threat-based Testing Peter Wood Recorded: Oct 24 2017 48 mins
    If your processing and data is in the cloud, how can you deliver assurance, compliance and governance? How do you find the flaws and soft spots that criminals will exploit? From browser to database, through human factors and end points, this presentation will take a threat-based approach to securing the cloud.
  • Bitcoin Forensics
    Bitcoin Forensics Anupam Tiwari, IT Security Consultant Recorded: Oct 10 2017 45 mins
    Bitcoin is all the rage right now. But many question the security behind this popular cryptocurrency.

    Join this session where Anupam's agenda will include:

    -Brief intro
    -Anonymity Vs. Pseudonymity
    -Bitcoin working mechanics and cryptography involved
    -Forensics
    -Transaction conduct and types
    -Wallets and types
    -Blockchain explorer
    -Bitcoin artifacts
    -Conclusion
  • A Secure Model of IoT Using Blockchain
    A Secure Model of IoT Using Blockchain Ahmed Banafa, Lecturer and IoT Expert, College of Engineering, San Jose State University Recorded: Oct 10 2017 49 mins
    As the Internet of Things (IoT) adds more and more devices to the digital fold every day, organizations of all sizes are recognizing the IoT's potential to improve business processes and, ultimately, accelerate growth.

    Meanwhile, the number and variety of IoT solutions has expanded exponentially, creating real challenges. Chief among them: the urgent need for a secure IoT model for performing common tasks such as sensing, processing, storing information, and communicating. But developing such a model involves overcoming numerous hurdles.

    Of course, there are multiple ways of looking at the IoT. For instance, the system view divides the IoT into blocks, such as connected things, gateways, network services, and cloud services, while the business view consists of platform, connectivity, business model, and applications. But one common thread connects all these views: security is paramount

    IoT applications and devices is the next wave of technology, but security is a big concern. This webinar will explain the convergence of IoT and Blockchain technology.
  • AI for Autonomous Response: The Machine Fights Back
    AI for Autonomous Response: The Machine Fights Back Andrew Tsonchev, Director of Cyber Analysis & Dan Fein, Senior Cyber Technology Lead Recorded: Sep 29 2017 41 mins
    Global ransomware attacks like WannaCry already move too quickly for humans to keep up, and even more advanced attacks are on the horizon. Cyber security is quickly becoming an arms race — machines fighting machines on the battleground of corporate networks. Algorithms against algorithms.

    Artificial intelligence-based cyber defense can not only detect threats as they emerge but also autonomously respond to attacks in real time. As the shortage of trained cyber analysts worsens, the future of security seems to be automatic. But are humans ready to accept the actions machines would take to neutralize threats?

    Darktrace recently ran tests across enterprises of all sizes in a variety of industries and has subsequently deployed AI-autonomous response in over one hundred organizations. In this presentation, we will discuss our lessons learned and explore several use-cases in which AI-based ‘Autonomous Response’ technology augmented human security teams.

    This session will cover:
    AI approaches and algorithms for detecting and responding to threats
    How human teams adopt (or resist) automated defenses
    The concepts of ‘human confirmation’ mode and ‘active defense’
    Real-world examples of autonomous response in action

Embed in website or blog