Hi [[ session.user.profile.firstName ]]

EC-Council | Security Channel

  • Date
  • Rating
  • Views
  • Stop Malicious Activity by Analyzing Network Behavior Stop Malicious Activity by Analyzing Network Behavior Chris Matthieu, Director of IoT Engineering, Citrix, John Smith, Principal Solutions Architect, ExtraHop Networks Recorded: Jan 10 2017 33 mins
    In the ever-evolving world of persistent threats to your environment the only way to keep up with malicious actors is by utilizing behavior based profiling. In this webinar, we will show how you can rethink the network to detect and remediate threats in real time. When wire data visibility from ExtraHop meets automated response from Citrix Octoblu you're able to protect your environment without having to spend all your time wading through alerts.

    This webinar is perfect for any network or security professionals who are keen to maintain optimum visibility accross their entire network, allowing them to neutralise threats and reduce vulnerabilities.

    About the presenters:

    John Smith is Solutions Architect at ExtraHop and author of the wiredata.net blog. He is a Citrix Technology Professional and 16-year IT veteran specializing in application delivery, event correlation, security, web applications, and application virtualization. John’s background gives him an invaluable perspective on the challenges facing IT, and creating new approaches to deal with them. Follow him on Twitter: @jmsazboy

    Chris was the co-founder and CTO of Octoblu, a revolutionary real-time IoT platform recently acquired by Citrix. Octoblu connects things, systems, people and clouds to a global mesh network allowing users to automate and control design flows, processes and sensor data, and analyze/react to real-time events and messages as well as big data trends and anomalies.
    Follow him on Twitter: @ChrisMatthieu
  • Threat intelligence and predictions for 2017 with Kaspersky Lab Threat intelligence and predictions for 2017 with Kaspersky Lab Amar Singh Recorded: Jan 6 2017 60 mins
    Join us to learn about the top predictions for 2017, as identified by Kaspersky Lab's Global Research & Analysis Team (GReAT). Gain the latest intelligence on the threat landscape and our predictions for 2017

    We face a future of increasingly subtle and sophisticated threat factors; a world where traditional clues and indicators are no longer enough on their own to identify and block attacks; where information is wielded as a weapon, misdirection is king, and global networks of connected devices can be used to paralyse the Internet. What does this mean for business in 2017?

    Kaspersky Lab UK's Principal Security Researcher, David Emm, shall present the Who, What, How and Why in Kaspersky Lab's predictions for 2017 and explain how they will affect the cyber-security landscape throughout the year.

    - Who: The business sectors we predict will be particularly targeted in 2017 and who will attack them.

    - What: The data, behaviour and habits that will expose businesses to increasingly sophisticated threat factors.

    - How: The technical methods through which businesses will be targeted.

    - Why: What Kaspersky predict to be the endgame of 2017's cyber-criminals.

    Hosted by Amar Singh
  • Can Good Security Help Drive Greater Business Agility? On-demand Panel debate! Can Good Security Help Drive Greater Business Agility? On-demand Panel debate! Stephen Pritchard - InfoSecurity Magazine, Bob Tarzey - Quocirca, Nathan Dornbrook - ECS, Tom Salmon - LogRhythm Recorded: Dec 19 2016 61 mins
    Good security operations have never been more critical for a business than today. More and more businesses are suffering damaging breaches. Outdated or overly complex security measures are a barrier to productivity, and to adopting new technologies.

    Plus, manual processes and a lack of visibility into unusual network behaviour by a user, machine or network device, can slow a security team down.

    How can advancements in security technology help to connect, unite and enable better processes to help drive greater business agility?

    In this webinar we will address:
    • SIEM’s role in enabling fast detection and response to modern-day threats
    • Implementing a security strategy that protects company assets and aligns to business objectives
    • How having faster access to the right data at the right time, enables better decision making and increased productivity
    • How to modernise your operations with real-time visibility and actionable intelligence
  • Redefining Endpoint Incident Response with Behavioral Analysis Redefining Endpoint Incident Response with Behavioral Analysis Michael Angelo Vien, CounterTack Cyber Response Expert Recorded: Dec 15 2016 48 mins
    Cybersecurity teams and incident responders struggle to gather the most accurate intelligence on threats, and targeted, specific security incidents. Teams need technology to drill down into information on incidents, often to respond quickly, and in doing so, determine root cause.

    Is it malware? Are there other indicators that you are blind to? Are your systems maligned with attack residue that you can’t analyze in-memory?

    The art of incident responses contains three key components typically:

    1)Understanding your threat landscape to the point where you can effectively begin to eradicate threats quickly and with confidence
    2)Determining through deep investigation the root cause of security incidents, and the broader impact incidents that are not triaged
    3)Applying forensic-level analysis to add a layer of intelligence based on what was found, and what can be predictably analyzed

    CounterTack delivers incident response capabilities built for analyzing today’s threats, and for drilling down forensically into incidents that might stem from varying levels of malicious code associated with malware and other IOC’s. Leveraging behavioral traits and predictive analytics through its solutions, CounterTack is dedicated to continually improving IR for organizations globally.

    This webinar will feature key trends on how the discipline of incident response has shifted toward needing more definitive analysis. The presentation will convey a few real-world use cases, leveraging CounterTack technology across multiple common and uncommon types of threats from a forensic point of view, so attendees can learn new techniques to elevate their IR workflow.

    As a takeaway, we’ll leave you with an endpoint IR checklist and a set of best practices, and a special incentive to acquire Responder PRO for detailed incident investigation.
  • Cyber Defence Today: 2016 in Review & 2017 Threat Horizon Cyber Defence Today: 2016 in Review & 2017 Threat Horizon Palo Alto Networks: Georgie Barrat, Greg Day, Christian Doolmann, Marion Gauthier Recorded: Dec 15 2016 12 mins
    Cyber Defence Today - Episode 2

    Welcome to the Decembers episode of our Cyber Defence Today series, finishing off 2016 with a high!

    The session will look back at the year in review and the lessons that should be learned, as well analysing what's coming up in 2017; the key threats and vulnerabilities to watch out for!

    The session will be hosted by leading technology journalist Georgie Barrat, who will be speaking with IT Security Experts from all over Europe, discussing recent Cyber Security events and what they can mean for your organisation. The episode will also feature panel discussions where our top-class selection of thought leaders will break down the challenges facing the security community, both today and on the horizon in the new year.

    December’s episode will feature:

    - Greg Day’s Cyber Security Predictions for 2017

    - How ‘Aperture’ will revolutionise the way companies approach their internet security

    - Silver Terrier: That Nigerian Prince has evolved his game

    - November Breach Prevention Week Highlights

    - Ignite 2017: why you should attend!

    Join us for the last Cyber Defence Today of 2016!
  • When Things Misbehave: How to Mitigate Massive DDOS Attacks When Things Misbehave: How to Mitigate Massive DDOS Attacks Moshe Elias, Director of Product Marketing and Scott Poretsky, AVP Solutions Architect Recorded: Dec 13 2016 45 mins
    The Distributed Denial of Service (DDoS) attack launched Friday, October 21, against Dyn - one of the largest managed DNS infrastructure providers - was the most destructive attack to date launched from an IoT botnet. The threat of mega attacks launched from infected connected devices is now a reality that dramatically changes the paradigm for mobile and fixed operators whose core infrastructure is susceptible to global attacks that are large enough to significantly disrupt subscriber quality of experience (QoE).

    Join us in this webinar to learn:
    •The impact of IoT driven DDoS mega attacks
    •Architectural approaches to volumetric DDOS mitigation
    •How to measure and maintain subscriber quality of experience during an attack
  • Data Center Migration: The Difference Between Anxiety and Success Data Center Migration: The Difference Between Anxiety and Success Nick Brackney - Product Marketing Manager Recorded: Dec 9 2016 22 mins
    It is critical for organizations to onboard new technologies and improve processes to remain competitive. Yet, safely navigating a migration or consolidation project can be challenging.
    The ExtraHop platform takes the guesswork out of application and data center migration by providing complete visibility and performance metrics that make clear the risks, but also support the success, of projects at any scale. By knowing before going, you can avoid unnecessary downtime and be sure that your user experiences remain consistent.
    In this webinar, ExtraHop' Nick Brackney explains how the ExtraHop platform helps to ensure successful migrations and consolidations.
  • SOC it to Me: Building A Modern Security Operations Center SOC it to Me: Building A Modern Security Operations Center James Carder, LogRhythm CISO and VP of LogRhythm Labs Recorded: Dec 8 2016 32 mins
    A SOC is a major component of a company’s GRC operations, as well as a critical IT center. But having your own SOC means more than just employing a couple of analysts to read log files. Do you know what kind of budget and expertise you’ll need to have if you decide to build your own SOC?

    In this webcast, James Carder, LogRhythm CISO and VP of LogRhythm Labs, discusses the decision-making process you’ll need to go through before you build your own security operations center (SOC) and the impact it will have on your organization.

    You'll learn:

    •The build vs buy trade-offs for a SOC
    •The impact of a SOC on your GRC program and processes
    •A SOC’s role in meeting compliance requirements
    •Questions you should be asking before building a SOC

    Watch now to learn the factors that go into planning for, building, and maintaining a modern SOC.
  • It’s My Life but I no Longer Have Control Over it! It’s My Life but I no Longer Have Control Over it! Gavin Chow, Network and Security Strategist Recorded: Dec 8 2016 49 mins
    We all know that technology plays a role in our everyday life but do you know the extent of that role? Advertising tells us to spend more and more of our life online and embrace technology in our homes, cars and everywhere else a microchip can be placed.

    But nowhere is there a message about the consequences of the misuse of that technology. 2016 has seen a rise in the number of incidents involving ransomware, IoT, and simply well intentioned connectivity gone wrong. That momentum is set to continue into 2017 and beyond.

    Although past performance does not guarantee future results, this session will focus on what we have seen this year and what we expect to see in the near future.
  • Talking to the Board About Cyber Risk – A Metrics-based Approach Talking to the Board About Cyber Risk – A Metrics-based Approach Ariel Evans, CEO, Innosec Recorded: Dec 7 2016 48 mins
    The rise of attacks resulting in huge business losses have brought cyber security into the board room. Prior to the Target breach, the board of directors was not very interested in cyber security. However, things have changed, and we see more and more CISOs reporting into the CRO, CFO, or CEO and not the CIO. Put simply, if you report into the board more than once or twice a year you have to be speaking their language.

    Cyber breaches have impactful results. In 2015, Target’s CEO Gregg Steinhafel, a 35-year employee of the company with the last six at the helm, was forced to resign in light of the recent holiday-season credit-card security breach that affected 40 million customers.

    As a result, we are seeing a major shift in corporate cybersecurity policy. The board of directors is no longer interested in check box compliance. They are understanding their role much better. They are responsible to ensure that cyber controls are in place that protect business assets of the firm in alignment with their risk tolerance.

Embed in website or blog