Hi [[ session.user.profile.firstName ]]

LookingGlass Cyber Solutions

  • Date
  • Rating
  • Views
  • Building a Threat Intelligence Program Building a Threat Intelligence Program Mike Rothman and AJ Shipley Recorded: Nov 17 2016 61 mins
    Security teams continually look for better ways to collect, analyze, and apply threat intelligence. Join our webcast with industry experts Mike Rothman and A.J. Shipley in their lively discussion of building, optimizing, and getting more value from your threat intelligence program. They’ll explore:

    •Evaluating data quality
    •Understanding threat context, relevance and priority
    •Key use cases around threat prevention, detection, and remediation
    •Best practices and advanced tools & technologies.
  • Phishing Prevention: Be Suspicious and Don't Get Hooked Phishing Prevention: Be Suspicious and Don't Get Hooked James Carnall and Greg Ogorek Recorded: Nov 3 2016 56 mins
    Although it’s been around for years, phishing is still one of the most common and effective online scams – and it just continues to grow. In Q1 2016 alone, phishing attacks grew approximately 250 percent. There were more phishing attacks during that three-month span than any other since 2004.

    Phishing scams are increasingly difficult to detect. Using information freely available on the internet about you or your organization, cyber criminals carefully craft a message that contains real information that you are inclined to trust. It can come to you in many ways including emails, SMS messages, phone calls, or impersonating websites. Often, there is a sense of urgency that’s paired with a message that makes you react with your emotions instead of thinking. So, how do you protect yourself and your organization from phishing scams?

    Join LookingGlass cyber security experts James Carnall and Greg Ogorek as they explore the world of phishing scams and phishing protection solutions. To set the context, the diverse types of phishing scams will be outlined along with very realistic examples that make these lures come to life. Next, we will investigate the growing risks by highlighting the changing cyber threat landscape specifically attributed to phishing. We will wrap up by discussing a wide range of phishing protection solutions.
  • Operationalizing Threat Intelligence: ESG Analyst Research, Insights, Use Cases Operationalizing Threat Intelligence: ESG Analyst Research, Insights, Use Cases LookingGlass Cyber Solutions Recorded: Aug 17 2016 50 mins
    Join us to learn about recent analyst research and real-world use cases to help you better Operationalize Threat Intelligence.

    Jon Oltsik, Senior Principal Analyst at Enterprise Strategy Group (ESG), will set the stage with research results on the state of the threat intelligence market.

    Jon and A.J. Shipley, VP of Products at LookingGlass Cyber Solutions, will then dive into a lively discussion on the role of threat intelligence in incident response, securing the perimeter, supply chain management, and compromised credentials.

    Key use cases will include closing the gap in DNS, leveraging APIs for SIEM, addressing protocol-specific infrastructures, and much more.

    Sign up today to ensure you receive all the valuable insights, strategies, best practices and key use cases on operationalizing threat intelligence to help improve your organization’s cybersecurity posture and lower risk.
  • NewsWatch Review: LookingGlass - Leader in Threat Intelligence NewsWatch Review: LookingGlass - Leader in Threat Intelligence NewsWatch TV Recorded: Apr 14 2016 2 mins
    No matter the size, location, or type of business you have, cyber criminals are constantly looking for security gaps to exploit for the criminal’s gain. In recent years this problem has only gotten worse and it has been found to be harder to protect our information online. While investments in security increase, the paradox is that breaches continue to increase too – which affects everyone – the company, their partners, and their customers. So, it is extremely important to stay ahead of threats. LookingGlass Cyber Solutions, has become a leader in this industry, and is helping both companies and governments do just that with “threat intelligence.”

    “Just like business intelligence help organizations really optimize their business processes, threat intelligence can provide the same value to how an organization manages risk from the perspective of brand reputation and overall security operations. LookingGlass helps security teams keep their organizations safe by really allowing them to have the visibility that threat intelligence provides and not just the visibility but being able to make that operational in their processes whether that be the traditional IP security, operations set, or into other buying centers such as physical security and brand and reputation. The LookingGlass solution approach to the market is different from a lot of our competitors because we have really assembled a comprehensive portfolio that allows us to address the customer based on their maturity, so we can address customers all the way down to small novelty manufacturers up to large scale governments.” – Chris Coleman, CEO LookingGlass Cyber Solutions
  • 5 Ways to Boost Network Security with a DNS Firewall 5 Ways to Boost Network Security with a DNS Firewall Frank Lung, Director of Product Management Recorded: Feb 23 2016 60 mins
    Learn how DNS firewalls enable better network protection from 1) malware, 2) spear phishing, 3) DDoS attacks, and 4) data exfiltration. Also learn how by leveraging threat intelligence, DNS firewalls can 5) mitigate threats in an even more automated, informed way.

    For example, you’ll learn that to protect from malware and data exfiltration, a DNS firewall is used to stop communication between malicious software or infected host and the malware command and control (C2) server. Without an outside connection or instructions, the malware is stopped in its tracks and ready for clean up. Or, that by adding a DNS firewall to your existing infrastructure, you can close the dangerous gap when NGFWs allow the TCP handshake to complete prior to enforcing policy. If you find these examples compelling, join us. You’ll never look at network security in the same way again.
  • Beyond Buzzwords, Part III: What Is Defense in Depth? Beyond Buzzwords, Part III: What Is Defense in Depth? Eric Olson, VP of Product Strategy & James Carnall, VP of Cyber Security Center Recorded: Dec 3 2015 55 mins
    Defense in depth is another one of those often-used, but rarely-defined, terms in Information Security circles. Sure, it means a layered defense, that’s obvious. But what makes up the layers? How do they interact for better security? And what does a best-practice implementation look like today vs. even a few years ago?
  • Beyond Buzzwords, Part II: What Exactly Is Intelligence-Led Security? Beyond Buzzwords, Part II: What Exactly Is Intelligence-Led Security? Eric Olson, VP Product Strategy & James Carnall, VP Cyber Security Center Recorded: Sep 24 2015 55 mins
    "Intelligence-led security" is a hot topic, but what, exactly, does it mean? In this webinar, we'll define the term and provide real-life examples of what an intelligence-led security plan looks like, and how you can implement a program for your organization utilizing internal and external data.
  • Cyveillance Threat Intelligence Solutions Overview Cyveillance Threat Intelligence Solutions Overview Devin Tubbs, Business Development Recorded: Aug 20 2015 28 mins
    Find out what open source threat intelligence is, why you need it, and how Cyveillance can protect your organization against physical and digital threats.
  • Toronto Pan American Games 2015: Assessment of the Physical Threat Environment Toronto Pan American Games 2015: Assessment of the Physical Threat Environment Hans Mathias Moeller, Olga Polishchuk Recorded: Jun 30 2015 16 mins
    Hans Mathias Moeller and Olga Polishchuk from Cyveillance's Special Investigations Unit will discuss the upcoming 2015 Toronto Pan American Games and potential threats to the event.
  • What You Need to Know About New gTLDs What You Need to Know About New gTLDs Camille Stewart, Esq. Recorded: Jun 29 2015 16 mins
    Senior Manager of Legal Affairs, Camille Stewart, Esq., will provide a high level overview of the new gTLD program, and what consumers need to know about these new extensions to protect their brands.