Hi [[ session.user.profile.firstName ]]

LookingGlass Cyber Solutions

  • Date
  • Rating
  • Views
  • Assessing Targeted Attacks in Incident Response Threat Correlation
    Assessing Targeted Attacks in Incident Response Threat Correlation Allan Thomson, CTO, and Jamison Day, Principal Data Science Engineer Recorded: Apr 12 2017 52 mins
    The current number of active cyber threats is astounding. Do you know which threats are targeting you right now and which threats are likely to cause greatest harm to your company?

    This session examines how correlating network flow data with cyber threat information during incident response provides knowledge of not only what threats are active or targeting you, but which of your assets are being targeted before or during an incident. We examine the many data types used in commonly-shared indicators of compromise and explore which provide for automating correlation with network flow data. The pros and cons of common correlation algorithms are discussed with a focus towards their contributions and limitations to enhancing threat intelligence efforts. Proper network flow correlation should provide a foundation for performing risk-based mitigation that identifies the threats that are creating the greatest loss of value for your organization rather than chasing down the threats deemed most harmful by the industry.
  • How Are You Managing Cyber Risk From Your Third-Party Relationships?
    How Are You Managing Cyber Risk From Your Third-Party Relationships? Ryan Curran, Senior Sales Engineer Recorded: Mar 30 2017 42 mins
    Outsourcing and strategic partnerships have become a staple in today's business climate, enabling organizations to drive business value and stay ahead of the competition. However, moving company information outside of its own defense perimeter opens an organization up to a myriad of cybersecurity vulnerabilities. Organizations need to have the tools and resources to determine the risk from 3rd party relationships and manage that risk in a timely and consistent manner.

    In this webinar, Senior Sales Engineer Ryan Curran will help you learn how to:
    ~ Identify and monitor threats targeting your extended ecosystem
    ~ Use a threat intelligence platform for third-party risk management workflows
    ~ Leverage Threat Indicator Confidence Scoring and pre-packaged threat intelligence to start monitoring 3rd parties within minutes
  • Threat Intelligence Gateway: An Unconventional Weapon for An Unconventional War
    Threat Intelligence Gateway: An Unconventional Weapon for An Unconventional War Kinshuk Pahare, Director of Product Development, LookingGlass Recorded: Feb 28 2017 37 mins
    The cyber threat landscape is constantly evolving and conventional security products (Firewalls, IPS/IDS and web proxies) are unable to address emerging threats in a fast and efficient manner. LookingGlass’ newest threat mitigation appliance, the ScoutShield Threat Intelligence Gateway, provides a zero-touch solution to automate the threat response.

    Join our Director of Product Management, Kinshuk Pahare as he discusses the:
    1. Challenges with conventional security appliances and the need for a Threat Intelligence Gateway.
    2. Importance of having high quality threat intelligence.
    3. Must-have characteristics of a Threat Intelligence Gateway appliance.
  • Building a Threat Intelligence Program
    Building a Threat Intelligence Program Mike Rothman and AJ Shipley Recorded: Nov 17 2016 61 mins
    Security teams continually look for better ways to collect, analyze, and apply threat intelligence. Join our webcast with industry experts Mike Rothman and A.J. Shipley in their lively discussion of building, optimizing, and getting more value from your threat intelligence program. They’ll explore:

    •Evaluating data quality
    •Understanding threat context, relevance and priority
    •Key use cases around threat prevention, detection, and remediation
    •Best practices and advanced tools & technologies.
  • Phishing Prevention: Be Suspicious and Don't Get Hooked
    Phishing Prevention: Be Suspicious and Don't Get Hooked James Carnall and Greg Ogorek Recorded: Nov 3 2016 56 mins
    Although it’s been around for years, phishing is still one of the most common and effective online scams – and it just continues to grow. In Q1 2016 alone, phishing attacks grew approximately 250 percent. There were more phishing attacks during that three-month span than any other since 2004.

    Phishing scams are increasingly difficult to detect. Using information freely available on the internet about you or your organization, cyber criminals carefully craft a message that contains real information that you are inclined to trust. It can come to you in many ways including emails, SMS messages, phone calls, or impersonating websites. Often, there is a sense of urgency that’s paired with a message that makes you react with your emotions instead of thinking. So, how do you protect yourself and your organization from phishing scams?

    Join LookingGlass cyber security experts James Carnall and Greg Ogorek as they explore the world of phishing scams and phishing protection solutions. To set the context, the diverse types of phishing scams will be outlined along with very realistic examples that make these lures come to life. Next, we will investigate the growing risks by highlighting the changing cyber threat landscape specifically attributed to phishing. We will wrap up by discussing a wide range of phishing protection solutions.
  • Operationalizing Threat Intelligence: ESG Analyst Research, Insights, Use Cases
    Operationalizing Threat Intelligence: ESG Analyst Research, Insights, Use Cases LookingGlass Cyber Solutions Recorded: Aug 17 2016 50 mins
    Join us to learn about recent analyst research and real-world use cases to help you better Operationalize Threat Intelligence.

    Jon Oltsik, Senior Principal Analyst at Enterprise Strategy Group (ESG), will set the stage with research results on the state of the threat intelligence market.

    Jon and A.J. Shipley, VP of Products at LookingGlass Cyber Solutions, will then dive into a lively discussion on the role of threat intelligence in incident response, securing the perimeter, supply chain management, and compromised credentials.

    Key use cases will include closing the gap in DNS, leveraging APIs for SIEM, addressing protocol-specific infrastructures, and much more.

    Sign up today to ensure you receive all the valuable insights, strategies, best practices and key use cases on operationalizing threat intelligence to help improve your organization’s cybersecurity posture and lower risk.
  • NewsWatch Review: LookingGlass - Leader in Threat Intelligence
    NewsWatch Review: LookingGlass - Leader in Threat Intelligence NewsWatch TV Recorded: Apr 14 2016 2 mins
    No matter the size, location, or type of business you have, cyber criminals are constantly looking for security gaps to exploit for the criminal’s gain. In recent years this problem has only gotten worse and it has been found to be harder to protect our information online. While investments in security increase, the paradox is that breaches continue to increase too – which affects everyone – the company, their partners, and their customers. So, it is extremely important to stay ahead of threats. LookingGlass Cyber Solutions, has become a leader in this industry, and is helping both companies and governments do just that with “threat intelligence.”

    “Just like business intelligence help organizations really optimize their business processes, threat intelligence can provide the same value to how an organization manages risk from the perspective of brand reputation and overall security operations. LookingGlass helps security teams keep their organizations safe by really allowing them to have the visibility that threat intelligence provides and not just the visibility but being able to make that operational in their processes whether that be the traditional IP security, operations set, or into other buying centers such as physical security and brand and reputation. The LookingGlass solution approach to the market is different from a lot of our competitors because we have really assembled a comprehensive portfolio that allows us to address the customer based on their maturity, so we can address customers all the way down to small novelty manufacturers up to large scale governments.” – Chris Coleman, CEO LookingGlass Cyber Solutions
  • 5 Ways to Boost Network Security with a DNS Firewall
    5 Ways to Boost Network Security with a DNS Firewall Frank Lung, Director of Product Management Recorded: Feb 23 2016 60 mins
    Learn how DNS firewalls enable better network protection from 1) malware, 2) spear phishing, 3) DDoS attacks, and 4) data exfiltration. Also learn how by leveraging threat intelligence, DNS firewalls can 5) mitigate threats in an even more automated, informed way.

    For example, you’ll learn that to protect from malware and data exfiltration, a DNS firewall is used to stop communication between malicious software or infected host and the malware command and control (C2) server. Without an outside connection or instructions, the malware is stopped in its tracks and ready for clean up. Or, that by adding a DNS firewall to your existing infrastructure, you can close the dangerous gap when NGFWs allow the TCP handshake to complete prior to enforcing policy. If you find these examples compelling, join us. You’ll never look at network security in the same way again.
  • Beyond Buzzwords, Part III: What Is Defense in Depth?
    Beyond Buzzwords, Part III: What Is Defense in Depth? Eric Olson, VP of Product Strategy & James Carnall, VP of Cyber Security Center Recorded: Dec 3 2015 55 mins
    Defense in depth is another one of those often-used, but rarely-defined, terms in Information Security circles. Sure, it means a layered defense, that’s obvious. But what makes up the layers? How do they interact for better security? And what does a best-practice implementation look like today vs. even a few years ago?
  • Beyond Buzzwords, Part II: What Exactly Is Intelligence-Led Security?
    Beyond Buzzwords, Part II: What Exactly Is Intelligence-Led Security? Eric Olson, VP Product Strategy & James Carnall, VP Cyber Security Center Recorded: Sep 24 2015 55 mins
    "Intelligence-led security" is a hot topic, but what, exactly, does it mean? In this webinar, we'll define the term and provide real-life examples of what an intelligence-led security plan looks like, and how you can implement a program for your organization utilizing internal and external data.

Embed in website or blog