Hi [[ session.user.profile.firstName ]]

Information Security

  • Date
  • Rating
  • Views
  • Anatomy of WannaCry - Learning from the Ransomware that Paralyzed Global Systems
    Anatomy of WannaCry - Learning from the Ransomware that Paralyzed Global Systems Paul Schofield, Director, Partner Architecture & Enablement, enSilo Recorded: May 26 2017 57 mins
    In early May, the world witnessed a massive ransomware campaign that had a crippling effect on businesses in multiple industries across the globe. What made this ransomware, called WannaCry, so different than others was the ransomware’s ability to combine lateral movement. As opposed to other ransomware that typically infects a few devices within an organization, WannaCry had worm-like capabilities, spreading itself throughout the organizational network and hitting servers.

    While a “kill-switch” was used against WannaCry, organizations are undoubtedly going to continue suffering from WannaCry’s remnants within organizations. More so, the impact of WannaCry will motivate ransomware authors to start adopting lateral movement capabilities. Yet, with all the advanced malware techniques, security professionals are required to ensure the continuous operations of their systems.

    In this webinar, you will:
    - Learn about EternalBlue - the exploit in Microsoft's implementation of the SMB protocol that enabled WannaCry to propagate throughout the organization
    - Watch how WannaCry attacks an unpatched endpoint and encrypts data
    - Receive strategies and best practices to ensure that your systems are protected from advanced ransomware
  • Mobile DevSecOps 101: Common slip-ups in embedding mobile app security testing
    Mobile DevSecOps 101: Common slip-ups in embedding mobile app security testing Brian Lawrence, NowSecure Solutions Engineer & Keith Mokris, NowSecure Product Marketing Leader Recorded: May 25 2017 32 mins
    Developers and DevOps engineers want to fail fast, iterate, and continuously improve. If security practioners want to join in the fun, they need to integrate security assessments into existing mobile DevOps workflows and toolchains. This webinar will teach security professionals, developers, and DevOps engineers how to avoid common mistakes in embedding automated app security testing into mobile DevOps practices.

    Join NowSecure Solutions Engineer Brian Lawrence and Product Marketing Leader Keith Mokris to learn how to do things like:

    -- Address DevOps stakeholders' worries and concerns about integrating security testing
    -- Determine the right depth of analysis for continuous mobile app security testing
    -- Track mobile DevSecOps metrics over time to measure success
  • Malware in Disguise & How to Spot It [Ransomware, Phishing]
    Malware in Disguise & How to Spot It [Ransomware, Phishing] Alex Holden, CISO of Hold Security Recorded: May 24 2017 56 mins
    On the surface, spotting malicious attacks can be difficult. Hackers are expanding their malware distribution networks by exploiting commonly used applications to carry and distribute their malicious software. In the wake of the three major attacks Wanna Cry, DocuSign, and Google Docs malware outbreak we will examine how malware is distributed and provide guidelines on how to secure infrastructures against the next attack.

    About the Presenter:
    Alex Holden is the founder and CISO of Hold Security. Holden is credited with the discovery of many high profile breaches including Adobe Systems, initial vendor breach that led to the discovery of the JPMorgan Chase breach, and the independent discovery of the Target and Yahoo breaches. Considered one of the leading security experts, he regularly voices his professional opinion in mainstream media.
  • [VIDEO] Man & Machine: Analytics as a Defence Against Advanced Cyber Threats
    [VIDEO] Man & Machine: Analytics as a Defence Against Advanced Cyber Threats Ross Brewer, vice president and managing director EMEA, LogRhythm & Josh Downs, Senior Community Manager, BrightTALK Recorded: May 24 2017 30 mins
    As technology advances, so does the threat landscape, with cyber criminals effectively exploiting weak points on an almost daily basis. When malware infiltrates an organisation’s first layer of defence, it can spread quickly throughout the network, exposing data and weakening security - and in most cases this happens faster than analysts or administrators have time to react to. Indeed, with reams of data being generated and transferred over networks, organisations are having a hard time monitoring everything, which means potential threats can easily go unnoticed.

    Organisations need to rely on machines to detect and respond to threats more quickly and efficiently. Even enterprises with a dedicated security team that monitors the latest security threat trends and understands the blueprint of evolving attack vectors still need to continuously monitor all network activity. The sheer volume of processes, services and applications running on a corporate network is just too much for human beings to monitor alone. However, this doesn’t mean that human analysis is not important.

    User and entity behavioural analytics (UEBA) is essential in keeping up with continuously evolving threats and making sense of anomalous network behaviour. Security approaches that utilise both machine learning and human analysis enable all threats to be analysed for effective detection and response, ensuring all data is accounted for and including the human element to help reduce the opportunities for false positives. To keep up with the ever-changing security landscape, companies need to integrate internal and external threat context in their environment by updating processing rules for operating systems, applications, and network devices in order to strengthen the accuracy of real-time machine analytics.
  • Strategies for Effective 3rd Party Risk Management
    Strategies for Effective 3rd Party Risk Management Scott Roller, Founder of 3WP; Rebecca Herold, Privacy Professor; Sam Kassoumeh, SecurityScorecard. James Christiansen, Optiv. Recorded: May 23 2017 63 mins
    The challenges that organizations face today are increasingly more complex than in the past. The constant change of the global economy, dynamics of business risks and opportunities, and an increased threat of cyber-attacks add complexities we’ve never faced. As organizations rely on more and more third parties to grow and thrive, they’re exposed to higher levels of risk, and regulators are focused on the need for organizations to manage 3rd party risk more effectively.

    Manual processes, silos in contract administration, and technology and resource constraints can all lead to significant errors in the third party supply chain that leads to violation of privacy guidelines and security breaches, which cause substantial fines, penalties, and damage to brand value. On this webinar our panel of experts will discuss the risks and repercussions associated with third party contract management shortcomings, common gaps in third party contract management processes, examples of how new solutions and technologies can help organizations optimize their third party processes, and effective strategies for managing 3rd Party Risk.
  • GDPR: Global Implications of EU Legislation
    GDPR: Global Implications of EU Legislation Jonathan Armstrong, Cordery & Nima Baiati, Absolute Recorded: May 23 2017 62 mins
    Enforcement of the EU General Data Protection Regulation (GDPR) is looming, giving you less than 12 months to prepare. And it has major implications for every organization that processes EU personal data – regardless of where they are based.

    With the cost of non-compliance set at an astronomical 4% of global annual revenue – not to mention damage to reputation – the time to protect yourself is now.

    On May 23rd, join Absolute’s data protection experts alongside leading technology and compliance lawyer Jonathan Armstrong, as they share practical insights on the global implications of GDPR. Register today and learn:

    • GDPR compliance – what’s required and what’s at stake
    • Organizational steps you need to take now to avert disaster
    • The best security approaches to ensure compliance and protect your data – and your brand
  • Don’t let Smartphones Kill your PKI Security Strategy
    Don’t let Smartphones Kill your PKI Security Strategy Gregory Vigroux, Enterprise Mobility Expert at Gemalto Recorded: May 23 2017 51 mins
    Half of businesses admit security is their biggest concern to increasing user mobility. Securing enterprise mobility has been an ongoing and arduous topic for IT security professionals. Maintaining high-assurance security, while offering access to company resources to an on-the-go workforce has become a balancing act. So much so, a third of businesses actually prevent employee access to company resources via mobile. This is likely not a long term or sustainable solution to the problem.

    So how do you find a compromise that won’t kill your security strategy? There are currently many technologies from derived credentials to mobile PKI. IT professionals are feeling the pressure to find a viable, user friendly, easy-to-deploy and secure options. In this webinar, we will discuss the current solutions in-depth and how they impact your current IT security policies. Attendees will learn more about:
    -Software-based security versus hardware-based security
    -How this impacts your back-end systems
    -Technology such as derived credentials and mobile PKI
    -Implementing a mobile PKI solution
  • [Video Interview] AI & Machine Learning in Cyber Security: The IBM View
    [Video Interview] AI & Machine Learning in Cyber Security: The IBM View Josh Downs, BrightTALK & Martin Borrett, CTO, IBM Security Europe Recorded: May 23 2017 10 mins
    - BrightTALK at CRESTCON & IISP Congress -

    BrightTALK caught up with IBM Security Europe's Martin Borrett for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - AI & machine learning and the influence that the technology will have on the security space

    - The ins and outs of AI & machine learning and how it analyses your data looking for security incidents

    - How to find a good solution to suit all budgets

    - The growth of IoT networks and how we can look to protect them effectively

    - V2V security and how to ensure connected cars are protected from cyber threats

    - The threatscape in 2017; the threat actors, motives and attack techniques
  • WannaCry Ransomware: Why Kill Switches Will Not Protect You
    WannaCry Ransomware: Why Kill Switches Will Not Protect You Mounir Hahad, Sr. Director of Cyphort Labs Recorded: May 22 2017 35 mins
    The world is experiencing a ransomware attack like no other. While the wave of infections was spreading from East to West, a kill switch was identified that slowed the campaign considerably. Then another kill switch was needed, then another. Against popular belief, these kill switches are only effective against the original strain of the malware. In this presentation, we will review a variant without a registerable web site kill switch and how to protect against it.

    Join this webinar and ask your most pressing WannaCry questions.

    About the Presenter:
    Mounir Hahad, Ph.D. is Sr Director at Cyphort, a Security Analytics company headquartered in Santa Clara, CA. Mounir is the head of Cyphort Labs, the group responsible for conducting threat research within Cyphort and driving detection enhancements for Cyphort’s Advanced Detection Fabric which uses behavioral analysis along with machine learning to detect advanced threats and correlate those incidents with ingested information from third party solutions. Mounir holds a Ph.D. in computer science from the University of Rennes. Prior to Cyphort, Mounir held various engineering management positions with Cisco’s Security Technology Group and with IronPort Systems.
  • Google Docs Worm - Facts, Resolution & Why This Scam Will Happen Again
    Google Docs Worm - Facts, Resolution & Why This Scam Will Happen Again Travis Smith (Tripwire), Cameron Naghdi (Malwarebytes), Filippo Valsorda (Cloudflare) Recorded: May 19 2017 41 mins
    Attacks like the Google Docs phishing scam that swept across the internet in early May showed a level of sophistication above regular phishing scams. More importantly, it will likely happen to other online services, thanks to a common login mechanism that is used by hundreds of websites.

    Join this panel of security experts as they discuss:
    - The nuts and bolts of the Google Docs worm
    - How it was resolved
    - What to expect in the future
    - How to avoid becoming a victim to phishing scam: What to look out for and what NOT to do

    - Travis Smith, Principal Security Researcher at Tripwire
    - Cameron Naghdi, Sr. Security Engineer at Malwarebytes
    - Filippo Valsorda of the Crypto Team at Cloudflare

Embed in website or blog