For Certified Members and Information Security Professionals Globally
The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker (C|EH), Computer Hacking Forensics Investigator (C|HFI) and EC-Council Certified Security Analyst (E|CSA)/License Penetration Tester (L|PT) programs, and various others offered in over 60 countries around the globe.
Experiments in Deep LearningPatrick Hall, Senior Associate Research Statistician Developer, SASThe human brain makes it look easy. What our eyes see, we decode immediately and effortlessly. But is it that simple? In truth, how we process images is staggeringly complex. Inspired in part by our remarkable neurons, deep learning is a fast-growing area in machine learning research that shows promising breakthroughs in speech, text and image recognition. It’s based on endowing a neural network with many hidden layers, enabling a computer to learn tasks, organize information and find patterns on its own.
Recently, SAS took on a classical problem in machine learning research, the MNIST database, a data set containing thousands of handwritten digit images. Learn how we did – and what it reveals about the future of deep learning.Read more >
The human brain makes it look easy. What our eyes see, we decode immediately and effortlessly. But is it that simple? In truth, how we process images is staggeringly complex. Inspired in part by our remarkable neurons, deep learning is a fast-growing area in machine learning research that shows promising breakthroughs in speech, text and image recognition. It’s based on endowing a neural network with many hidden layers, enabling a computer to learn tasks, organize information and find patterns on its own.
Recently, SAS took on a classical problem in machine learning research, the MNIST database, a data set containing thousands of handwritten digit images. Learn how we did – and what it reveals about the future of deep learning.
This presentation provides key findings from the 2015 Cyberthreat Defense Report from the analyst firm CyberEdge. Based on a survey of IT security decision makers and practitioners across North America and Europe, the report examines the current and planned deployment of security measures, including the use of threat intelligence. It also provides developers of IT security technologies and products with answers they need to better align their solutions with the concerns and requirements of end users.
The need to share content -- securely, collaboratively, immediately -- is critical to your job. You’re working with outside agencies and business partners, sharing documents that contain sensitive data like product designs, ad campaigns and customer data, to name just a few.
According to research from the Ponemon Institute, more than six out of ten people report having accidentally forwarded files to individuals not authorized to see them. It’s time to create some good habits that will allow you to collaborate with internal and external resources and be 100% compliant with the regulations that govern your industry.
Please join us for an interactive presentation about how new habits and tools can make it easy for you to be efficient and compliant, without sacrificing speed or creativity.
The cyber market is an ever-changing industry. So how are insurance carriers currently assessing the risks their insured face? And how are they mitigating those risks?
In this webinar, Ira Scharf, our GM of Insurance, teams up with Advisen Insurance Intelligence to discuss how cyber exposures have grown and changed over the last 20 years, and how the insurance product has evolved to keep pace.
Watch this on-demand webinar to:
learn exactly how the underwriting process has developed over the years,
hear experts discuss the current trends in the industry, and
find out the latest tools carriers are adopting to better assess corporation’s cyber preparedness.
With the sophistication and highly targeted nature of attacks against governments, the adversary can use numerous approaches and actions to get in and move across the network. Palo Alto Networks Threat Intelligence—from the cloud or an on-premises government-run platform—constantly gathers intelligence on evasive applications and converts the intelligence back into all platform devices. This ensures that organizations maintain control of evasive applications to ensure authorized activity traverses the networks while unauthorized activity fails to route.
Join this webinar to Learn:
- How Government Agencies can develop and manage their own threat intelligence cloud on a closed, dedicated Palo Alto Networks WF-500 threat intelligence platform.
- How to create effective threat intelligence private clouds for a singular agency or for a group of Agencies, Ministries or Departments who wish to share their threat intelligence.
- How the threat intelligence cloud (public or private) analyzes and correlates intelligence from all platform security functions—URL Filtering, mobile security, IPS/threat prevention and the virtual execution engine or sandbox, WildFire™— and validated community input.
- How WildFire immediately discovers previously unknown malware and communicates the results to the platform to automatically generate signatures.
- How all threat intelligence is distributed to the network and endpoints to ensure they are protected.
- How this is all done automatically, reducing operational burden and shortening an organization’s response time.
- How this innovative architecture can be operated at a fraction of the cost it takes to deploy and manage an equivalent set of point products – APT, IDS/IPS, URL filtering and more – all correlating insights automatically in real-time for greatest network protection.
Information technology brings many benefits to a business, but it also brings risks. Knowing how to assess and manage those cyber risks is essential for success, a powerful hedge against many of the threats that your business faces, whether you are an established firm or pioneering startup. ESET security researcher Stephen Cobb explains how cyber risk assessment and management can work for you.
Are you giving the adversary unintended access through vulnerabilities in your system?
By only having one method of finding vulnerabilities or one way of mitigating them, the chances of the adversary getting through are increasingly high. This webinar will walk you through the current threat landscape, how vulnerabilities can be found, and how to mitigate control.
In this webinar you'll learn:
- What types of assessments work at which points in the software development lifecycle.
- What is the most popular way to deploy a WAF and why that's not a good idea as a single method of defense.
- Why finding and fixing your vulnerability isn't actually good enough.
The importance of protecting sensitive data is gaining visibility at the C-level and the Boardroom. It’s a difficult task, made even more so by the shortage of security experts. One option that more and more companies are pursuing is the use of managed security services. This can enable them to employ sophisticated technologies and processes to detect security incidents in a cost-effective manner. Should managed security be a component of your security mix?
In this webinar, Ed Ferrara of Forrester and Mark Stevens of Digital Guardian will discuss:
When does it make sense to utilize managed security services
How to the scope the services your company contracts out
Questions to ask when evaluating managed security services providers
The key criteria for selecting managed security providers
Server virtualization is a mature technology. More than 70% of all x86 architecture workloads are running in VMs on top of hypervisors. With the increase in virtualization of mission critical workloads plus clustering and high availability, it’s more challenging than ever to get the visibility and dynamic rule settings for North-South and East-West traffic. In this session, no future hype, learn what is happened today with FortiGate-VMX use cases to secure all of your hypervisors and provide a real-world agility traffic testing using Ixia Breakingpoint for the proof.
Security event management continues to evolve as data breaches put more pressure on detective defenses providing continuous monitoring. Many companies have invested strongly in preventive defenses to stop attacks before they infect. Now the game changes to detecting the unknown and this requires scale and performance of SIEM solutions with increasing context for depth and visibility in the hands of security experts with an analytics mindset. Not everyone can play on this field, learn your options.
Attendees will learn:
- SIEM architecture changes for visibility
- Increasing complexity of data analytics to explore
- SIEM taxonomy and trade-offs between generations
- Analyst recommendations & best practices
- Why resources are key to SIEM success