Hi [[ session.user.profile.firstName ]]

EC-Council | Security Channel

  • Date
  • Rating
  • Views
  • The Internet of Things – Good, Bad or just plain Ugly? The Internet of Things – Good, Bad or just plain Ugly? Patrick Grillo, Senior Director, Security Solutions, Fortinet Recorded: May 26 2016 28 mins
    IoT is everywhere these days and like most new and shiny things our attention is focused on its coolness factor.

    However, behind that pleasing and shining exterior lurks a potentially devastating menace. In the rush to bring product to market, very few if any manufacturers are security conscious, and as more and more of these products are deployed in the enterprise, the risk of a successful network breach increases exponentially.

    This session will focus on the potential dangers with IoT and look at the question of how and why IoT security is different from traditional IT security.
  • Security, Privacy and Risk in a Mobile World Security, Privacy and Risk in a Mobile World Sushila Nair, Managing Director, Cybernetics, CISA, CISSP, CISM, CRISC Recorded: May 25 2016 39 mins
    The discussion on privacy and security of mobile devices has become an explosive topic. With the Snowden revelations leading the way and mobile vulnerabilities like Stagefright and XcodeGhost following behind, the question of is it necessary or even possible to secure voice and data on mobile devices remain the subject of hot debate. With the focus of attackers shifting to these devices, organizations need to be ready to protect their employees and themselves.

    This seminar examines the security risks associated with mobile computing devices and infrastructures, and suggested controls for mitigating those risks. It examines the key guidelines from NIST and other organizations and the best practices for mobile security.
  • Dynamic Analysis of Android Apps - Attacking Android Apps from the Inside Dynamic Analysis of Android Apps - Attacking Android Apps from the Inside Erez Metula, Founder, AppSec Labs Recorded: May 25 2016 48 mins
    Dynamic analysis of android apps is all about analyzing apps in real time, for the purpose of detecting application level vulnerabilities and for the sake of manipulating applications while they execute. It is often used as a last resort due to its complexity, when other pentesting techniques mainly focused on static analysis are not enough. Common usages of dynamic analysis are extraction of sensitive data from application memory variables, stealing encryption keys, manipulating signature mechanisms and so on.

    During this talk we will focus on memory dumps, remote debugging, small debugging, native debugging, usage of ReFrameworker platform and other interesting things.

    This talk is based on a similar chapter as part of the Android application hacking course given by the speaker at recent BlackHat USA 2015
  • Secure Mobility: How to Best Protect Your Data Secure Mobility: How to Best Protect Your Data Florian Malecki, Dell SonicWALL & Amar Singh, Founder and CEO, Cyber Management Alliance Recorded: May 24 2016 57 mins
    Today's workforce is mobile, with employees demanding access to more resources from more remote devices and platforms than ever before. Global networks connect employees, partners and customers over multiple Internet, intranets and VoIP channels. Even the smallest organization is now competing globally. IT organizations are struggling to keep up with mobile worker demand for access to more resources from more device types without compromising security and data.

    Join this panel discussion where info security leaders Florian Malecki and Amar Singh will be covering how you can get ahead of the next wave of mobile access and security challenges.
  • Social Engineering: Is that a Pwn Plug in Your Pocket? Social Engineering: Is that a Pwn Plug in Your Pocket? Peter Wood Recorded: May 24 2016 44 mins
    Most organisations are surprised by the ease with which social engineering defeats their security. The human factor provides a simple and effective route to bypass even the best hardware and software security controls, yet is commonly overlooked or considered too difficult to solve. Peter will share a number of real examples to reinforce his opinion: as more and more data breaches are published, perhaps it’s time to become creative and strengthen the human firewall.
  • Corporate Governance for CISOs: Business Continuity Management Corporate Governance for CISOs: Business Continuity Management Keyaan Williams, Senior Executive, C|CISO Programs at EC-Council Recorded: May 17 2016 55 mins
    Join Keyaan Williams, Senior Executive, C|CISO Programs at EC-Council for his Corporate Governance for CISOs webinar series! The third webinar in the series will cover the topic of Business Continuity Management from an executive perspective. This session focuses on the most important concerns related to business continuity management. CISO isn’t always the leader of an organization’s business resilience efforts, but the CISO offers significant influence to ensure an effective program that support business impact analysis, business continuity planning, and disaster recovery for an organization’s critical information assets.
  • How do vulnerabilities get into software? How do vulnerabilities get into software? Laurie Mercer, Solutions Architect, Veracode Recorded: May 17 2016 44 mins
    Research reveals that 63% of internally developed applications are initially out of compliance with OWASP Top 10 standards. Join this webinar to learn how vulnerabilities end up in your software.
  • Securing ICS/SCADA Networks Securing ICS/SCADA Networks Ronen Shpirer, Security Solutions Architect, Fortinet Recorded: May 17 2016 48 mins
    Automation is at the base of many industries and Supervisory Control And Data Acquisition (SCADA) is the base architecture enabling interactive automation of the industrial environment. The industrial environment has been going through rapid innovation, moving from isolated legacy systems to IP based, interconnected systems. In recent years, the Industrial Control Systems (ICS) upon which much of our critical infrastructure and manufacturing industry depends, have come under increasingly frequent and sophisticated cyber-attacks.

    Join Fortinet to learn more about the ICS/SCADA specific environment, its security challenges and Fortinet’s unique solutions for the industrial environment.
  • Defending Against Cyberthreats: Are You Keeping Up? Defending Against Cyberthreats: Are You Keeping Up? Steve Piper, Co-founder and CEO of CyberEdge Group, Mike Reagan, CMO of LogRhythm Recorded: May 12 2016 60 mins
    An Analysis of CyberEdge's 2016 Cyberthreat Defense Report

    Despite record security spending, successful cyberattacks are on the rise. Seventy-six percent of organizations around the globe were compromised by a successful cyber attack in in 2015—up from 62% in 2014.

    Savvy IT professionals know that it’s no longer a question of if their network will become compromised, but when. Smart CIOs and CISOs must strike a balance between threat prevention and detection investments, as both are critical in the fight against today’s sophisticated threats.

    Steve Piper, CEO of the information security research firm CyberEdge Group, is joined by Mike Reagan, CMO of LogRhythm, to share the findings of the 2016 Cyberthreat Defense Report.

    This webinar will reveal the current security posture of today’s organizations, gauge perceptions about cyberthreats, and disclose future plans for improving security and reducing risk.

    You’ll discover:

    • Deep insights into how IT security professionals perceive cyberthreats
    • What they’re doing to defend against threats
    • How security information and event management (SIEM) can be implemented within an organization to increase confidence and decrease the time it takes to detect and respond to cyberthreats

    See how you compare. Register now for a 360-degree view of the threats, response plans, processes and investments that organizations are making in 2016.
  • The Eye of The Security Cyberstorm The Eye of The Security Cyberstorm Chris Olive, Vormetric & Kevin Jackson, FireEye Recorded: May 11 2016 50 mins
    It doesn’t matter what industry vertical you are in or how big or small your business is, we are all plagued by the same concern, the security of your most valuable asset – your data. Moreover, the threat is sometimes the ones that you trust most, namely people that have access to your privileged information and data. This insider threat can be your customers, partners and even your employees that accidentally or purposefully release or acquire sensitive data and use it for something other than what it was meant for.

    Just imagine if you had a complete and panoramic scene sizeup along with the ability to proactively address potential threats of both the traditional threat vector of outsiders gaining information as well as the increasingly common and dangerous internal threat. Join us as we discuss this important topic as well as how you can ensure that your organization does not find itself in the eye of the security cyberstorm..

Embed in website or blog