Increasing expectations for good governance, effective risk management and complex demands for legislative and regulatory compliance are presenting a growing challenge for organizations of all sizes. Tune in to live and recorded presentations by respected luminaries in the fields of governance, risk and compliance. Their thought leadership will provide you with practical advice on how to implement successful GRC strategies and processes for your organization.
2014 Top IT Security TrendsFlorian Malecki, EMEA Product & Solution Marketing Director, Dell Software – SecurityIT networks are staged for massive changes in 2014. With users and endpoint devices proliferating and with threats to systems and data becoming more sophisticated and pervasive, organizations of all sizes must be prepared for what lies ahead.
Attend our “Top Trends Driving IT Security in 2014” webinar to find out what these trends mean for your IT network, and what you can do to stay ahead of the game.
•What kinds of attacks to expect from a new generation of exploits
•How botnet operators now cloak their command and control operations
•What types of organizations and platforms will be targeted by ransomware
•Why Near Field Communication capabilities open the door to new exploits
Why traditional security is no longer effective against new, sophisticated threatsRead more >
Data Encryption has been spoken about for years, but finally ENCRYPTION importance has come front-page. From the recent Snowden NSA Affair to major data breaches at Target, companies now have no choice but to consider securing their data at the source.
This presentation will introduce you to your responsibilities in providing your customers with the Due Diligence (Risk Control and Executive Management Oversight) and Due Care (Continuous Monitoring through Security Practices, Procedures, Policies, Processes and Standards) that their personal data deserves.
Advance Persistent Threats (APT) use unexpected, multiple, time limited and diverse attack vectors. Experience, knowledge and skills all play a powerful role in shaping effective security intervention decisions but without robust understanding of your context, actual network traffic and content you are left relying on making an informed guess which may or not prove to be correct.
When APT security issues occur network security operations professionals are instantly under pressure from their organization to explain and resolve the problems swiftly. So how fast can you react to a suspected APT security anomaly? And even more importantly, are you giving yourself the best chance of success when you act by ensuring that your actions are informed, appropriate and effective?
The capture and examination of network traffic before, during and after an event of interest can provide you the clarity and understanding to make a truly informed intervention and increase your likelihood of an effective outcome. Approaches to capture, indexing, search and recall of captured traffic can vary in cost and complexity, ranging from simple open source software tools to high performance, high fidelity Intelligent Network Recording solutions capable of operating at sustained link bandwidths up to 100 Gigabits per second.
Join James Barrett, Technical Director of Endace in this session for network security operations professionals where he’ll show you how to derive insight and certainty of what’s occurring by using network packet inspection and visualization techniques.
Whilst not every organisation may be a target of an APT or targeted attack, it’s important that all companies large or small understand these attacks as a way to help build stronger defences against the constantly changing threat landscape.
· Symantec blocked a total of over 5.5 billion malware attacks in 2011, an 81% increase over 2010.
· In 2012 the number of Web based attacks increased by 1/3 with approximately 247,350 Web-based attacks were blocked each day.
· 5291 New Vulnerabilities were discovered in 2012
· Spam accounts for 69% of all email and one in 414 emails are from phishers
All security and IT professional need to understand the new reality classic textbook protections may well not be enough. Join Symantec Website Security solutions to understand how you can protect your websites from vulnerabilities and malware and how SSL can prevent your company and your customers.
BAYAS (Swahili word for 'badness' aka. malware of any kind, shape or form) continue to grow in number as script kiddies, hacktivists, organised crime and nation-state actors use them to deface websites, steal money, engage on cyber-warfare or "simply" to disrupt large businesses or nation-critical infrastructure.
However, malicious software don't exist in a vacuum; any piece of malware is designed to call-back home sooner or later: to download additional malware, to report back to a C&C server or to exfiltrate data. How can Incident Responders detect hidden malware on the network using open-source tools and what patterns do they need to look for? In my webinar, I will share lessons learnt from practical traffic analysis in the field (i.e. predominate communication protocols, current trends, etc.) and present some effective techniques used to filter suspicious connections and investigate network data for traces of malware using tools like Wireshark, Snort and Bro.
About the speaker:
Ismael Valenzuela 13 years years experience in IT security and currently works as Principal Architect at McAfee Foundstone Services in EMEA. Author of security articles for Hakin9, INSECURE Magazine and the SANS Forensics Blog, Ismael also has experience teaching at BlackHat, serves on the GIAC Advisory Board and is a Community SANS Instructor for the Computer Forensics and Intrusion Detection tracks.
He holds a bachelor's degree in computer science from the University of Malaga (Spain), is certified in Business Administration, and holds several professional certifications including. He is Lead Auditor from Bureau Veritas UK.
Some of his articles are freely available at http://blog.ismaelvalenzuela.com.
Mr. Valenzuela can be followed on twitter at @aboutsecurity
While threat intelligence promises to help with the effective detection of advanced threats, it usually achieves the opposite: detecting the most predictable attackers. To be included as part of a vendor provided threat intelligence feed, an attacker must have tried attacking several potential victims before, and must have used the exact same method to be captured in the threat intelligence feed.
In this presentation we will see how to make threat intelligence valuable for detecting advanced targeted threats directly aimed at your organization. We will see how to create a threat intelligence feed close to the target, as a shared effort between departments, subsidiaries or organizations working closely together to ensure identification of targeted threats. In addition we will see how to extend the term intelligence into additional detection mechanisms such as behavioral patterns.
Drawing on data gathered from nearly 40,000 unique cyber attacks (more than 100 per day) and over 22 million malware command and control (CnC) communications, the Advanced Threat Report provides a global look into cyber attacks that routinely bypass traditional defenses such as firewalls, next-generation firewalls, IPS, antivirus and security gateways.
Join FireEye's Greg Day, VP & CTO for EMEA, for an overview of the current threat landscape, evolving advanced persistent threat (APT) tactics, and the countries where advanced attacks are most prevalent today. In addition, Greg will look at trends taking place in specific industries.
This panel session moderated by Jarad Carleton of Frost and Sullivan will bring together industry experts from the likes of Lacoon, Skycure and Lookout. Our panelists will discuss the greatest challenges mobile security poses to the enterprise and share their insights and best practices to keeping organizations secure.
ESET security researcher Lysa Myers reports on developments in healthcare IT system security that she observed attending the recent HIMSS conference in Orlando. Find out what is being done to better protect patient data privacy.
The increasing awareness of the APT threat landscape has encouraged more customers to leverage technologies based on a virtual execution environment to detect threats that evade traditional defenses. This significantly increases the difficulty for an adversary to penetrate an organization’s network. Does this mean that the adversary can no longer succeed? The reality is – the adversaries rapidly evolve and adapt.
Join our webinar, The Great APT Chase presented by Mr RongHwa Chong, Malware Researcher in FireEye Asia. He will share on how the attacker evolves through exploiting more zero-day vulnerabilities, leveraging new techniques and on the various file formats. to evade heightened defenses. It is a session for both technical and business professionals interested in the latest in advanced threats.
1. Solving A Jurassic Problem
2. How Cyber Threats Evolves
3. To Chase Or Be Chased
4. Questions & Answers
In this webinar, Ron answers the question, "how do we provide for the common defense in the digital age?" With continuous advances in technology, this question can pose a big problem for organizations developing or modifying a security strategy.
Join Ron as he covers the basics of defense against the most problematic vulnerabilities, the tools at your disposal to fight them, and a T.A.C.I.T security strategy that you can implement today in your organization.