Hi [[ session.user.profile.firstName ]]

Information Security Community

  • Date
  • Rating
  • Views
  • The Internet of Things – Good, Bad or just plain Ugly? The Internet of Things – Good, Bad or just plain Ugly? Patrick Grillo, Senior Director, Security Solutions, Fortinet Recorded: May 26 2016 28 mins
    IoT is everywhere these days and like most new and shiny things our attention is focused on its coolness factor.

    However, behind that pleasing and shining exterior lurks a potentially devastating menace. In the rush to bring product to market, very few if any manufacturers are security conscious, and as more and more of these products are deployed in the enterprise, the risk of a successful network breach increases exponentially.

    This session will focus on the potential dangers with IoT and look at the question of how and why IoT security is different from traditional IT security.
  • Digital Content & The Legality of Web Scraping Digital Content & The Legality of Web Scraping Jonathan Bailey, Rami Essaid, Katie Sunstrom, Orion Cassetto Recorded: May 25 2016 52 mins
    Web scraping - the process of using bots to systematically lift content from a website - is either loved or hated. Startups love it because it’s a cheap and powerful way to gather data without the need for partnerships. Large companies use web scraping to gain competitive intelligence, but try to block others from doing the same. However, new legislation and high profile court cases have called into question the legality of web scraping.

    In this lively conversation, diverse panelists will discuss the origin of web scraping, the changing legal landscape, and the legal and technical best practices for protecting your website content.
  • Security, Privacy and Risk in a Mobile World Security, Privacy and Risk in a Mobile World Sushila Nair, Managing Director, Cybernetics, CISA, CISSP, CISM, CRISC Recorded: May 25 2016 39 mins
    The discussion on privacy and security of mobile devices has become an explosive topic. With the Snowden revelations leading the way and mobile vulnerabilities like Stagefright and XcodeGhost following behind, the question of is it necessary or even possible to secure voice and data on mobile devices remain the subject of hot debate. With the focus of attackers shifting to these devices, organizations need to be ready to protect their employees and themselves.

    This seminar examines the security risks associated with mobile computing devices and infrastructures, and suggested controls for mitigating those risks. It examines the key guidelines from NIST and other organizations and the best practices for mobile security.
  • Dynamic Analysis of Android Apps - Attacking Android Apps from the Inside Dynamic Analysis of Android Apps - Attacking Android Apps from the Inside Erez Metula, Founder, AppSec Labs Recorded: May 25 2016 48 mins
    Dynamic analysis of android apps is all about analyzing apps in real time, for the purpose of detecting application level vulnerabilities and for the sake of manipulating applications while they execute. It is often used as a last resort due to its complexity, when other pentesting techniques mainly focused on static analysis are not enough. Common usages of dynamic analysis are extraction of sensitive data from application memory variables, stealing encryption keys, manipulating signature mechanisms and so on.

    During this talk we will focus on memory dumps, remote debugging, small debugging, native debugging, usage of ReFrameworker platform and other interesting things.

    This talk is based on a similar chapter as part of the Android application hacking course given by the speaker at recent BlackHat USA 2015
  • Secure Mobility: How to Best Protect Your Data Secure Mobility: How to Best Protect Your Data Florian Malecki, Dell SonicWALL & Amar Singh, Founder and CEO, Cyber Management Alliance Recorded: May 24 2016 57 mins
    Today's workforce is mobile, with employees demanding access to more resources from more remote devices and platforms than ever before. Global networks connect employees, partners and customers over multiple Internet, intranets and VoIP channels. Even the smallest organization is now competing globally. IT organizations are struggling to keep up with mobile worker demand for access to more resources from more device types without compromising security and data.

    Join this panel discussion where info security leaders Florian Malecki and Amar Singh will be covering how you can get ahead of the next wave of mobile access and security challenges.
  • Social Engineering: Is that a Pwn Plug in Your Pocket? Social Engineering: Is that a Pwn Plug in Your Pocket? Peter Wood Recorded: May 24 2016 44 mins
    Most organisations are surprised by the ease with which social engineering defeats their security. The human factor provides a simple and effective route to bypass even the best hardware and software security controls, yet is commonly overlooked or considered too difficult to solve. Peter will share a number of real examples to reinforce his opinion: as more and more data breaches are published, perhaps it’s time to become creative and strengthen the human firewall.
  • The State of Cloud Security: 2016 Survey Results The State of Cloud Security: 2016 Survey Results Holger Schulze (Infosec Community), Ram Krishnan (Chief Product Officer, CloudPassage) Recorded: May 18 2016 48 mins
    For the second year in a row, a comprehensive survey was conducted with the 300,000 members of the LinkedIn Information Security Community on the state of cloud security. This year’s survey results delve into many issues including: Are attitudes towards perceived security risks changing? Are organizations migrating to the cloud at the pace they suspected they would? How are technologies helping or hindering cloud adoption?... and more.

    Join Holger Schulze, Founder of the LinkedIn Information Security Community and Ram Krishnan, Chief Product Officer at CloudPassage on this informative web seminar to:

    • Learn how your peers’ strategies for securing cloud infrastructure have evolved in the last year

    • Gain valuable insights on how your organization compares to others in the industry

    • Find out what the top trends and priorities are for cloud security in 2016 and beyond
  • How do vulnerabilities get into software? How do vulnerabilities get into software? Laurie Mercer, Solutions Architect, Veracode Recorded: May 17 2016 44 mins
    Research reveals that 63% of internally developed applications are initially out of compliance with OWASP Top 10 standards. Join this webinar to learn how vulnerabilities end up in your software.
  • Securing ICS/SCADA Networks Securing ICS/SCADA Networks Ronen Shpirer, Security Solutions Architect, Fortinet Recorded: May 17 2016 48 mins
    Automation is at the base of many industries and Supervisory Control And Data Acquisition (SCADA) is the base architecture enabling interactive automation of the industrial environment. The industrial environment has been going through rapid innovation, moving from isolated legacy systems to IP based, interconnected systems. In recent years, the Industrial Control Systems (ICS) upon which much of our critical infrastructure and manufacturing industry depends, have come under increasingly frequent and sophisticated cyber-attacks.

    Join Fortinet to learn more about the ICS/SCADA specific environment, its security challenges and Fortinet’s unique solutions for the industrial environment.
  • Defending Against Cyberthreats: Are You Keeping Up? Defending Against Cyberthreats: Are You Keeping Up? Steve Piper, Co-founder and CEO of CyberEdge Group, Mike Reagan, CMO of LogRhythm Recorded: May 12 2016 60 mins
    An Analysis of CyberEdge's 2016 Cyberthreat Defense Report

    Despite record security spending, successful cyberattacks are on the rise. Seventy-six percent of organizations around the globe were compromised by a successful cyber attack in in 2015—up from 62% in 2014.

    Savvy IT professionals know that it’s no longer a question of if their network will become compromised, but when. Smart CIOs and CISOs must strike a balance between threat prevention and detection investments, as both are critical in the fight against today’s sophisticated threats.

    Steve Piper, CEO of the information security research firm CyberEdge Group, is joined by Mike Reagan, CMO of LogRhythm, to share the findings of the 2016 Cyberthreat Defense Report.

    This webinar will reveal the current security posture of today’s organizations, gauge perceptions about cyberthreats, and disclose future plans for improving security and reducing risk.

    You’ll discover:

    • Deep insights into how IT security professionals perceive cyberthreats
    • What they’re doing to defend against threats
    • How security information and event management (SIEM) can be implemented within an organization to increase confidence and decrease the time it takes to detect and respond to cyberthreats

    See how you compare. Register now for a 360-degree view of the threats, response plans, processes and investments that organizations are making in 2016.

Embed in website or blog