Hi [[ session.user.profile.firstName ]]

EC-Council | Security Channel

  • Date
  • Rating
  • Views
  • Privileged accounts: the most powerful backdoor used by hackers
    Privileged accounts: the most powerful backdoor used by hackers Grant Burst and Chad Carter Recorded: Apr 27 2017 47 mins
    Privileged accounts can be some of the most serious threats your company can face. As more and more processes are digitalized and activities externalized, the number of accounts accessing critical and strategic information escalates, extending the cyber threat across continents. Meanwhile, companies and individuals are becoming increasingly aware that any data or server can be accessed with the right privileges; it is therefore imperative to know who accesses critical resources, as well as when and why they do so to avoid any leak. By monitoring the users holding the keys to the kingdom - the privileged users, we are able to know what exactly happened on a system at any given time and how. Whether malicious or negligent, incidents caused by internal or external threats can be avoided quickly if visibility over the IS is restored. Session monitoring and recording dissuades malicious or negligent users while offering real-time alerts, traceability, and post-mortem analysis. Discover how some of the most dramatic cyberattacks to date could have been prevented had there been a Privileged Access Management solution in place to protect and secure target systems.
  • How to Build An Advanced Email Security Strategy
    How to Build An Advanced Email Security Strategy Richard Davis, Dir, Cyber Security Strategy and Adenike Cosgrove, Cyber Security Strategy - EMEA, Proofpoint Recorded: Apr 27 2017 46 mins
    You may know that email is a top vector for advanced threats targeting your organisation. But did you know that attackers have evolved their techniques to bypass even your most sophisticated email security tools? Your people, data, and brand reputation are at serious risk.

    Join the Proofpoint for "How to Build an Advanced Email Security Strategy." to learn about:

    • The latest email fraud techniques, including business email compromise (BEC), ransomware, and sandbox-evasion threats.

    •Key steps to building an email security strategy that can adapt to and stop attacks before they reach the inbox.

    • How to respond to and mitigate security risks faster and more reliably at a reduced cost.
  • Reduce time to detect and respond to cyber threats - without adding resources
    Reduce time to detect and respond to cyber threats - without adding resources Chris Martin, LogRhythm Security Expert Recorded: Apr 26 2017 48 mins
    Today’s reality is that organisations will continue to be confronted by increasingly frequent and complex cyber threats. It’s not a matter of if your organisation will be compromised, but when.

    The Threat Lifecycle Management Framework (TLM) is a series of aligned security operations capabilities. It begins with the ability to see broadly and deeply across your IT environment and ends with the ability to quickly mitigate and recover from security incidents. The result? A reduction in your mean time to detect and mean time to respond without adding staff to accomplish the job.

    In this webcast, Chris Martin, LogRhythm security expert, will explain what TLM is and demonstrate how the end-to-end security workflow helps reduce your mean time to detect and respond to cyber threats.

    You’ll learn:

    • The definition and details of the TLM framework
    • How TLM enables you to sort through the noise to highlight and investigate concerning incidents
    • How TLM works to streamline processes through automated workflow
    • Specific use cases TLM can address to prevent major data breaches

    Register now to learn how to enhance your threat detection and response capabilities with LogRhythm and Threat Lifecycle Management (TLM).
  • Next Generation Defense in Depth Model
    Next Generation Defense in Depth Model Tari Schreider, CCISO, Chief Cybersecurity Strategist & Author, Prescriptive Risk Recorded: Apr 25 2017 64 mins
    This session will focus on presenting a next generation defense in depth model and answer the question on many CISO’s minds - is it still relevant? A model of defense in depth will serve as a backdrop to introduce you to a wide range of solutions from across the cybersecurity industrial complex that just may change how you view your defense in depth approach.
  • Is Your Organisation GDPR Ready?
    Is Your Organisation GDPR Ready? Steve Durbin, Managing Director, ISF LTD Recorded: Apr 25 2017 49 mins
    Many organisations are still unclear as to how they will meet the requirements of the EU GDPR legislation which will come into effect in May 2018. Fundamentally organisations need to start preparing for this now.

    In this webinar Steve addresses some of the key questions organisations are asking such as: does the EU GDPR regulation apply to me? how should I prepare for this legislation? and what additional resources do I need?
  • Interview: CTO of Symantec on advanced cybersecurity
    Interview: CTO of Symantec on advanced cybersecurity Darren Thomson, CTO & VP of Technology, Symantec, EMEA & Andrew Bird, EA Visionary, Interview Moderator Recorded: Apr 24 2017 22 mins
    Interview in partnership with BrightTALK, The Stack and Cloud Industry Forum
    ----------
    BrightTALK caught up with Darren Thomson, CTO & VP of Technology, Symantec, for an in-depth conversation on the future of cybersecurity in the context of IoT, AI and Machine Learning.

    Among topics discussed:

    - Trending business vulnerabilities in 2017
    - Particularities of pentesting
    - How to prepare for GDPR in 2018
    - Implications of IoT, AI & machine learning on cyber security
    - Yahoo breach
    - Brexit and cybersecurity
    - Recommendations to CISO's developing security strategies

    About the speaker:
    Darren is an industry recognised IT innovator and strategist, with +20 years of industry experience. He is a published author. His latest work has recently been published by Wiley Co. and is entitled, “Delivering Utility Computing: Business Driven IT Optimisation”. Details can be found at www.amazon.com.
  • Human Factor Podcast : Stuart Coulson
    Human Factor Podcast : Stuart Coulson Jenny Radcliffe Recorded: Apr 21 2017 54 mins
    In this episode, I am delighted to talk to Stuart Coulson.

    Stuart has been involved in the information security industry for many years and has extensive experience and expertise of working with major corporations and assisting them with relevant online protection plans and security solutions.

    His current role at the Challenge sees him working with organisations to complement their existing strategies to fill the cyber skills gap.
  • Human Factor Podcast : Dr Daniel Dresner
    Human Factor Podcast : Dr Daniel Dresner Jenny Radcliffe Recorded: Apr 21 2017 44 mins
    In this episode, I am delighted to chat to Dr. Daniel Dresner. Daniel’s LinkedIn profile tells us he is a consulting research analyst and lecturer. His mission is to find the threads that bind information together and mend them when they break. He contributed material to the Cyber Essentials and worked with a colleague to define the only real benchmark of cyber security. Being a proud father and grandfather motivated him to define ‘The Green Surf Code’.
  • Human Factor Podcast : Graham Cluley
    Human Factor Podcast : Graham Cluley Jenny Radcliffe Recorded: Apr 21 2017 35 mins
    In this episode, I was delighted to be joined by Graham Cluley. Graham Cluley is a security blogger, researcher and public speaker. He has been a well-known figure in the computer security industry since the early 1990s when he wrote the first ever version of Dr Solomon's Anti-Virus Toolkit for Windows.
  • Zero-Day Attacks and What To Do About It
    Zero-Day Attacks and What To Do About It Chris Candaffio System Engineer, Symantec and Q&A with Robert Arandjelovic & Gavin Fulton Recorded: Apr 20 2017 35 mins
    Vulnerabilities exist in all applications—and today’s sophisticated attackers will find them. Every day an exploit remains unpatched, your risk of a data breach increases dramatically. Only a multi-layered approach that fully integrates with your IT defense stands a chance of stopping them, but where to begin?

    By registering, you’ll gain valuable insights into:

    Which techniques effectively block zero-day attacks.
    Why robust endpoint protection plays such a critical component.
    How Symantec Endpoint Protection 14’s Memory Exploit Mitigation shuts down vulnerability attacks, even against unknown threats.

Embed in website or blog