Living in a State of Cyber Insecurity - Advanced Targeted Attacks

Manage webcast
Aaron Sheridan, Sr. Systems Security Engineer
With the APT attacks in 2011, we have seen cyber criminals penetrate networks seemingly at will. This has been possible because of zero-day, targeted APT attacks utilizing sophisticated malware that infiltrates over multiple stages and multiple vectors like Web and Email.

In this webcast Aaron will discuss the cycle of cyber insecurity and provide key criteria as security professionals investigate next-generation threat protection, including:

1. Real-time defenses beyond signatures
2. Dynamic analysis of all phases of the attack lifecycle
3. Inbound and outbound filtering across protocols
4. Accurate, low false positive rates
5. Global intelligence to protect the local network
Mar 14 2012
33 mins
Living in a State of Cyber Insecurity - Advanced Targeted Attacks
More from this community:

IT Security

  • Live 1 and recorded (5953)
  • Upcoming (128)
  • Date
  • Rating
  • Views
  • Channel
  • Channel profile
  • Insider threats - How to fight vulnerability from within the company Jul 28 2015 3:00 pm UTC 45 mins
    Niels von der Hude , Director of Market Development, Beta Systems Software
    Recent studies have shown that 50-70% of all attacks on information security are coming from within the organization, and often the length of time that the breach existed is unknown. There are many issues involved in closing the gaps that cause such insider incidents and strengthen the protection of data. Using the "need to know" principal, organizations can limit who has access to data. Controls that adjust given access rights to actual needs exist and should be utilized. This session will focus on how to adjust data access rights, implementing the "least privilege principal", and the use of detective and proactive risk-oriented controls.
  • Security Lessons Learned from Target, Niemen Marcus, Sony and Other Breaches Jul 28 2015 3:00 pm UTC 105 mins
    Randy Franklin Smith: Windows Security Subject Matter Expert; Erick Ingleby: Product Manager, LogRhythm, Inc.
    With major data breaches on the rise, it’s hard to deny that they've become a common occurrence in the security threat landscape. Large companies such as Target, Nieman Marcus and Sony (among others), have suffered major data breaches in the past year.

    As security professional, it is important to understand why and how these organizations were breached so you can learn from what was done right, what worked and what didn’t.

    In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, will discuss lessons learned from recent breaches. By analyzing the available information about recent data breach incidents from the perspective of detection, Smith and Ingleby have assembled a list of security monitoring lessons and ideas.

    You’ll get tips on how to eliminate double false positives, a number of generalized monitoring scenarios and guidelines on how to monitor for new executables running for the first time on your environment.
  • Don't get hooked: How to protect against SpearPhishing Jul 28 2015 2:00 pm UTC 45 mins
    Michelle Couture, Product Marketing Manager, hosted Exchange
    Fully secure your network by learning how to protect against cybersecurity’s weakest link: humans. 95% of all attacks on networks were the result of “spear phishing”: attempts to steal data by masquerading as a trustworthy entity. They send an email from the “CEO” or “building manager" but once you click… it’s GAME OVER!
    We will cover:
    •How a phishing attack happens
    •Stories from real life attacks and the lessons learned from them
    •Steps you can take to protect your company
  • Planning Assumptions: What are they and why do we need them? Recorded: Jul 23 2015 19 mins
    Molly Latham, Consultant
    Realistic planning assumptions are an important element in a business continuity program. Why? They enable the planning team to identify the parameters they’re expecting to encounter following a disaster. They aren’t “pie-in-the-sky” wish lists but rather they’re the planner’s best guess about the conditions that will exist. Smart assumptions are usually unfavorable conditions, such as the lack of electric power or the unavailability of key people. Not-so-smart planning assumptions rely on best-case conditions that are probably not realistic.
  • Transforming email security: Building a strategic plan for CISOs Recorded: Jul 23 2015 58 mins
    Jim Routh, CISO, Aetna and Chris McClean, VP of Research, Forrester
    The role of the CISO is evolving - and fast. CISOs today must find innovative ways to align with the business and strategize security as a top business asset -- and those that ascend in their role will have the opportunity to play a bigger, more influential role in the years to come. In this webinar hosted by Agari, you will hear Jim Routh, Aetna CISO share real world insights into specific challenges and solutions to approach today's evolving email threats as well as key 2018 CISO research from Chris McClean, Forrester VP of Research.
  • System Dynamics of the 0day Market Recorded: Jul 23 2015 31 mins
    Katie Moussouris, Chief Policy Officer, HackerOne
    When a popular product is launched, a high-stakes race begins between the offense and defense markets to find software vulnerabilities. More and more organizations are seeing that incenting security research with programs like bug bounties are an effective way to find vulnerabilities. Katie Moussouris, Chief Policy Officer of HackerOne, will reveal what the latest research shows and what it means for companies today.

    About the presenter:

    Katie Moussouris is the Chief Policy Officer for HackerOne, a platform provider for coordinated vulnerability response & structured bounty programs. She is a noted authority on vuln disclosure & advises lawmakers, customers, & researchers to legitimize & promote security research & help make the internet safer for everyone. Katie's earlier Microsoft work encompassed industry leading initiatives such as Microsoft's bounty programs & Microsoft Vulnerability Research. She is also a subject matter expert for the US National Body of the International Standards Organization (ISO) in vuln disclosure (29147), vuln handling processes (30111), and secure development (27034). Katie is a visiting scholar with MIT Sloan School, doing research on the vulnerability economy and exploit market. She is a New America Foundation Fellow. Katie is an ex-hacker, ex-Linux developer, and persistent disruptor. Follow her and HackerOne on Twitter and
  • Stopping Zero-day Threats Recorded: Jul 23 2015 56 mins
    Dan Maier, Senior Director of Product Marketing, Zscaler Inc.
    If Anthem, Sony, Home Depot, Target and Neiman Marcus can fall victim to security breaches, so can you. The bad news is - no company is immune, no matter how big or small you are. Without a proper understanding of zero-day threats, companies have no way of exposing the gaps of overhyped security solutions. These threats are very sophisticated and often leveraging previously unknown attack techniques and vulnerabilities.

    Join us for a compelling webcast that will highlight critical insights combating zero-day threats - including the ability to:

    • Track employee traffic at all times, in real time, irrespective of whether they are inside or outside the corporate network
    • Derive intelligent insights and meaningful data for fast corrective action
    • Avoid a strategy based on "alerting" you about infections - without any guarantees you will notice them
    • Implement a comprehensive approach to stopping zero-day threats - based on protection, (inspecting every byte of traffic and automatically blocking threats), detection and remediation
  • 2015 Stats Report Explained, Where Flow Charts Don't Go Recorded: Jul 22 2015 42 mins
    Jeremiah Grossman, Founder WhiteHat Security
    In this insightful and data-rich webinar Jeremiah Grossman, founder of WhiteHat Security, presents findings from WhiteHat's 2015 Website Security Statistics Report.

    The report, generated by examining vulns in more than 30,000 websites under WhiteHat’s Sentinel management, provides unique perspectives on the state of website security. Data by industry will be presented and accompanied by expert analysis and recommendations.

    Why Attend:

    -Discover the most prevalent vulnerabilities

    -Learn how many vulnerabilities are typically remediated and the average time to resolve

    -Hear why the best approach is to identify specific security metrics to improve upon

    -Take away valuable recommendations for measurable improvement within your application security programs
  • The Hacking Team Hack: Lessons Learned for Enterprise Security Recorded: Jul 22 2015 57 mins
    Stephen Cobb, Sr. Security Researcher
    Your company can learn valuable lessons about risk strategy and incident response from what happened to Hacking Team, a firm that supplies surveillance tools to government agencies. Widely accused of helping governments spy on dissidents and journalists, Hacking Team found itself hacked with embarrassing, possibly damaging results. ESET senior security researcher Stephen Cobb explains the missteps made and the lessons to be learned during this webinar.

    Key takeaways:
    •How Hacking Team’s mistakes mirrored those made by Sony
    •How employees’ weak passwords helped facilitate the breach
    •How transparency would have helped Hacking Team’s credibility
    •Why every company must review what might be exposed in a breach
  • 10 Audit Trail Tips for Better Data Security Recorded: Jul 22 2015 39 mins
    Mike Sanders, Principal SE and Team Lead, Imperva
    Database servers are the primary targets of most data security breaches. Understanding how to effectively monitor databases can prevent data loss and significantly reduce the time to discover the risk.

    Attend this webinar and learn how to:
    - Detect and block active attacks
    - Discover sensitive data, risks, and vulnerabilities
    - Automate risk remediation
    - Demonstrate consistent and complete compliance
  • Neverquest – A Case Study Recorded: Jul 22 2015 55 mins
    Sam Curry CTO& CSO, Arbor Networks and Kirk Soluk, ASERT Threat Intelligence and Response Team
    Let's talk about Neverquest - the global malware campaign targeting businesses around the world!

    Join Sam Curry, Arbor's Chief Technology & Security Officer, and Kirk Soluk of Arbor’s Security Engineering & Response Team, for an insightful discussion on the economics of cybercrime, a detailed analysis of the Neverquest malware family, as well as insight into Arbor’s reversing techniques that unravel and monitor this stealthy and rapidly evolving malware.

    Join this webcast to learn:

    -What motivates the attackers?
    - Why Neverquest is such a potent and persistent malware family
    -How ASERT'S research continues serves as a leading source of information on emerging threats, malware families and global cyber attacks
  • Legal Requirements in Third Party Cyber Risk Management Recorded: Jul 22 2015 49 mins
    Jake Olcott, VP of Business Development, BitSight
    In recent years, third party cyber risk management has become increasingly challenging as businesses become interconnected. Major breaches caused by insecure third parties have raised public awareness of the problem. New legal requirements are shaping the way that organizations build and monitor their third party cyber risk management programs.
    Join Jake Olcott, VP of Business Development at BitSight, Lisa Sotto, Partner at Hunton & Williams LLP, and Robert Metzger, Shareholder at Rogers Joseph O'Donnell as they discuss some of the legal precedents and requirements in this emerging field.

    Attendees will learn about:

    - Existing and evolving legal obligations to manage the cyber risk of third parties and vendors in industries like retail, healthcare, defense, and finance.
    - Issues that lawyers face in helping organizations manage third party cyber risk, including negotiating contract requirements for breach notification, assessing written questionnaires, and performing on-site vendor risk assessments.
    - Emerging "standards of care" for third party cyber risk management.
  • Creating a Culture of Continuity: Business Continuity Planning & Risk Management Recorded: Jul 22 2015 49 mins
    Eric Kretz, Director, Continuity of Operations (COOP) Division, National Continuity Programs (NCP)
    Continuity planning is simply the good business practice of ensuring the execution of essential functions through all circumstances, and it is a fundamental responsibility of public institutions and private entities responsible to their stakeholders. Continuity planning should not be a separate and compartmentalized function performed by independent cells of a few planners in each organization. Organizations must fully integrate continuity into all aspects of an organization’s daily operations, thus creating a “culture of continuity.”

    The COOP presentation will:

    1. Provide an understanding of Continuity Planning and Risk Management,
    2. Explain the importance of a viable Continuity capability,
    3. Emphasize the need for a viable Continuity capability in all organizations that enable organizations to continue their essential functions across a broad spectrum of emergencies.

    In addition to providing an overview of Continuity of Operations, the COOP presentation will also:

     Educate Federal, State, territorial, tribal, local government jurisdictions, private sector organizations, and emergency management practitioners on the importance of integrating Continuity into daily operations, functions, plans, and mission areas.
     Emphasize the Federal Government’s Policy requiring Federal agencies to be prepared for unpredictable threats such as earthquakes, accidents, sabotage, and terrorism. 
     Discuss the importance for State, territorial, tribal, local government jurisdictions, private sector organizations to be prepared for unpredictable disruption of business operations. 
     Provide States, territories, tribes, local government jurisdictions, private sector organizations, and businesses with assistance, guidance, knowledge, networking, resources, and tools needed to succeed.
  • Defining The Role of Cloud in Your Data Protection Business Continuity Plan Recorded: Jul 21 2015 58 mins
    Jon Toigo
    Join us and business continuity expert, Jon Toigo for a practical discussion on effectively leveraging cloud services for your data protection and backup strategies. Toigo, the prolific author of thousands of articles and 17 tech-related books, emphasizes local storage of critical data combined with a low cost, off-site storage option that includes cloud storage.

    You’ll also see ways to easily connect your data protection efforts to leading cloud services, such as Amazon Web Services’ Storage Gateway and low-cost S3 services.
  • Why Application Whitelisting is Essential for Advanced Threat Defense Recorded: Jul 21 2015 47 mins
    Guest Speaker: Chris Sherman, Analyst, Forrester Research
    According to Forrester, with the right approach and the right technology, application whitelisting can be an essential component for defending against evolving threats, particularly zero-day attacks that endpoint anti-malware products frequently fail to detect.

    In this webinar Chris Sherman, analyst at Forrester Research will examine:
    - The threat landscape and technology adoption trends
    - The benefits of whitelisting and how the technology has evolved
    - The challenges of application whitelisting and how to overcome them
    - The advantages of using application whitelisting in fixed function environments such as retail POS or Industrial Controls Systems
    - How to integrate application whitelisting into your overall endpoint security strategyWh

    John Fox, Director of Engineering at Digital Guardian will briefly explain:
    - How Digital Guardian application whitelisting is designed to address the key problems traditionally associated with application whitelisting
  • Security Operations Profile: Where does your organization stand? Recorded: Jul 21 2015 49 mins
    Arabella Hallawell, Senior Director of Product Marketing, Arbor Networks
    No two security teams are alike. Security organizations differ widely in how tight their budgets are, the number of dedicated staff and how their business views risk.

    Arbor Networks has sponsored a set of in depth-interviews and created a new tool to help security teams assess their current incident response profile and capabilities versus their peers and state of the art practices. The assessment provides actionable insights to prompt companies to evolve beyond existing detect and respond models that are becoming increasingly ineffective in the current threat environment

    Join this session to hear:
    • What metrics are defining the four profiles and how your organization measures up
    • Lessons learned from three case studies of teams that evolved to hunting and the benefits they achieved
    • Best practices for setting budgets, tools and strategy for a holistic data protection plan

    Take the profile assessment [], and join us for the conversation! We look forward to your participation.
  • Investigate Attacks Like Never Before: Pivoting through Attackers Infrastructure Recorded: Jul 16 2015 31 mins
    Jeremy Linden, Sr Product Manager and Meg Diaz, Sr Product Marketing Manger, OpenDNS
    Attackers break in and pivot through your infrastructure—making their way through critical systems, learning corporate secrets, and ultimately stealing your data. What if you could turn the tables and pivot through their infrastructure?

    Imagine finding one malicious domain or IP and using it to map out the attacker’s infrastructure in minutes. With OpenDNS Investigate, you get visibility into the related domains, IPs, and autonomous systems that may be leveraged for attacks now and in the future.

    Using examples of attacks, we will show how you can pivot through attackers’ infrastructures and stay ahead of attacks. Join this webcast to find out how you can use OpenDNS Investigate to:
    - Investigate attacks like never before
    - Gain global context to better prioritize incident response
    - Predict where future attacks are staged
  • Close Operational Gaps for Better Cybersecurity Recorded: Jul 16 2015 43 mins
    Joerg Sieber, Senior Product Marketing Manager, Palo Alto Networks
    As security solutions become more sophisticated, the challenge is not a lack of data, but how to cut through the noise quickly to understand what is actionable and where to allocate resources.

    In this webinar, we discuss strategies that provide your organization the best protection against cyberthreats:

    •Reduce response times with visual actionable data
    •Discover the unknown with automated threat correlation
    •Streamline management with operational and policy control
  • For Security Sake: Consolidate Your Secure Remote Access Infrastructure Recorded: Jul 14 2015 36 mins
    Akhilesh Dhawan, Principal Product Marketing Manager, Citrix
    Securely managing a cohesive network infrastructure of essential enterprise apps and data has never been more challenging. In this webinar, we will cover day-in-the-life scenarios, highlighting challenges faced by IT teams in providing secure remote access to support mobility and security via centrally hosted applications, data and systems. We will then discuss how consolidating multiple access gateways, including mobile-specific gateways and classic SSL VPNs, with Citrix NetScaler with Unified Gateway helps provide One URL for secure remote access while reducing TCO, simplifying IT, strengthening security and ensuring a high-definition experience for both mobile and traditional application users.
  • The New School of Cyber Defense Recorded: Jul 13 2015 58 mins
    Frank Mong, Vice President & General Manager of HP Security Solutions
    The old school of cyber defense emphasized securing infrastructure and restricting data flows, but data needs to run freely to power our organizations. The new school of cyber defense calls for security that is agile and intelligent. It emphasizes protecting the interactions between our users, our applications, and our data.

    The world has changed, and we must change the way we secure it. Join Frank Mong, VP & General Manager of Security Solutions, and hear why you need to secure your: Cloud services, data (wherever it is), and apps (wherever they run).
Your Resource for Information Security Trends & Education
With over 200,000 members, the Information Security Community is the largest community of infosec professionals in the industry. Let's build a network that connects people, opportunities, and ideas. If you are involved in purchasing, selling, designing, marketing ... or using information security solutions - this group is for you. Covered topics include compliance, encryption, anti-virus, malware, cloud security, data protection, hacking, network security, virtualization, and more.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Living in a State of Cyber Insecurity - Advanced Targeted Attacks
  • Live at: Mar 14 2012 5:00 pm
  • Presented by: Aaron Sheridan, Sr. Systems Security Engineer
  • From:
Your email has been sent.
or close
You must be logged in to email this