Hi [[ session.user.profile.firstName ]]

APTs: Getting Serious About Zero-Day Threats

Cyber security remains the #1 priority for IT security executives and practitioners in 2012 for good reason. With cyber-attacks on federal government systems and civilian networks increasing at an alarming rate, the threat posed is only heightened by vulnerabilities in networks that support critica
Cyber security remains the #1 priority for IT security executives and practitioners in 2012 for good reason. With cyber-attacks on federal government systems and civilian networks increasing at an alarming rate, the threat posed is only heightened by vulnerabilities in networks that support critical operations and infrastructure. In fact, on a weekly basis, over 95% of organizations have at least 10 malicious infections bypass existing security to penetrate their networks.
In a recent congressional hearing, a former FBI cyber security specialist stated: "I believe most major companies have already been breached or will be breached, resulting in substantial losses in information, economic competitiveness and national security. Many are breached and have absolutely no knowledge that an adversary was or remains resident on their network, often times for weeks, months or even years."
Organizations need real time, dynamic protection from today’s most dangerous threats designed to bypass traditional security defenses. Attend this webcast to learn:
•The new techniques and tactics that make these next-generation attacks successful in the absence of a true defense-in-depth security architecture
•Why conventional security defenses are no match for today’s sophisticated and coordinated attacks
•How to detect and stop Web and email-based attacks that exploit zero-day vulnerabilities—when they first appear on your network
•Key criteria when investigating next-generation threat protection
Recorded Jul 19 2012 46 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Alex Lanstein, Senior Researcher, FireEye
Presentation preview: APTs: Getting Serious About Zero-Day Threats
Recommended for you:
  • Date
  • Rating
  • Views
  • Meeting international requirements and leveraging CSA STAR for supply chain mana Meeting international requirements and leveraging CSA STAR for supply chain mana John DiMaria, BSI Recorded: May 4 2016 52 mins
    When an organization adopts cloud services, it is in fact expanding its operations from a local or regional presence to a more global one. As a result, the corresponding organizational operations’ strategy needs to be adjusted to align with these changes. You need to be in line with international requirements as well as your supply-chain. A more formal analysis of the supply-chain as part of a more comprehensive due diligence review also needs to be considered.1

    It is not always clear how the CSP handles incidents, encryption, and security monitoring. Organizations are rarely aware of all the risks they take when working with a CSP. In fact, the risks are multifaceted and are far more complex than those they experienced before moving to the cloud.

    An organization that rushes to adopt cloud services may subject itself to a number of business impacts including

    - Contractual issues over obligations regarding liability, response, and/or transparency
    - Mismatched expectations between the CSP and the customer
    - Lack of internal training and awareness within the user organization
    - Potential for software designers/engineers that are developing software to be unaware of associated risks

    Many organizations are turning to the cloud because of the resources required to manage complex supply chains. It can be challenging for most organizations to understand the supply-chain structure of the CSP’s environment; however, an increase in transparency will increase trust.

    At this session we will discuss:

    -Quick review of module 1
    -How CSA STAR maps to international requirements
    -How you can use CSA STAR to manage and monitor your supply-chain.
  • HPE and Hortonworks Partner to Transform Manufacturing Operations HPE and Hortonworks Partner to Transform Manufacturing Operations HPE, Hortonworks Recorded: May 4 2016 62 mins
    Optimizing manufacturing processes ultimately revolves around increasing output at reduced cost and improved quality. Manufacturers try to minimize inventory levels by scheduling just-in-time delivery of raw materials, but even the smallest miscalculation can cause stock-outs that lead to production delays. Sensors and RFID tags can capture supply chain data, but this creates a large, ongoing flow of data. Hadoop can cost-effectively store this unstructured data, providing manufacturers with greater visibility into their supply chain history, and greater insight into longer term supply chain patterns. This gives manufacturers more lead time to adjust to supply chain disruptions, as well as helps reduce costs and improve margins on finished products.

    Hewlett Packard Enterprise and Hortonworks have a strategic partnership to help manufacturers realize their modern data architecture. Join us for this webinar and learn how Hortonworks leading enterprise-ready open data platform in combination with HPE’s leadership position in the worldwide x86 server market provides manufacturing organizations with proven solutions to help transform manufacturing processes.
  • PCI and Vulnerability Assessments - What’s Missing? PCI and Vulnerability Assessments - What’s Missing? Mike Pittenger, VP of Security Strategy, Black Duck Recorded: May 4 2016 36 mins
    All regulatory requirements (HIPAA, PCI, etc.) include a mandate for assessing vulnerabilities in systems that manage or store sensitive data. Organizations often opt to conduct vulnerability assessments on an annual, quarterly, or even monthly basis. But while vulnerability assessment tools can identify unpatched or misconfigured code bases, these tools overlook a large portion of an organization’s attack surface: known vulnerabilities in applications that are built in-house. These applications will not have public updates, nor will the thousands of open source components they utilize be included in public disclosures. This is concerning because over 6,000 vulnerabilities in open source projects have been reported since 2014. Register for this webinar to discover how to protect yourself.
  • How New Devices Can Help You Make the Most of Windows 10 How New Devices Can Help You Make the Most of Windows 10 David Hollway, Mike Brohoski, & Pang Ngernsupaluck Recorded: May 4 2016 23 mins
    Together, Windows 10 and Intel deliver the productivity, security and manageability you need to advance your business.

    Intel and Microsoft have been collaborating for more than 30 years, creating technology that has changed the way we do business.

    With Windows 10, we’ve taken this partnership to a whole new level, with new hardware lighting up key Windows features that help you stay ahead of security threats, while making it easy for you to manage devices across your business.

    The new devices on Windows 10 and the new Intel 6th generation processor (Skylake) deliver:
    •Better Productivity: Do more and be more productive with improved multi-tasking, less waiting, familiar interface and app compatibility
    •Better Security: Helps protect identity, data and devices against modern security threats
    •Better Manageability: Stay current with less effort, manage devices more effectively, remotely provision and deploy applications

    Watch this webcast to:
    •Discover Windows 10 productivity, security and manageability features that new hardware lights up
    •Learn more about the Intel 6th generation processor (Skylake) and how it helps give time and money back to your company
    •Get additional resources to evaluate when it might be time for new devices and what devices are right for you
  • How New Devices Can Help You Make the Most of Windows 10 How New Devices Can Help You Make the Most of Windows 10 David Hollway, Mike Brohoski, & Pang Ngernsupaluck Recorded: May 4 2016 23 mins
    Together, Windows 10 and Intel deliver the productivity, security and manageability you need to advance your business.

    Intel and Microsoft have been collaborating for more than 30 years, creating technology that has changed the way we do business.

    With Windows 10, we’ve taken this partnership to a whole new level, with new hardware lighting up key Windows features that help you stay ahead of security threats, while making it easy for you to manage devices across your business.

    The new devices on Windows 10 and the new Intel 6th generation processor (Skylake) deliver:
    •Better Productivity: Do more and be more productive with improved multi-tasking, less waiting, familiar interface and app compatibility
    •Better Security: Helps protect identity, data and devices against modern security threats
    •Better Manageability: Stay current with less effort, manage devices more effectively, remotely provision and deploy applications

    Watch this webcast to:
    •Discover Windows 10 productivity, security and manageability features that new hardware lights up
    •Learn more about the Intel 6th generation processor (Skylake) and how it helps give time and money back to your company
    •Get additional resources to evaluate when it might be time for new devices and what devices are right for you
  • Pulse Policy Secure - Enabling Secure Mobility Pulse Policy Secure - Enabling Secure Mobility Lisa Lorenzin, Principal Solutions Architect Recorded: May 4 2016 28 mins
    Join us on Wednesday, May 4 at 8am PST to dive deep into enabling enterprises to balance business security with user productivity using BYOD.
  • Maximiser la valeur de vos données avec une plateforme de données connectée Maximiser la valeur de vos données avec une plateforme de données connectée Abdelkrim Hadjidj, Solution Engineer, Hortonworks Recorded: May 4 2016 61 mins
    Tous les métiers ont besoin de données. Pour transformer votre organisation et exploiter vos données vous avez besoin d’une solution pour récupérer, stocker et analyser toutes les données de votre organisation. Une plateforme de données ouverte et connectée vous permettra de prendre des décisions plus rapidement. Nous vous présenterons des exemples d’entreprises qui ont migré leurs plateformes de Hadoop classique vers notre plateforme ainsi que les gains qu’ils ont obtenu.
  • Crime & Spies: The Great Indian Cyber Robbery Crime & Spies: The Great Indian Cyber Robbery Vipul Kumra,Consulting Engineer, FireEye India Recorded: May 4 2016 61 mins
    A cyber-threat group exploiting commercial entities and Government agencies across India for over a decade! Suspected Pakistani Threat Actor Using Surveillance Malware Against Indian Entities! Computers at three banks, pharmaceutical company hacked; hackers demand ransom in bitcoins!
    Almost every day news is full of stories about companies and nations grappling with the new cyber threat landscape. There is a lot more happening behind the scene.
    Join FireEye webinar “Crime & Spies: The Great Indian Cyber Robbery” to hear from the people and the organization which has been the first responder to the majority of the high profile cyber breaches across the world. FireEye has been curating intelligence on malware, advanced threat group tactics and attacker behavior for over a decade.
  • Six Key Capabilities For Securing Office 365 Email Six Key Capabilities For Securing Office 365 Email Ryan Kalember, Proofpoint SVP of Cybersecurity with Guest Speaker Kelley Mak, Forrester Analyst Recorded: May 3 2016 62 mins
    Email remains a critical component of business process. Strong interest and adoption of Microsoft’s Office 365 online productivity and collaboration suite is pushing email to the cloud. However, Office 365 has many security and risk professionals scrambling to figure out what security controls are necessary to secure email.


    While Office 365 can provide native functionality baked in, enterprises need to understand the gaps and where additional security might be necessary to protect you from today’s advanced threats. Join Ryan Kalember, Proofpoint SVP of Cybersecurity, to discuss the key capabilities that enterprises should consider for their Office 365 email environment.


    Key takeaways include:
    • Why the shift to Office 365 increases criticality of email security
    • Common pitfalls to avoid in the planning stages
    • Key security capabilities to protect from advanced threats

    Learn more about how Proofpoint has helped customers find success with their Office 365 initiative with advanced security, end-to-end insights and rapid response capabilities, and email continuity.

    Guest speaker Kelley Mak of Forrester Research will also be on hand to discuss the industry at large from an independent perspective.
  • Achieving PCI Compliance in AWS: A Customer Case Study Achieving PCI Compliance in AWS: A Customer Case Study Matthew R. McLimans, Computer Engineer at Warren Rogers Recorded: May 3 2016 59 mins
    PCI compliance is a steep enough challenge, but what happens when your entire infrastructure is in AWS? Do the same concepts of network segmentation and separation apply, and if so how? At what point do AWS compliance efforts intersect with your compliance efforts?

    Join this webinar where we will cover how a customer is using the Palo Alto Networks VM-Series for AWS to maintain separation of data and traffic in AWS to improve security and achieve PCI compliance.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: APTs: Getting Serious About Zero-Day Threats
  • Live at: Jul 19 2012 5:00 pm
  • Presented by: Alex Lanstein, Senior Researcher, FireEye
  • From:
Your email has been sent.
or close
You must be logged in to email this