Hi [[ session.user.profile.firstName ]]

Information Security

  • Date
  • Rating
  • Views
  • Simplify Your Google Apps Collaboration and Management with IDaaS Simplify Your Google Apps Collaboration and Management with IDaaS Nathan Chan, Solutions Architect at OneLogin Recorded: Aug 18 2016 44 mins
    Google Apps for Work is a preferred solution for productivity and collaboration in the modern enterprise. But with a large suite of tools, proper provisioning and maintenance is anything but easy. Attempting to roll out Google Apps to the right users with the right access often results in over-extended IT resources, delayed employee on- and off-boarding, and misallocated access to key documents and data.

    It doesn’t have to be this way. Hundreds of organizations are using OneLogin’s best-in-class directory integrations to achieve faster Google Apps time-to-value and on-going application security and automation.

    Join OneLogin for an informative webinar designed to get you through the most complex of Google Apps deployments.
  • Gaining real-time threat intelligence through the Enterprise Immune System Gaining real-time threat intelligence through the Enterprise Immune System Andrew Tsonchev, Darktrace Principal Consultant Recorded: Aug 17 2016 31 mins
    · The sophistication of today’s threat landscape
    · Lessons learnt in government intelligence on defending against fast- moving adversaries
    · Using machine learning for automatic threat detection and efficient resource allocation
    · Gaining visibility into 100% network activity and mitigate problems early
  • When Bots Attack! Stopping OWASP’s New Top 20 Automated Threats When Bots Attack! Stopping OWASP’s New Top 20 Automated Threats Rami Essaid, Co-Founder Distil Networks Recorded: Aug 16 2016 38 mins
    The OWASP Top 10 Vulnerabilities, last published in 2013, has been a valuable list of criteria by which any Web Application Firewall (WAF) is evaluated, but has a glaring flaw, it only focuses on vulnerabilities in the code, and ignores automated threats. In late 2015, this flaw was addressed and OWASP released the first Automated Threat Handbook specifically to help organizations better understand and respond to the notable worldwide increase of automated threats from bots. This presentation discusses these new bot threats, bot evolution, and how to fight back.
    Keypoints:

    - How malicious bots attack and cause problems

    - Why homegrown IT solutions have troubles keeping up with bots, threats

    - See Distil Networks in action finding, fighting bots
  • Cyber Intelligence Exchange: It's Possible and Absolutely Necessary Cyber Intelligence Exchange: It's Possible and Absolutely Necessary Paul Kurtz, Co-Founder & CEO of TruSTAR Technology Recorded: Aug 10 2016 34 mins
    Despite the growing conversation around incident exchanges, few companies share broadly today. Join Paul Kurtz, Co-Founder and CEO of TruSTAR Technology to discuss:
    · Why it’s time for ‘good guys’ to embrace timely incident exchange,
    · The challenges of building effective intelligence exchange, and
    · How to design an intelligence exchange with broad participation and actionable reports.
  • User Behavior Analytics - A Game Changer in The Fight Against Cyber Attacks User Behavior Analytics - A Game Changer in The Fight Against Cyber Attacks Stephan Jou, CTO at Interset Recorded: Aug 10 2016 49 mins
    High-profile breaches are on the rise. Insurance companies, government organizations, power utilities, even online gaming and dating sites are increasingly becoming targets of sophisticated cyber attacks.

    With the ever-changing landscape of threats and advanced cyber-attacks showing no sign of slowing down, organizations need to be prepared. As the breadth of corporate information expands, IT security teams face the daunting task of effectively protecting intellectual property, PII data, and PHI data from internal and external threats.

    Enter machine learning and user behavior analytics. Can this technology detect and help stop cyber-attacks? Stephan Jou, CTO at Interset, will discuss the current threatscape and how user behavior analytics plays in the fight to stop cyber-attacks.
  • Current Cyber Attack Trends and Forecasts for the Financial Industry Current Cyber Attack Trends and Forecasts for the Financial Industry David Swan, EVP Defence Intelligence Group Recorded: Aug 10 2016 33 mins
    Cyber attacks are on the rise, and financial institutions are increasingly becoming targets of sophisticated attackers. Join this presentation and learn about the current cyber-attacks affecting the industry.
    David Swan, EVP of the Defense Intelligence Group will discuss current attacks, attack trends and forecasts what banks and other financial institutions can expect in the near to middle term.
  • Using Endpoints to Accelerate Threat Detection, Protection and Response Using Endpoints to Accelerate Threat Detection, Protection and Response Simon Crosby, CTO at Bromium Recorded: Aug 10 2016 45 mins
    Distributed, automated detection and protection accelerates breach response.

    Sadly more than 90% of breaches start with a “click”: Attachments, downloads, malvertising, Java, the web, media, USB and executables all punch holes in the perimeter. Conventional “detect to protect” tools fail – because 99% of malware morphs in under a minute, making signatures useless. And the thousand-fold increase in crypto-malware signals a shift to machine-timescale breaches that can bring an organization to its knees before the first alert. CISOs find themselves in the awful position of having to detect a breach once an attacker has succeeded – without knowing what to look for or how to respond.

    In an era of targeted and machine-timescale attacks, luck and hope are not enough. This talk will present a way to use the endpoints themselves to accelerate enterprise detection, threat analysis and response. The approach relies on the use of virtualization based security on endpoints to isolate threat vectors, protecting the endpoint but more importantly providing an isolated environment in which malware will execute, with the advantage of tamper-proof monitoring. Insights from each endpoint are correlated to accelerate enterprise-wide response.
  • The Security Risks of Orphaned Network Traffic The Security Risks of Orphaned Network Traffic João Gouveia, CTO, AnubisNetworks Recorded: Aug 10 2016 47 mins
    As part of our research work focused on identifying automated network traffic that we can relate with malicious behavior and botnet communications, we often come across with traffic not necessarily related to malicious intent, but that represents a high risk for the companies allowing it to occur on their networks.

    Often associated with abandoned ware, policy control failures, or miss configurations, these traffic patterns end up exposing company information and assets to multiple risk levels.

    On this webinar, we are going to explore this byproduct of our botnet research, how widespread this problem is, how we can use this to relay risk information to companies, and the several degrees of exposure and impact that this type of traffic can represent.
  • The Three Axes of Evaluating Security Analytics Solutions The Three Axes of Evaluating Security Analytics Solutions Dr. Matthew Williamson, Chief Threat Defense Scientist at vArmour Recorded: Aug 10 2016 28 mins
    The problem of detecting attackers in today’s enterprises and data centers is harder than ever. Well-funded adversaries with time and patience use techniques that blend in with enterprise activities, making accurate detection difficult. Security analytics promises to address this situation by throwing advanced math at available data sources in the enterprise, with the goal of finding the proverbial threat needle in the data haystack.

    This presentation will enable attendees to evaluate security analytic solutions, cutting through the buzzwords and hype, and providing both a deep understanding of the detection problem and a framework to evaluate solution efficacy, based on three axes: breadth, depth and control.
  • Intel & Threat Analysis – The Defensive Duo Intel & Threat Analysis – The Defensive Duo Jens Monrad, Global Threat Intelligence Liaison, FireEye; Al Maslowski-Yerges Manager, Americas Systems Engineering Recorded: Aug 10 2016 41 mins
    The ongoing battle with cybercrime is asymmetric. You’ve invested millions in protection technology but unknown attackers still find a way in. So how do you stay ahead of the curve?

    "The core problem is that most cyber security tools do not make a distinction between everyday malware and advanced targeted attacks. If security tools cannot tell the difference, security teams have no way of prioritizing the alerts that matter the most."

    Join Jens Monrad, Global Threat Intelligence Liaison from FireEye in this webinar that will discuss:

    •How to ensure you are responding to the alert that matters

    •Benefits of Alerts with threat Intelligence

    •Using threat intelligence to think like your attacker

    •How to apply threat intelligence, expert rules and advanced security data analytics in order to shut down threats before they cause damage

    •How security teams can prioritize and optimize their response efforts.

Embed in website or blog