Hi [[ session.user.profile.firstName ]]
Sort by:
    • Verizon Threat Research Advisory Center Monthly Intelligence Briefing
      Verizon Threat Research Advisory Center Monthly Intelligence Briefing John Grim, David Kennedy, Ashish Thapar, Simon Ezard, Sean Dickinson Processing: Nov 14 2018 3:00 pm UTC 90 mins
    • Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

      Our Verizon Threat Research Advisory Center presenters will be:

      •John Grim, Senior Manager, Investigative Response – Americas
      •David Kennedy, Managing Principal, Open Source Intelligence
      •Ashish Thapar, Managing Principal, Investigative Response – APAC
      •Simon Ezard, Senior Security Specialist, Investigative Response – APAC
      •Sean Dickinson, Senior Security Consultant, Dark Web Threat Hunting

      This webinar will cover:

      •Current Intelligence Overview
      •Attacks and Threat Indicators
      •Latest Malware Trends
      •Significant Vulnerabilities

      If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address prior to November 9, 2018:

      Intel.Briefing@verizon.com

      Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!

      Read more >
    • Verizon Threat Research Advisory Center Monthly Intelligence Briefing
      Verizon Threat Research Advisory Center Monthly Intelligence Briefing John Grim, David Kennedy Upcoming: Dec 19 2018 3:00 pm UTC 90 mins
    • Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

      Our Verizon Threat Research Advisory Center presenters will be:

      •John Grim, Senior Manager, Investigative Response – Americas
      •David Kennedy, Managing Principal, Open Source Intelligence

      This webinar will cover:

      •Current Intelligence Overview
      •Attacks and Threat Indicators
      •Latest Malware Trends
      •Significant Vulnerabilities

      If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address prior to December 14, 2018:

      Intel.Briefing@verizon.com

      Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!

      Read more >
    • Verizon Threat Research Advisory Center Monthly Intelligence Briefing
      Verizon Threat Research Advisory Center Monthly Intelligence Briefing John Grim, Jihana Clemetson and David Kennedy Recorded: Oct 17 2018 2:00 pm UTC 87 mins
    • Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

      Our Verizon Threat Research Advisory Center presenters will be:

      •John Grim, Senior Manager, Investigative Response – Americas
      •Jihana Clemetson, Senior Analyst, Threat Intelligence
      •David Kennedy, Managing Principal, Open Source Intelligence

      This month's theme is 'Cyber Security Awareness' happens to coincide with the National Cyber Security Awareness Month, and, as such, we'll focus on social attacks. We'll cover social engineering attack content reported within the 2018 Data Breach Investigations Report (DBIR) and follow this by highlighting two (2) 2018 Data Breach Digest (DBD) scenarios:

      •Social Engineering – the Spiked Punch
      •Telephonic Pretexting – the Double Fake

      Jihana Clemetson will provide insight to our recent caseload. And then we'll turn things over to David Kennedy who'll on the latest and greatest when it comes to:

      •Current Intelligence Overview
      •Attacks and Threat Indicators
      •Latest Malware Trends
      •Significant Vulnerabilities

      If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address prior to October 12, 2018:

      Intel.Briefing@verizon.com

      Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!

      Read more >
    • Top Business Security Risks and How You Can Fight Back
      Top Business Security Risks and How You Can Fight Back Graham Cluley, Independent Computer Security Expert Recorded: Jul 16 2018 9:00 am UTC 30 mins
    • According to cyber security experts, the frequency and severity of cyber attacks are on the rise, causing alarm to businesses and customers across a variety of industries. Taking a proactive, strategic approach to evaluating your cyber security strategy is critical, it starts with understanding who your organisations adversaries are and what the impact would be on your business if you were the victim of a cyberattack.

      Hear from Graham Cluley as he examines the latest methods and exploits used by cyber criminals providing an overview of the most current ways they target businesses. You’ll get an insight on how the most sophisticated attackers choose their targets and what they are looking for.

      You will learn about:
      - The ever-changing threat landscape, and how it affects your business
      - Key Considerations for your Cyber Security Strategy
      - Insight into real-life case studies

      Read more >
    • Understanding and Taking Action on Risk Associated with your Digital Footprint
      Understanding and Taking Action on Risk Associated with your Digital Footprint Dustin Wilcox, 360Velocity | Vamsi Gullapalli, RiskIQ Recorded: Mar 9 2018 11:55 am UTC 28 mins
    • Visualising your organisation’s complete attack surface—all the known, unknown, and rogue and phoney digital assets across digital channels—is central to a robust and effective digital threat management (DTM) program. Having this complete picture also provides an understanding of vulnerabilities associated with those assets, and which should be prioritized highest (e.g., old vulnerabilities, which are the most often exploited, and new vulnerabilities like zero-days).

      During its discovery process, RiskIQ’s Digital Footprint surveys the entire internet, looking for digital assets that belong to or are connected to you, across the web, social, and mobile channels. Register for our upcoming webinar with RiskIQ’s Digital Footprint Product Manager, Vamsi Gullapalli, where he discusses:

      - What is RiskIQ Digital Footprint?
      - Where it fits in your security stack
      - How it can improve your vulnerability and asset management processes by making them more complete and up-to-date
      - Real life uses cases from customers who have improved their security posture and digital threat management programs with RiskIQ

      Also, you’ll hear from a RiskIQ customer and security chief on how he used Digital Footprint to improve his organisation’s risk posture.

      Read more >
    • Protecting Critical Infrastructure from Cyberattacks
      Protecting Critical Infrastructure from Cyberattacks Maj. Gen. Robert Wheeler, USAF (Retired); Willy Leichter, Virsec Recorded: Sep 11 2018 5:00 pm UTC 52 mins
    • New Mindsets and Strategies for Proactive Defense

      There is no doubt that our infrastructure is under attack, and new vulnerabilities are being revealed daily. A perfect storm of political forces, aging infrastructure, increased automation, and advanced decentralized hacking all mean that we can’t be complacent about the security of our nation’s industrial backbone. To tackle today’s threats, we can’t rely on outdated security models and need a shift in mindset and defensive strategies that are up to the task.

      Join us for an interactive discussion with Maj. Gen. Robert Wheeler, a renowned security expert and former Deputy Chief Information Officer for Command, Control, Communications and Computers (C4) and Information Infrastructure Capabilities (DCIO for C4IIC).

      Read more >
    • Decoding the Matrix: Deception-Borne Threat Intelligence
      Decoding the Matrix: Deception-Borne Threat Intelligence John Bradshaw, Sr. Director, Solutions Engineering at Acalvio Technologies Recorded: Oct 25 2018 5:00 pm UTC 44 mins
    • Deception-based solutions can provide a wealth of information about how adversaries behave as they attempt to complete their mission. Depending on the level of engagement organizations desire to setup in their deception solution, information gleaned can include basic network connection information or every keystroke, command and action taken when a system is accessed. Understanding where in the attack life-cycle your deception information is coming from is critical to knowing how to utilize that information to strengthen your SOC / IR Operational Workflows. This webinar will discuss the types of information that can be gathered by Deception Solutions based on different levels of engagement and how that information can be used in the most effective manner with your Threat Intelligence and Security Analytics platforms.

      About the Speaker:

      John Bradshaw, Sr. Director, Solutions Engineering at Acalvio Technologies, has more than 25 years of experience in the Cyber Security industry focusing on advanced, targeted threats. He held senior leadership roles at Mandiant, ArcSight, Internet Security Systems, Lastline, and UUNET.

      Read more >
    • 7 Cyber Habits for Mid-sized Organisations
      7 Cyber Habits for Mid-sized Organisations Robert O'Brien - CEO MetaCompliance LTD. Upcoming: Nov 27 2018 3:00 pm UTC 24 mins
    • Having world class cyber security is a luxury many medium sized enterprises cannot afford. Added to this, the battle to attract and retain suitable technical staff poses a huge challenge to the security and compliance posture of the bulk of mid-market companies in western economies.

      August 9th - 3pm GMT / 4pm CET / 11am EST / 10am CNT / 8am PST

      At this webinar you will learn:
      •The importance of changing everyday behaviour in the face of evolving and sophisticated cyber threats
      •Key questions you should ask your information technology management
      •Why Executives and the Board of Directors should bear the ultimate responsibility for the creation of a modern cyber ready organisation
      •How to build cyber security into your digital transformation exercise

      Read more >
    • FireEye Global Threat Response – How we Protect the World
      FireEye Global Threat Response – How we Protect the World Tim Wellsmore, Director, Government Security Programs, Mandiant International, a FireEye Company Recorded: Oct 22 2018 2:00 am UTC 57 mins
    • Most approaches to the global cyber security problem are usually focused locally inside separate organisations, who struggle to look out across the global landscape and effectively respond. National responses from government capabilities can be challenged by capacity and jurisdiction to truly understand the global threat environment, and to effectively respond. This presentation will highlight how FireEye utilises its various capabilities and threat focused teams from all parts of the business to build a cohesive global detection and response capability for the biggest global threats.

      This presentation will outline how we tactically respond within our internal capability teams, and across our customer base of 67 countries and how we keep the media, our customers and our government partners informed on the latest information. How we scale quickly to respond to WannaCry or NotPetya to ensure our Community Protection mandate is relentless maintained is an impressive story. This presentation will highlight how our FireEye technology arm and FireEye's subsidiary companies of Mandiant and iSight work seamlessly together in a global cyber threat event to bring our best against the world's most advanced cyber threat actors.

      Read more >
    • Cybersecurity in the wake of recent attacks - Is Browser Isolation the solution?
      Cybersecurity in the wake of recent attacks - Is Browser Isolation the solution? Rajiv Raghunarayan, VP - Products, Cyberinc Recorded: Aug 21 2018 3:00 am UTC 49 mins
    • The spate of cyber-attacks continues with an increasing level of sophistication and precision and sometimes finding the easiest path – through the weakest link in the chain – the human factor. Businesses and even government organizations are constantly in an alarmed state having to deal with the aftermath of such attacks. Be it the case of City of Atlanta or the more recent SingHealth breach, it is evident that CIOs and CISOs across the globe need to re-assess their traditional security approach.

      What is Browser Isolation? And how can this technology aid CISOs, security leaders & practitioners in managing cyber threats?

      Register to watch Rajiv Raghunarayan, VP Products at Cyberinc outline a simple yet effective approach organizations - enterprise or government - could take towards reducing risk and vulnerabilities, while also driving up the productivity of their IT security teams.

      Read more >
    • How to Build your People-Centric Cybersecurity Strategy
      How to Build your People-Centric Cybersecurity Strategy Ryan Kalember, SVP Cybersecurity Strategies at Proofpoint Recorded: Sep 12 2018 6:00 pm UTC 60 mins
    • Today’s most popular security and compliance tools focus on protecting the perimeter—they manage endpoints and patch system vulnerabilities.

      But cybercriminals don’t target technical vulnerabilities. They target human weakness: the distracted user who clicks on an email attachment, the eager customer who fills in credentials to claim a fake offer, a loyal employee who follows directions to wire money from a criminal impersonating their CEO.

      The only security strategy that will successfully combat today’s advanced attacks is one that focuses on protecting our people. Join Proofpoint SVP Ryan Kalember to learn how to build a strategy that:

      • Reveals who is targeted and how
      • Combats attacks before they reach your users, and
      • Mitigates damage from the attacks that inevitably will reach your people

      About the presenter:

      With over 15-years of experience in the information security industry, Ryan currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for media commentary on breaches and best practices for enterprises as well as consumers. He joined Proofpoint from WatchDox where he served as chief marketing officer and was responsible for successfully building and leading the marketing team through the company’s acquisition by Blackberry. Prior to WatchDox, Ryan was instrumental in running solutions across Hewlett-Packard’s portfolio of security products. He has also held a variety of marketing leadership positions at ArcSight and VeriSign including EMEA regional manager. Ryan received his bachelor's degree from Stanford University, where he studied fault tolerance, cryptography, and authentication algorithms.

      Read more >
    • Cyber Security Risk Management –New Methods to Gain Control
      Cyber Security Risk Management –New Methods to Gain Control Matthew Keane, Sr. Director, FireEye, Travis Fry, Sr. Consultant, FireEye & Michelle Visser, Partner, Ropes & Gray Recorded: Oct 23 2018 3:00 pm UTC 58 mins
    • Due to the combination of growing cyber risks threatening critical assets of organizations today, and firmer security regulations enforced by lawmakers across the globe, security leaders are increasingly taking steps improve their risk management processes and key stakeholder communication—to enable better decision-making around security domains and necessary investments.

      This includes adoption of new risk management methods to generate realistic risk forecasts, effective metrics techniques, and a clear roadmap for capability improvements.

      Join Matthew Keane, Sr. Director of Strategic Services at FireEye, Travis Fry, Sr. Consultant at FireEye, and Michelle Visser, Partner at Ropes & Gray, as they share their security and legal expertise on:

      • Security risks across the complete cyber attack lifecycle, not only detection and response
      • A simple and proven method for approaching the risk reality facing all organizations
      • The rising cyber security insurance market and how it will affect risk management efforts
      • Influence of new regulatory requirements and the SEC’s interpretive guidance on disclosure issues
      • Using threat intelligence to ensure risk management efforts are based on real-world threats and ongoing adversary activities, not hypothetical or academic scenarios
      • Best practice exercises to test your incident response plan based on real-world experiences
      • Techniques for effectively reporting risk and capability needs to a Board-level audience

      Read more >