What if I no longer was a white hat? What if I started to hack for fun and profit at other expense?
How would I do it? Could you catch me? How can you stop me?
Join this presentation and get a unique insight into the mind of the hackers trying to get into your systems and steal your information. Learn how it can be done, and what are the precautions and preventive measures you can take now to make sure your company is prepared for attack.
This webinar will explore the current DDoS attack landscape, it will cover the basics of DDoS attacks, current trends including the most recent trends from the newly published 2015 Imperva Incapsula DDoS Report. We will also discuss a detailed analysis of one of today’s modern, multi-vector DDoS attacks. While dissecting this DDoS attack, the talk will explore the anatomy and timeline of the attack, as well as the steps used to mitigate each phase of the assault.This session will close with a review of the aspects of effective DDoS protection solutions used to combat these sophisticated denial of service attacks.Read more >
IT pros in EMEA are feeling pressured to protect themselves from phishing and targeted attacks. In this webinar we will look at recent investigations into targeted and phishing attacks and their potential impact on businesses risks and options for remediation.Read more >
Proofpoint's Information Security platform takes an entirely new approach, using big data analysis techniques to identify and apply additional security controls to suspicious messages. Watch Proofpoint product experts demonstrate how to protect your organization using Targeted Attack Prevention, Policy-Based Email Encryption for DLP, and real-time email message tracing. Each of these solutions is designed to provide the necessary security tools to elevate email protection.Read more >
Cyber attacks are on the rise, and financial institutions are increasingly becoming targets of sophisticated attackers. Join this presentation and learn about the current cyber-attacks affecting the industry.
David Swan, EVP of the Defense Intelligence Group will discuss current attacks, attack trends and forecasts what banks and other financial institutions can expect in the near to middle term.
In this webinar Andrew Shoemaker, a DDoS simulation expert from NimbusDDOS, gives you a rare glimpse into how hackers find the weak points in your defenses and exploit them to level devastating DDoS attacks. You'll see real world examples of the tactics and methods used to create tailored DDoS attacks that can bring down a targeted network or application, and learn how best to defend against them.Read more >
After a brief introduction to the world of SEO, we will dive into the different types of web application attacks and manipulations that are made to either degrade your competitor’s ranking or raise your own.Read more >
Cyber Attacks are increasing in frequency and sophistication. No longer content to just steal data, criminals are deploying ransomware everywhere and holding businesses hostage on a daily basis. To combat the threats, Regulators are pushing out warnings and recommendations, and IT needs to think and respond differently.
EMC Data Protection offers a wide range of solutions to provide strong defenses against these attacks. This session will walk through the risk, regulations and the solutions.
Over the last few months we have seen DDoS attacks become more ferocious and attackers more sophisticated. As DDoS threats continue to evolve, your traditional mitigation solution may not be enough to protect you.
Watch as we follow a fictitious attacker analysing a target, exploring and finding weaknesses. Experience how the attacker launches a DDoS attack with devastating effects. Learn about the advantages and limitations of various mitigation technologies, and be given a DDoS preparedness roadmap to help you navigate the DDoS landscape.
A DDoS attack is sometimes a smokescreen to cover up much more damaging activity such as theft or fraud. While you’re working frantically to mitigate the DDoS attack and get critical applications back online, cybercriminals could be working under the radar to break into your systems and conduct more malevolent activities.
Learn to listen to your network activity:
-Clues from DDoS attacks that will help you investigate threats
-Why organizations like FFIEC warn banks about the use of DDoS
-Best practices for DDoS protection
Based on on our extensive knowledge of leading practices and experience responding to critical security incidents, we would like to briefly discuss with you the topic of being “Response Ready”. Being prepared for a cyber attack is not easy and usually starts with looking within the organisation and checking your Response Readiness. Let’s talk briefly about your security operations center (SOC) and incident response (IR) capabilities. Maybe after the webinar you can analyse where your IR program needs to develop and how to get there.Read more >
You should assume that during 2016 your data will be subject to an attack from Cyber Criminals. Therefore you need to ask yourself… Where are you most vulnerable? What door has been left open?
Our final webinar will look behind Door 6, Web and Collaboration. How can you secure real-time collaboration and inappropriate content from impacting your business?
The volume, size, and sophistication of DDoS attacks have increased rapidly over the years. Is your organization prepared for today’s modern, multi-vector DDoS offensives? Join Imperva and (ISC)2 on May 19, 2016, at 1:00 PM Eastern for the final part of a three-part Security Briefing series where we’ll specifically explore the anatomy and timeline of a complex DDoS attack, as well as the steps used to mitigate each phase of the assault.Read more >
Le 18 février, nous avons lancé notre série de webinaires intitulée « Assumption of Attack » illustrant la protection exhaustive et avancée qu'offre notre suite logicielle Smart Protection Suite, une solution particulièrement efficace face aux cybercriminels.
Le cinquième épisode de notre série de webinaires portera sur la sécurité du Cloud hybride.
Que vous souhaitiez mettre l'accent sur la sécurité des environnements physiques, virtuels ou cloud, vous découvrirez comment protéger vos données et éviter les interruptions d'activité tout en vous conformant aux réglementations.
We examine the Ukraine attack which turned off the lights for 225,000 customers, and Bangladesh Heist where USD81m was siphoned off. Learn from these high profile breaches that made headlines, investigate what happened, and make sure this does not happen in your company.
Most large organisation knows they have been breached. The lesson to be learnt, is that in every case, the attacker had been present in the network long before the breach was discovered, looking for ways to move around, using higher and higher access credentials to get to the end goal.
When you understand how this happened, you can reduce the risk your company faces.
It’s also key to remember that the goal of attackers is not to impersonate people. The goal is to get to something that the attacker wants – whether to make money, obtain some kind of data leverage, or simply cause disruption to the organisation.
This session will equip you with the knowledge on how you can better protect your organisation from these risks. Join CyberArk and (ISC)2 on Jun 15, 2016 at 2:00p.m. (Singapore Time) for a Security Briefings that will examine that the Ukraine attack which turned off the lights for 225,000 customers, and Bangladesh Heist where USD81m was siphoned off.
Presenter: Prasad Kulkarni, Pre-Sales and Professional Services Manager India, Professional Services, APJ, CyberArk
Moderator: Chuan-Wei Hoo, Technical Advisor, Asia-Pacific, (ISC)²
Questo è il webinar conclusivo della nostra serie dal titolo Assumption of Attack, inaugurata il 18 febbraio con l’obiettivo di dimostrare come la nostra soluzione Smart Protection Suite leader del mercato assicuri una protezione multilivello al tuo business.
Il nostro sesto e ultimo webinar guarderà dietro la porta n. 6, Web e collaborazione. Come puoi riuscire ad evitare l’impatto negativo della collaborazione in tempo reale e dei contenuti sconvenienti sul tuo business?