Hi [[ session.user.profile.firstName ]]
Sort by:
    • The Best Defense Against Cyber Attacks You’ve Never Heard Of...
      The Best Defense Against Cyber Attacks You’ve Never Heard Of... Scott Crawford, Research Director of Information Security, 451 Research | Allan Carey, VP of Business Development, PhishMe Recorded: Nov 9 2016 5:00 pm UTC 47 mins
    • With all the attention paid to the technological sophistication of cyber attacks, as well as to the new technologies arising to strengthen defense, one fact often gets overlooked: Security is fundamentally about people.

      The adversary is an intelligent actor – while the target is often human as well. The compromise of sensitive information or functionality may be in the crosshairs, but it’s people that are often targeted to gain a foothold inside the victim organization, through techniques such as phishing or social engineering. But here’s the secret: In this targeting lies one of the most unsuspected – but potentially rich – assets to defense an organization can have.

      In this webcast, Scott Crawford, Research Director of Information Security for 451 Research, and Allan Carey, Vice President of Business Development from PhishMe take a closer look at:

      •How the targeting of people through phishing, impersonation attacks and social engineering can be leveraged to improve security and resistance to attack
      •New tactics and tools that make the most of human engagement to defend organizations against these exploits
      •Ways to enhance incident response by incorporating human interactions with malicious activity into the evidence chain

      Read more >
    • Beyond Files: The Full Spectrum of Attacks
      Beyond Files: The Full Spectrum of Attacks Eran Ashkenazi, VP of Services & Field Operations, SentinelOne Upcoming: Mar 14 2017 7:00 pm UTC 45 mins
    • We’ve all seen the bake-offs - vendor against vendor, the ‘latest’ malware samples run raw and then packed, and who apparently wins the race against hackers. But there is one major flaw in these tests - they’re only covering a fraction of attacks that occur in the wild. What about exploits? What about script-based attacks, including powershell and VMI? What about attacks that leave no file indicators - how does your security stop them?

      Join SentinelOne’s Eran Ashkenazi, VP of Field Services and Support, as he discusses the full spectrum of attacks that are currently out in the wild and what you can do to protect against them.

      What you’ll learn:
      - The types of attacks, or attack vectors, you should include in your evaluation testing
      - Real-world attacks that utilize methods that leave no file-based indicators
      - How SentinelOne’s next generation endpoint protection protects against a file-less attack in a live demo

      Read more >
    • Real-Time Contextual Learning and Adaptation in an Era of Targeted Attacks
      Real-Time Contextual Learning and Adaptation in an Era of Targeted Attacks Simon Crosby, Co-Founder & CTO of Bromium Recorded: Feb 22 2017 10:00 pm UTC 52 mins
    • You’ve heard a lot about using artificial intelligence and machine learning to change the odds in your favor in cyber-attacks. Unfortunately it turns out that the bad-guys have great AI too, and with each click they can stealthily adapt, morphing into a new hard-to-detect form. But what if we apply learning in real time, on every endpoint, and allow the endpoints to collaborate to identify the threat?

      In this talk Simon Crosby, co-founder and CTO of Bromium, will explore how this new approach can give defenders the edge in an era of targeted attacks.

      About the Presenter:
      Simon Crosby is a co-founder and CTO of Bromium Inc. – the pioneer of micro-virtualization, which enables PCs to defend themselves by design from all malware. Previously Simon was CTO, Data Center & Cloud at Citrix Systems, which acquired XenSource, where he was co-founder and CTO. He was formerly a Principal Engineer at Intel where he led strategic research on platform security and trust, and founder & CTO of CPlane Inc., a pioneer in Software Defined Networking. He was a faculty member in the Computer Laboratory at the University of Cambridge, UK from 1994-2000. He holds a PhD in Computer Science from the University of Cambridge, UK, and is author of more than 50 peer reviewed papers and patents.

      Read more >
    • Zero-Day Attacks and What To Do About It?
      Zero-Day Attacks and What To Do About It? Chris Candaffio, System Engineer, Symantec Upcoming: Mar 23 2017 5:00 pm UTC 30 mins
    • 5-Part Webinar Series: Endpoint Protection…what really matters?

      Part 3 of 5: Zero-Day Attacks and What To Do About It?

      All applications have vulnerabilities and attackers are incented to find them. Once the vulnerability has been discovered, the longer it remains unpatched, the greater the risk of a breach, potential loss of information, and damage to reputation.

      Join us to learn what can be done to block exploit attacks on day zero:

      • What behaviors and techniques are used to block attacks
      • Why exploit prevention plays a critical part in endpoint protection
      • How Memory Exploit Mitigation works

      Then see Memory Exploit Mitigation in action with a demo Symantec Endpoint Protection.

      Register Today

      Watch On-Demand:
      • Symantec Endpoint Protection 14 Webinar Series Part 1 of 5: Addressing Unknown Threats with Advanced Machine Learning http://bit.ly/SEP14Series0126

      • Symantec Endpoint Protection 14 Webinar Series: Part 2 of 5: Block The Risk Of Ransomware http://bit.ly/Part2Webinar0223

      Read more >
    • AI-Based Hacking and Defenses in a World of an Ever-Growing Attack Surface
      AI-Based Hacking and Defenses in a World of an Ever-Growing Attack Surface Dr. Srinivas Mukkamala, Co-founder & CEO, RiskSense Inc. Upcoming: Mar 14 2017 5:00 pm UTC 60 mins
    • The adoption of Internet of Things (IoT), Software-Defined Networks, and Microservices without proper security controls have created a broader attack surface for cyber adversaries, whereby a few infiltration vectors account for most compromises while facing less common and hard to detect infiltration vectors. In this context, Artificial Intelligence (AI) can bolster defenses by analyzing vast volumes of data and assist cyber security professionals in their day-to-day operations. However, the same tools can be leveraged by hackers to find their targets faster and launch attacks quicker to disrupt business operations and attack industrial controls.

      In this webinar, renowned cyber security expert Dr. Srinivas Mukkamala will discuss how “malicious AI” could make today’s “cyber carnage” even worse. He will share result from a research study that RiskSense conducted to illustrate how human expertise in combination with AI can be leveraged to mimic a human hacker to find vulnerable threat pairs and launch exploits at scale. Dr. Mukkamala will also discuss how to transition from the traditional human expert model to an AI-based interactive, and iterative model to defend against machine-driven high frequency attacks.

      About the Presenter:
      Dr. Srinivas Mukkamala is co-founder and CEO of RiskSense. He has been researching and developing security technologies for over 15 years, working on malware analytics (focuses on medical control systems and nontraditional computing devices), breach exposure management, Web application security, and enterprise risk reduction. Mukkamala was one of the lead researchers for CACTUS (Computational Analysis of Cyber Terrorism against the US). He has been published in over 120 peer-reviewed publications in the areas of information assurance, malware analytics, digital forensics, data mining, and bioinformatics. He has a patent on Intelligent Agents for Distributed Intrusion Detection System and Method of Practicing.

      Read more >
    • Tying cyber attacks to business processes, for faster mitigation
      Tying cyber attacks to business processes, for faster mitigation Prof. Avishai Wool Recorded: Jan 10 2017 4:00 pm UTC 56 mins
    • Time is not on your side when managing security for a global enterprise and facing down a relentless barrage of cyber attacks. So when confronted with multiple suspect alerts flagged by your SIEM solution, you need a way to easily sift through and identify the attacks that will most likely impact key business processes – and quickly take action.
      Presented by renowned industry expert Prof. Avishai Wool, this new webinar will cover security best practices for introducing business context into your organization’s incident response processes, and prioritizing and automating remediation efforts accordingly. This insight will give you the intelligence you need to reduce the time and cost of mitigating cyber attacks by orders of magnitude.
      In this webinar Professor Wool will cover how to:
      - Augment incident triage with critical business context to assess the severity, risk and potential business impact of an attack
      - Prioritize incident remediation efforts based on business risk
      - Neutralize impacted systems through zero-touch automation
      - Limit the lateral movement of an attacker in, out and across your network
      - Keep all stakeholders involved in the remediation process to reduce disruption to the business

      Read more >