What if I no longer was a white hat? What if I started to hack for fun and profit at other expense?
How would I do it? Could you catch me? How can you stop me?
Join this presentation and get a unique insight into the mind of the hackers trying to get into your systems and steal your information. Learn how it can be done, and what are the precautions and preventive measures you can take now to make sure your company is prepared for attack.
Learn how Dell EMC is helping customers protect endpoint data from data loss and attacks through using the Mozy backup solution. Many small to large customers use Mozy to protect critical information stored at the edge. Here are some of the things that will be covered in the session
•What is Mozy online Backup?
•Why are many of Dell EMC customers using Mozy to protect endpoint data?
•How does Mozy mitigate risk from a malware attack?
This webinar will explore the current DDoS attack landscape, it will cover the basics of DDoS attacks, current trends including the most recent trends from the newly published 2015 Imperva Incapsula DDoS Report. We will also discuss a detailed analysis of one of today’s modern, multi-vector DDoS attacks. While dissecting this DDoS attack, the talk will explore the anatomy and timeline of the attack, as well as the steps used to mitigate each phase of the assault.This session will close with a review of the aspects of effective DDoS protection solutions used to combat these sophisticated denial of service attacks.Read more >
The increasing number of email-based cyber attacks on the banking and financial services sector, as well as the continuous evolution of these attacks, requires both Risk Management and Information Security professionals to be constantly vigilant - and prepared - to protect their organizations from these constantly changing, advanced threats.
This session will explore how prediction tools can observe and understand current trends of email-based abuse; recognize the greatest potential opportunities in terms of monetization and influence; and identify untapped criminal opportunities. We then will leverage these tools to evaluate the current environment and predict what types of attacks we are likely to see soon.
Join us in a live webinar as Jens Monrad explores trends that define today’s threat landscape based on Mandiant’s investigation of last year’s successful cyber attacks.
Register today and get insights into:
•New phishing trends breaching today’s companies
•Changes in modern attack telemetry and methodology
•Intelligence-led insights into emerging global threats
•Modern defensive strategies to better protect your organisation
•How GDPR is changing business in EMEA
All applications have vulnerabilities and attackers are incented to find them. Once the vulnerability has been discovered, the longer it remains unpatched, the greater the risk of a breach, potential loss of information, and damage to reputation.
Join us to learn what can be done to block exploit attacks on day zero:
• What behaviors and techniques are used to block attacks
• Why exploit prevention plays a critical part in endpoint protection
• How Memory Exploit Mitigation works
Then see Memory Exploit Mitigation in action with a demo Symantec Endpoint Protection.
No organization is immune to a ransomware attack. In recent months, nearly half of all malware blocked by Mimecast for its 20,000 customers has been ransomware.
The motivation to pay can be strong, particularly given issues such as criticality of business assets, digital infrastructure, or even safety of life in some cases – but a far better strategy is to be prepared for the threat, before ransomware strikes.
How ready is your organization to face a ransomware attack? Join Scott Crawford, Research Director of information Security at 451 Research, and Matthew Gardiner, Senior Product Marketing Manager with Mimecast to explore:
-The impact of ransomware: Just how serious a threat is it?
-How could ransomware get into your organization?
-Why is ransomware happening more now than ever before?
-How can you best defend against a ransomware attack…before it locks up your critical information assets?
Highly-targeted, low volume spear phishing--or business email compromise (BEC)--attacks that impersonate executives and business partners to trick employees are the biggest cyber threat organisations face today. This is not news.
But what may come as a surprise is that the vast majority of BEC attacks are preventable. According to Gartner, Secure Email Gateways are struggling to address social engineering attacks with no payload. But things are changing. New technology can now surpass people and process initiatives to proactively protect email channels, while also removing the guesswork for users.
In this webinar, you’ll learn:
- Why email spoofing works
- What the current BEC trends and attack methods are
- How Proofpoint’s new Email Fraud Defense solution can identify and block BEC attacks before they hit the inbox
With all the attention paid to the technological sophistication of cyber attacks, as well as to the new technologies arising to strengthen defense, one fact often gets overlooked: Security is fundamentally about people.
The adversary is an intelligent actor – while the target is often human as well. The compromise of sensitive information or functionality may be in the crosshairs, but it’s people that are often targeted to gain a foothold inside the victim organization, through techniques such as phishing or social engineering. But here’s the secret: In this targeting lies one of the most unsuspected – but potentially rich – assets to defense an organization can have.
In this webcast, Scott Crawford, Research Director of Information Security for 451 Research, and Allan Carey, Vice President of Business Development from PhishMe take a closer look at:
•How the targeting of people through phishing, impersonation attacks and social engineering can be leveraged to improve security and resistance to attack
•New tactics and tools that make the most of human engagement to defend organizations against these exploits
•Ways to enhance incident response by incorporating human interactions with malicious activity into the evidence chain
Mobile device users interact with numerous Wi-Fi networks at work, home, airports, coffee shops and more. Users often accept terms and conditions without realizing the risk of data-loss.
Join this webinar to understand:
-The common vulnerabilities that users are exposed to when traveling
-How to get visibility into all remote attacks
-How to fight threats before they do harm
IT pros in EMEA are feeling pressured to protect themselves from phishing and targeted attacks. In this webinar we will look at recent investigations into targeted and phishing attacks and their potential impact on businesses risks and options for remediation.Read more >
What we know and have trained users about phishing attacks has changed. Old methods no longer apply.
IT teams have deployed filters and taught our users to detect phishing attacks by scanning for suspicious URLs, spoofed login pages, and unrecognized senders. We've told people to change passwords, turn on two factor authentication and watch for suspicious logins.
None of these methods can defend against the next generation of automated, malicious API-based phishing attacks that are invisible to users and unmonitored by SaaS.
Once exclusive to advanced state-sponsored actors, the recent Google Docs worm pushed this sophisticated method into the headlines.
In this webinar we will dig deep into the next generation of phishing attack and describe the new methods every IT team must deploy to defend against them. Because the vulnerability is not unique to Google, we will also discuss Office 365, Box, Salesforce and other popular business apps.
Distributed Denial of Service (DDoS) attacks have moved well beyond brute force attacks and continue to evolve - and continue to cause significant business disruption. Application level DDoS attacks evade simple rate-based detection and filtering approaches. They’re targeting business-critical services such as DNS. Ransomware, a denial-of-service attack that focuses on data, is a growing delivery method for cyber crime. Recovery from any of these forms of DDoS is always complex and labor intensive - prevention and mitigation are key.
Attend this webinar and gain key insights as SANS Institute's John Pescatore discusses the latest trends in DDoS attacks and Infoblox's DNS pioneer Cricket Liu discusses the importance of protecting your infrastructure from internal and external DNS attacks.
Focus of the talk:
The current global political climate and the increased number of cyber attacks associated with nation states and revelations from whistleblowers such as WikiLeaks. The strategies and potential reasons for such attacks – We are seeing a focus shifting from financial gain
to political power, control and mass surveillance.
A view of the technologies utilised and targeted to perform the attacks such as malware targets such as iPhones, Android devices and smart TVs and malware on Windows, Osx, Linux etc
The talk is aimed at those with a general interest in Cyber Security and how political gain is firmly intertwined and a tool utilised in state sponsored cyber attacks indiscriminately against corporations, criminals and citizens alike.
Indy possesses over 14 years’ experience, having worked in both
operational and consulting positions at FTSE100 and Fortune 500
organisations including AXA, Deutsche Bank, PwC, Accenture,
Mercedes-Benz, Jaguar Land Rover and many other world leading
His experience includes leadership positions in information/
cybersecurity transformation, risk assurance, crisis management
(pre and post incident), assurance, audit, governance, risk and
Gartner has recently alerted enterprise IT, security and mobility managers that Mobile Threat Defense (MTD) is necessary to defend enterprises in today’s threat environment. Learn first-hand about details of mobile device attacks that lure employees in with fake Pokemon Go apps. We will also discuss zero day attacks such as the recent Pegasus attack that used zero-day technologies to completely compromise mobile security and spy on all communications and data.Read more >
Want to keep your cloud-based web applications in Amazon Web Services from getting hacked? Then you do not want to miss this live webinar with a demonstration of Alert Logic Cloud Defender.
With the rapid rise of web application attacks, which is the number one source of data breaches, securing cloud-based web applications is a challenge. In order to fully protect your web applications in the cloud, it is important to know the risks, select the right security tool, and understand your role in the shared responsibility for security.
Join Matt Curie, Solution Architect at Alert Logic, for an in-depth discussion on steps that you can take to harden your environment against modern cyber threats.
In the webinar you will learn:
- How the threat landscape has changed with the emergence of public cloud
- How Alert Logic can help organizations deal with increasing web application attacks
- View a live demo of Alert Logic Cloud Defender