Hi [[ session.user.profile.firstName ]]
Sort by:
    • NotPetya Attack - Cybercrime or Cyberwar?
      NotPetya Attack - Cybercrime or Cyberwar? Malcolm Harkins (Cylance), Erika Noerenberg (LogRhythm Labs), Nadir Izrael (Armis), Michael Landewe (Avanan) Upcoming: Sep 27 2017 12:00 am UTC 60 mins
    • The NotPetya pandemic that started in late June and disrupted the operations across companies, utilities, government agencies across France, Russia, Spain, Ukraine and the United States, happened just weeks after the WannaCry ransomware attack. Was NotPetya a financially motivated ransomware attack or an act of cyberwar?

      Join this interactive Q&A session with industry experts and find out the answers to your Petya/NotPetya questions. The topics up for discussion will include:
      - Difference between cybercrime and cyberwar
      - Industries targeted in the NotPetya attack
      - Short-term and long-term impact of this attack
      - Requirements and recommendations for strengthening cyber defense

      Speakers:
      - Malcolm Harkins, CSO of Cylance
      - Erika Noerenberg, Threat Research Engineer, LogRhythm Labs
      - Nadir Izrael, CTO of Armis

      Moderator:
      - Michael Landewe, Co- Founder of Avanan Cloud Security

      Read more >
    • Web App Attacks: Stories from the SOC
      Web App Attacks: Stories from the SOC Paul Fletcher, Cyber Security Evangelist at Alert Logic Recorded: Aug 1 2017 4:00 pm UTC 58 mins
    • It’s well known that web application attacks are the leading cause of breaches, according to Verizon’s 2017 Data Breach Investigations Report.

      Register for this eye-opening webinar presented by Paul Fletcher, Cyber Security Evangelist at Alert Logic, who will provide you with a global perspective of the current state of web application vulnerabilities and exploits. During this webinar you will gain insight on:

      • How attackers use reconnaissance tactics to identify a vulnerable target
      • Attack methodologies and how vulnerable web apps can be leveraged by attackers to gain privileged access
      • How to effectively utilize your security tactics to better protect your web apps
      • How reconnaissance is used by attacks to discover and pinpoint systems to compromise
      • Remediation strategies to help defend against web apps attacks

      Read more >
    • Teaming Together to Prevent Attacks and Protect Your Data
      Teaming Together to Prevent Attacks and Protect Your Data tbc Upcoming: Oct 5 2017 12:00 pm UTC 60 mins
    • Targeted attacks — including advanced persistent threats (APTs) — and today’s sophisticated malware threats are one of the biggest challenges facing customer’s as the threats multiply and create unique compromises within their networks. This creates challenges for traditional security technologies to reliably identify these new class of threats. Even when a threat is detected, there is still the issue of slow response times and extended periods of exposure, as administrators typically need to manually coordinate and configure the necessary changes to their security infrastructure.

      Please join Palo Alto Networks and Splunk as we work together to deliver an advanced visibility, reporting and monitoring solution for intelligent security analysis that addresses this challenge and delivers new tools to quickly identify and analyze this new class of threats. We will show you how this integration insures better threat response time, and how to automate the steps needed to block malicious sources and quarantine compromised devicesyou through how Palo Alto Networks and Splunk.

      Key Benefits:
      - Advanced security and visibility in the cloud, on premise, or hybrid model
      - Accelerated threat response and enhanced threat detection
      - Security visualization, monitoring and analysis
      - Demo to show you how to identify ransomware and correlate IOC data through the app and use adaptive response to take actions

      Read more >
    • NotPetya Attack - Cybercrime or Cyberwar?
      NotPetya Attack - Cybercrime or Cyberwar? Malcolm Harkins (Cylance), Erika Noerenberg (LogRhythm Labs), Nadir Izrael (Armis), Michael Landewe (Avanan) Recorded: Jul 12 2017 8:00 pm UTC 64 mins
    • The NotPetya pandemic that started in late June and disrupted the operations across companies, utilities, government agencies across France, Russia, Spain, Ukraine and the United States, happened just weeks after the WannaCry ransomware attack. Was NotPetya a financially motivated ransomware attack or an act of cyberwar?

      Join this interactive Q&A session with industry experts and find out the answers to your Petya/NotPetya questions. The topics up for discussion will include:
      - Difference between cybercrime and cyberwar
      - Industries targeted in the NotPetya attack
      - Short-term and long-term impact of this attack
      - Requirements and recommendations for strengthening cyber defense

      Speakers:
      - Malcolm Harkins, CSO of Cylance
      - Erika Noerenberg, Threat Research Engineer, LogRhythm Labs
      - Nadir Izrael, CTO of Armis

      Moderator:
      - Michael Landewe, Co- Founder of Avanan Cloud Security

      Read more >
    • NotPetya - 3 Steps to Prepare for the Next Ransomware Attack
      NotPetya - 3 Steps to Prepare for the Next Ransomware Attack Nadir Izrael, CTO & Co-Founder, Armis Recorded: Jul 17 2017 4:00 pm UTC 44 mins
    • Much of the world was still scrambling to patch and clean up from WannaCry ransomware attack when the (not)Petya attack hit. While (not)Petya relied on Eternal Blue, just as WannaCry did, it had a few new tricks.
      - No Kill Switch – There doesn’t appear to be a kill switch URL, so (not)Petya can’t be shut down simply by purchasing a domain name.
      - Lateral Movement – The new attack includes additional exploits so it can move laterally through the network and infect other devices.
      - New Unmanaged Devices – Reports say the attack hit point of sale devices and ATMs, in addition to the laptops and desktops.

      Join Nadir Izrael, CTO of Armis, and former Captain in the Israel Intelligence 8200 Group, to discuss the 3 steps you should take to prepare for the next ransomware attack. And, why your weakest link now exposures your entire enterprise.

      About the Presenter:
      As co-founder and CTO, Nadir Izrael guides the technology vision behind Armis to protect unmanaged and IoT devices. He co-founded the company in 2015 with its CEO, Yevgeny Dibrov. Prior to Armis, worked at Google as senior software engineer. Before Google, Nadir spent six years in the Israeli army, specifically in unit 8200, where he designed and programmed software projects and systems, served as team leader and did officer’s training attaining the rank of captain.

      Read more >
    • NotPetya: Ransomware Or a Cyber Attack in Disguise
      NotPetya: Ransomware Or a Cyber Attack in Disguise Scott Crawford (451 Research), Joseph Carson (Thycotic), Omri Moyal (Minerva), Dan Daggett (Phantom Cyber) Recorded: Jul 10 2017 8:00 pm UTC 58 mins
    • The major ransomware attack that spread across the world in late June struck large pharmaceutical companies, Chernobyl radiation detection systems, the Kiev metro, an airport, banks, hospitals and government agencies. Was this a financially motivated cyber attack or something more sinister? Is the worst over or is there more to come?

      Join this panel of cybersecurity experts as they go over the details of this attack, what it means for organizations worldwide and how to better protect against ransomware.

      Topics up for discussion:
      - Detailed account of this cyber attack
      - What is NotPetya? How is it different from Petya and Wannacry?
      - What is the impact of this ransomware attack?
      - What you should do today to better protect your organization

      Speakers:
      - Joseph Carson, Chief Security Scientist at Thycotic
      - Omri Moyal, Co-Founder & Vice President of Research, Minerva
      - Dan Daggett, Security Solution Architect, Phantom Cyber

      Moderator:
      - Scott Crawford, Research Director, Information Security Channel at 451 Research

      Read more >
    • Financial threats – The dark side of modern malware attacks
      Financial threats – The dark side of modern malware attacks David Balcar, Security Evangelist, Kaspersky Lab Recorded: Jun 28 2017 3:00 am UTC 38 mins
    • The number of sophisticated attacks targeting banks and financial institutions is growing at a rapid pace. Any failure to quickly detect and neutralize these threats puts an organization at risk for huge losses. In fact, only 53% of businesses feel that financial organizations do enough to protect their information and 74% of companies choose a financial organization based on their security reputation. However, not all is lost; Rapid advancements in analytic capabilities changed the way data scientists, security teams and fraud analysts fight threats targeting their organizations.
      Please join our special guest – David Balcar – a globally recognized security professional, as he shares real world experience of cyber security in financial institutions.
      Here are some of the topics David is going to discuss:
      • Security budgets: current trends
      • Notable cases of threats affecting financial institutions: DDoS attack on TalkTalk
      • Targeted attacks and Mobile threats landscape
      • Adaptive Security Strategy
      • Kaspersky Enterprise portfolio - Talk about KSIS, KESS KSDC & KATA solutions

      Read more >
    • The Best Defense Against Cyber Attacks You’ve Never Heard Of...
      The Best Defense Against Cyber Attacks You’ve Never Heard Of... Scott Crawford, Research Director of Information Security, 451 Research | Allan Carey, VP of Business Development, PhishMe Recorded: Nov 9 2016 5:00 pm UTC 47 mins
    • With all the attention paid to the technological sophistication of cyber attacks, as well as to the new technologies arising to strengthen defense, one fact often gets overlooked: Security is fundamentally about people.

      The adversary is an intelligent actor – while the target is often human as well. The compromise of sensitive information or functionality may be in the crosshairs, but it’s people that are often targeted to gain a foothold inside the victim organization, through techniques such as phishing or social engineering. But here’s the secret: In this targeting lies one of the most unsuspected – but potentially rich – assets to defense an organization can have.

      In this webcast, Scott Crawford, Research Director of Information Security for 451 Research, and Allan Carey, Vice President of Business Development from PhishMe take a closer look at:

      •How the targeting of people through phishing, impersonation attacks and social engineering can be leveraged to improve security and resistance to attack
      •New tactics and tools that make the most of human engagement to defend organizations against these exploits
      •Ways to enhance incident response by incorporating human interactions with malicious activity into the evidence chain

      Read more >
    • Financial threats – The dark side of modern malware attacks
      Financial threats – The dark side of modern malware attacks David Balcar, Security Evangelist, Kaspersky Lab Recorded: Jun 27 2017 1:00 pm UTC 38 mins
    • The number of sophisticated attacks targeting banks and financial institutions is growing at a rapid pace. Any failure to quickly detect and neutralize these threats puts an organization at risk for huge losses. In fact, only 53% of businesses feel that financial organizations do enough to protect their information and 74% of companies choose a financial organization based on their security reputation. However, not all is lost; Rapid advancements in analytic capabilities changed the way data scientists, security teams and fraud analysts fight threats targeting their organizations.
      Please join our special guest – David Balcar – a globally recognized security professional, as he shares real world experience of cyber security in financial institutions.
      Here are some of the topics David is going to discuss:
      •Security budgets: current trends
      •Notable cases of threats affecting financial institutions: DDoS attack on TalkTalk
      • Targeted attacks and Mobile threats landscape
      • Adaptive Security Strategy
      • Kaspersky Enterprise portfolio - Talk about KSIS, KESS KSDC & KATA solutions

      Read more >
    • Detect & Respond to Advanced & Targeted Attacks [Microsoft Tech Summit]
      Detect & Respond to Advanced & Targeted Attacks [Microsoft Tech Summit] Microsoft Recorded: Jun 6 2017 9:10 pm UTC 69 mins
    • Microsoft Windows Defender Advanced Threat Protection (ATP) is a new service built into Windows 10 enabling enterprises to detect, investigate, and respond to advanced attacks on their networks. Windows Defender ATP adds a new "post-breach" layer of protection to the Windows 10 security stack. Combining client technology with cloud-based analytics, Windows Defender ATP is able to detect attackers and threats that have evaded other defenses, and enables enterprises to investigate the potential scope of breach across endpoints, and providing relevant Threat Intelligence and response recommendations. In this session we will show you an end-to-end demo, starting with an attack and investigating the attack using the Windows Defender ATP portal.

      Read more >