Hi [[ session.user.profile.firstName ]]
Sort by:
    • Fileless Cyber Attacks Demystified
      Fileless Cyber Attacks Demystified Jack Danahy, CTO, Barkly Recorded: Oct 19 2017 5:00 pm UTC 39 mins
    • From attacks that abuse PowerShell to attacks that live exclusively in memory, “fileless” threats have become increasingly common and dangerous. They’re built to evade detection from even the most advanced defenses, but that doesn’t mean they can’t be stopped — or that they have to be difficult to understand.

      Join us to learn how attackers are using fileless techniques to gain execution, persistence, and lateral movement, and what you can do to keep your company protected.

      Read more >
    • Protect and Prevent: 3 strategies for blocking fileless attacks and exploits
      Protect and Prevent: 3 strategies for blocking fileless attacks and exploits Jack Danahy, CTO, Barkly Upcoming: Nov 28 2017 6:00 pm UTC 60 mins
    • Ransomware continues to experience record growth in 2017. Traditional solutions aren't enough and can't keep up with hundreds of thousands of new malware versions created daily. File-less attacks and exploits are now the most common vectors for successful ransomware attacks and most companies aren't protected.

      Learn the three strategies Avidia Bank implemented to shut out today's sophisticated threats and how you can apply them to protect your own organization:

      Register now to learn more on:

      - How ransomware is going fileless to get past protection
      - What makes everyone a target
      - Three protection strategies to minimize the risk to your organization


      Jack Danahy is the co-founder and CTO of Barkly, the Endpoint Protection Platform that delivers the strongest protection with the fewest false positives and simplest management. A 25-year innovator in computer, network and data security, Jack was previously the founder and CEO of two successful security companies: Qiave Technologies (acquired by Watchguard Technologies in 2000) and Ounce Labs (acquired by IBM in 2009). Jack is a frequent writer and speaker on security and security issues, and has received multiple patents in a variety of security technologies. Prior to founding Barkly, he was the Director of Advanced Security for IBM, and led the delivery of security services for IBM in North America.

      Read more >
    • Predict Ransomware Attacks Using AI
      Predict Ransomware Attacks Using AI Jacob Sendowski, Ph.D., Senior Product Manager at Vectra Recorded: Sep 27 2017 8:00 pm UTC 53 mins
    • Encrypting files is where ransomware attacks end, not begin. Understanding the attack lifecycle can save your critical files from destruction.

      Join this interactive Q&A session with Jacob Sendowski, Ph.D., to learn more about:
      • How to use attacker behavior models to detect the precursors of ransomware, including lateral movement, reconnaissance behavior and command and control communications
      • How detecting these precursors enables enterprise security teams to contain and remediate infected machines before ransomware attacks propagate throughout their organization and cause damage

      About the Presenter
      Jacob Sendowski is a Senior Product Manager at Vectra Networks where he is responsible for detections and algorithms as well as hardware platforms. Jacob was previously at Intel, where he held roles in both Intel Capital and Intel Labs. He has a Ph.D. in Electrical Engineering from Caltech.

      Read more >
    • Using the Hacker Supply Chain to Get Ahead of the Attack [Threat Hunting Series]
      Using the Hacker Supply Chain to Get Ahead of the Attack [Threat Hunting Series] Ido Wulkan, Security Researcher and Intelligence Team Lead at IntSights Recorded: Jun 6 2017 6:00 pm UTC 42 mins
    • Cyber attacks don't just happen. You need an attacker who is motivated, has infrastructure, seeks resourcing and performs reconnaissance. And all this happens before the attack. Ironically, most security vendors focus on blocking or identifying activity at the point of attack. But what if you could identify attacks during development, during the hacker supply chain?

      Clear and effective visibility into the attack chain would give security teams a dramatic ability to predict attacks, girding before the attack even begins. In this webinar, security researcher Ido Wulkan will help you understand where to look, what to look for and how to do it.

      About the Presenter:
      Ido has a decade of experience in intelligence research and analysis, focusing on the deep and dark web. Ido served in one of the leading intelligence units of the Israeli Defense Force (IDF) as a cyber intelligence analyst, where he gained intimate knowledge of various threat actors and their techniques. Following his service, Ido worked at several intelligence firms as an analyst and team leader, where he expanded his knowledge of cybercrime ecosystems. Ido now leads IntSights’ cyber intelligence analysts team, where he serves as a focal point for all IntSights’ intelligence.

      Read more >
    • A Guide to Predicting Cyber Attacks
      A Guide to Predicting Cyber Attacks Markus Jakobsson, Chief Scientist at Agari Recorded: May 16 2017 4:00 pm UTC 49 mins
    • The increasing number of email-based cyber attacks on the banking and financial services sector, as well as the continuous evolution of these attacks, requires both Risk Management and Information Security professionals to be constantly vigilant - and prepared - to protect their organizations from these constantly changing, advanced threats.

      This session will explore how prediction tools can observe and understand current trends of email-based abuse; recognize the greatest potential opportunities in terms of monetization and influence; and identify untapped criminal opportunities. We then will leverage these tools to evaluate the current environment and predict what types of attacks we are likely to see soon.

      Read more >
    • Lessons of a Cyber Attack to Prevent Future Cyber Epidemics
      Lessons of a Cyber Attack to Prevent Future Cyber Epidemics Srinivas Mukkamala PhD., CEO and Co-Founder RiskSense Recorded: Nov 14 2017 9:00 pm UTC 47 mins
    • The impact of malware outbreaks in 2017 is short lived compared to the ones we saw a decade ago. One of the key observations in 2017 is we have seen an attack that was infectious across the Internet and also an attack that was not infectious but had similar significant impact.

      Cyber epidemics are starting to afflict all business by impacting critical IT infrastructure. To increase the organization’s resilience against cyber-epidemics, you need to validate your attack surface and its susceptibility to attacks.

      Cyber-attacks tend to resemble a power law distribution in which a few dozen infiltration vectors account for most breaches and a “long tail” consisting of a large number of less common infiltration vectors account for the rest. It is important to provide timely and accurate information to keep the number of infiltrations low and the impact to your business reduced.

      What you will learn from this webinar:

      - How to prioritize what is most important when an attack happens.
      - Visibility into your attack surface and how to validate what the exposure is.
      - How to establish a metric based risk management program.

      About the Presenter:
      Srinivas Mukkamala is one of the Co-founders and CEO of RiskSense, a cyber security spinoff of New Mexico Tech. Srinivas has been researching and developing security technologies for over 15 years, working on malware analytics (focus on medical control systems and nontraditional computing devices), breach exposure management, Web application security, and enterprise risk reduction.

      Srinivas was one of the lead researchers for CACTUS (Computational Analysis of Cyber Terrorism against the US). Dr. Mukkamala has over 120 peer-reviewed publications in the areas of malware analytics, digital forensics, data mining, and bioinformatics. He has a patent on Intelligent Agents for Distributed Intrusion Detection System and Method of Practicing.

      Read more >
    • New Attack Vector “BlueBorne” Exposes 5B+ Devices – Learn How It Works
      New Attack Vector “BlueBorne” Exposes 5B+ Devices – Learn How It Works Nadir Izrael, CTO, Armis Recorded: Sep 20 2017 5:00 pm UTC 59 mins
    • As Fortune reported on Tuesday, the new Blueborne attack vector exposed 5B+ devices to hacking, endangering major mobile, desktop, and IoT operating systems, including Android, iOS, Windows, and Linux. Blueborne attacks devices via Bluetooth in a manner never seen before, and spreads through the air (airborne). Users do not need to be on the Internet, take any action, or even pair with another device to be impacted. Blueborne has been called “Bluetooth’s Stagefright moment.”

      Watch this webinar to learn:

      • Understand the 8 zero-day vulnerabilities (4 critical)
      • Which devices are affected
      • How Blueborne can take over a device
      • How BlueBorne can be used for a Man in the Middle Attack
      • What’s involved in protecting your network

      About the Speaker:
      As co-founder and CTO, Nadir Izrael guides the technology vision behind Armis to protect unmanaged and IoT devices. He co-founded the company in 2015 with its CEO, Yevgeny Dibrov. Prior to Armis, worked at Google as senior software engineer. Before Google, Nadir spent six years in the Israeli army, specifically in unit 8200, where he designed and programmed software projects and systems, served as team leader and did officer’s training attaining the rank of captain.

      Read more >
    • DDoS Attacks and Application Hacks
      DDoS Attacks and Application Hacks Jonathan George, Jonathan Binick, Scott Altman, Martin Brewer, David Remington Recorded: Aug 18 2017 7:00 pm UTC 59 mins
    • Are you prepared to deal with attacks against your network or applications?
      Join us for an interactive panel discussion and challenge our experts with the questions that keep you up at night.
      During this panel, you will learn:
      •How to bolster your defenses and ensure mitigation consistency through a Managed Service model
      •How to protect your applications and your organization
      •What questions you should be asking as you develop your plan
      Featured F5 Speakers:
      •Jonathan George – Senior Product Marketing Manager
      •Scott Altman – Director, Business Development Silverline
      •David Remington – Security Solution Architect
      •Martin Brewer – Senior Manager, Product Management
      •Jonathan Binick – Manager, Security Operations Center

      Read more >
    • NotPetya Attack - Cybercrime or Cyberwar?
      NotPetya Attack - Cybercrime or Cyberwar? Malcolm Harkins (Cylance), Erika Noerenberg (LogRhythm Labs), Nadir Izrael (Armis), Michael Landewe (Avanan) Recorded: Jul 12 2017 8:00 pm UTC 64 mins
    • The NotPetya pandemic that started in late June and disrupted the operations across companies, utilities, government agencies across France, Russia, Spain, Ukraine and the United States, happened just weeks after the WannaCry ransomware attack. Was NotPetya a financially motivated ransomware attack or an act of cyberwar?

      Join this interactive Q&A session with industry experts and find out the answers to your Petya/NotPetya questions. The topics up for discussion will include:
      - Difference between cybercrime and cyberwar
      - Industries targeted in the NotPetya attack
      - Short-term and long-term impact of this attack
      - Requirements and recommendations for strengthening cyber defense

      Speakers:
      - Malcolm Harkins, CSO of Cylance
      - Erika Noerenberg, Threat Research Engineer, LogRhythm Labs
      - Nadir Izrael, CTO of Armis

      Moderator:
      - Michael Landewe, Co- Founder of Avanan Cloud Security

      Read more >
    • NotPetya - 3 Steps to Prepare for the Next Ransomware Attack
      NotPetya - 3 Steps to Prepare for the Next Ransomware Attack Nadir Izrael, CTO & Co-Founder, Armis Recorded: Jul 17 2017 4:00 pm UTC 44 mins
    • Much of the world was still scrambling to patch and clean up from WannaCry ransomware attack when the (not)Petya attack hit. While (not)Petya relied on Eternal Blue, just as WannaCry did, it had a few new tricks.
      - No Kill Switch – There doesn’t appear to be a kill switch URL, so (not)Petya can’t be shut down simply by purchasing a domain name.
      - Lateral Movement – The new attack includes additional exploits so it can move laterally through the network and infect other devices.
      - New Unmanaged Devices – Reports say the attack hit point of sale devices and ATMs, in addition to the laptops and desktops.

      Join Nadir Izrael, CTO of Armis, and former Captain in the Israel Intelligence 8200 Group, to discuss the 3 steps you should take to prepare for the next ransomware attack. And, why your weakest link now exposures your entire enterprise.

      About the Presenter:
      As co-founder and CTO, Nadir Izrael guides the technology vision behind Armis to protect unmanaged and IoT devices. He co-founded the company in 2015 with its CEO, Yevgeny Dibrov. Prior to Armis, worked at Google as senior software engineer. Before Google, Nadir spent six years in the Israeli army, specifically in unit 8200, where he designed and programmed software projects and systems, served as team leader and did officer’s training attaining the rank of captain.

      Read more >