Join Michael Gorelik, distinguished threat researcher and Morphisec Chief Technology Officer and Vice President of R&D, for a close look at top cyber threats targeting enterprises today. He will walk through the where, what and how of the leading attack vectors as well as explore ways to protect your company.
• Learn the primary attack vectors used by cybercriminals to infiltrate an organization
• Understand how different attack techniques work and what damage they can do
• Find out what protection methods work and where they fall short
• Get answers directly from our chief bad-guy researcher during the Q&
How to stop the primary point of entry.
70% of breaches start on endpoint devices. Unfortunately, gaps in protection exist when users and endpoints are off-network, often leaving AV as the only form of protection.
And reacting to malicious communications and code after attacks launch is simply too late.
It’s time to prevent, detect and respond to attacks targeting endpoints, both on and off your network before damage occurs.
Join Cisco security product experts, Meg Diaz, Joe Malenfant, and Neil Patel to learn how you can not only stop attacks before they occur, but contain and remediate threats that evade front-line defenses, anywhere your users travel.
Register today and reduce your risk of breaches on the endpoint.
What if I no longer was a white hat? What if I started to hack for fun and profit at other expense?
How would I do it? Could you catch me? How can you stop me?
Join this presentation and get a unique insight into the mind of the hackers trying to get into your systems and steal your information. Learn how it can be done, and what are the precautions and preventive measures you can take now to make sure your company is prepared for attack.
Learn how Dell EMC is helping customers protect endpoint data from data loss and attacks through using the Mozy backup solution. Many small to large customers use Mozy to protect critical information stored at the edge. Here are some of the things that will be covered in the session
•What is Mozy online Backup?
•Why are many of Dell EMC customers using Mozy to protect endpoint data?
•How does Mozy mitigate risk from a malware attack?
This demonstration shows a live ransomware attack and how it can be detected in real-time by Virsec, and thwarted by automatically restoring data through the NetApp SnapLock WORM drive system.Read more >
Cyber threats are at the top of mind for security professionals everywhere. With high-profile breaches on the rise and valuable customer information at stake, organizations worldwide are looking for ways to train their workforce to be cyber safe and better secure an ever-growing perimeter.
Join this panel of experts as they discuss:
- The biggest trends in cyber crime
- Impact of Cryptocurrencies
- Breaches and preventing future fraud and cyber attacks
- Advancements in security technology
- Why security awareness training should be a key part of your overall data protection strategy
- Dave Klein, Senior Director Security Engineering and Architecture at GuardiCore
- Troy Vennon, Cyber Threat Engineer, Columbus Collaboratory
Ransomware continues to experience record growth in 2017. Traditional solutions aren't enough and can't keep up with hundreds of thousands of new malware versions created daily. File-less attacks and exploits are now the most common vectors for successful ransomware attacks and most companies aren't protected.
Learn the three strategies Avidia Bank implemented to shut out today's sophisticated threats and how you can apply them to protect your own organization:
Register now to learn more on:
- How ransomware is going fileless to get past protection
- What makes everyone a target
- Three protection strategies to minimize the risk to your organization
Jack Danahy is the co-founder and CTO of Barkly, the Endpoint Protection Platform that delivers the strongest protection with the fewest false positives and simplest management. A 25-year innovator in computer, network and data security, Jack was previously the founder and CEO of two successful security companies: Qiave Technologies (acquired by Watchguard Technologies in 2000) and Ounce Labs (acquired by IBM in 2009). Jack is a frequent writer and speaker on security and security issues, and has received multiple patents in a variety of security technologies. Prior to founding Barkly, he was the Director of Advanced Security for IBM, and led the delivery of security services for IBM in North America.
From attacks that abuse PowerShell to attacks that live exclusively in memory, “fileless” threats have become increasingly common and dangerous. They’re built to evade detection from even the most advanced defenses, but that doesn’t mean they can’t be stopped — or that they have to be difficult to understand.
Join us to learn how attackers are using fileless techniques to gain execution, persistence, and lateral movement, and what you can do to keep your company protected.
Encrypting files is where ransomware attacks end, not begin. Understanding the attack lifecycle can save your critical files from destruction.
Join this interactive Q&A session with Jacob Sendowski, Ph.D., to learn more about:
• How to use attacker behavior models to detect the precursors of ransomware, including lateral movement, reconnaissance behavior and command and control communications
• How detecting these precursors enables enterprise security teams to contain and remediate infected machines before ransomware attacks propagate throughout their organization and cause damage
About the Presenter
Jacob Sendowski is a Senior Product Manager at Vectra Networks where he is responsible for detections and algorithms as well as hardware platforms. Jacob was previously at Intel, where he held roles in both Intel Capital and Intel Labs. He has a Ph.D. in Electrical Engineering from Caltech.
In this webinar Jay Beale, co-founder and CTO of InGuardians, will demonstrate how an attacker gains access on a server running WordPress and then teach you how to break the same attack with a free, open source tool called AppArmor that’s been part of the Linux kernel for years.
With his black hat on, he’ll show you how to use Kali Linux to attack the WordPress server, where he’ll install a web shell and begin scanning for more machines to compromise.
Next, Jay will don his white hat and show you how to configure AppArmor to prevent that same attack.
Come to this BrightTalk session and get a sneak peak at Jay’s Black Hat training course!
Email remains the biggest entry point into your healthcare organization, and with medical records at least 10X as valuable as credit cards, potential payoffs are high. Security threats are real and debilitating – they can even affect patient care – and they aren’t going away anytime soon. Join us for Anatomy of an Email-Borne Attack where we'll paint the current healthcare threat landscape for attacks and demonstrate an actual live “hack.”Read more >
Cyber attacks don't just happen. You need an attacker who is motivated, has infrastructure, seeks resourcing and performs reconnaissance. And all this happens before the attack. Ironically, most security vendors focus on blocking or identifying activity at the point of attack. But what if you could identify attacks during development, during the hacker supply chain?
Clear and effective visibility into the attack chain would give security teams a dramatic ability to predict attacks, girding before the attack even begins. In this webinar, security researcher Ido Wulkan will help you understand where to look, what to look for and how to do it.
About the Presenter:
Ido has a decade of experience in intelligence research and analysis, focusing on the deep and dark web. Ido served in one of the leading intelligence units of the Israeli Defense Force (IDF) as a cyber intelligence analyst, where he gained intimate knowledge of various threat actors and their techniques. Following his service, Ido worked at several intelligence firms as an analyst and team leader, where he expanded his knowledge of cybercrime ecosystems. Ido now leads IntSights’ cyber intelligence analysts team, where he serves as a focal point for all IntSights’ intelligence.
This webinar will explore the current DDoS attack landscape, it will cover the basics of DDoS attacks, current trends including the most recent trends from the newly published 2015 Imperva Incapsula DDoS Report. We will also discuss a detailed analysis of one of today’s modern, multi-vector DDoS attacks. While dissecting this DDoS attack, the talk will explore the anatomy and timeline of the attack, as well as the steps used to mitigate each phase of the assault.This session will close with a review of the aspects of effective DDoS protection solutions used to combat these sophisticated denial of service attacks.Read more >
The increasing number of email-based cyber attacks on the banking and financial services sector, as well as the continuous evolution of these attacks, requires both Risk Management and Information Security professionals to be constantly vigilant - and prepared - to protect their organizations from these constantly changing, advanced threats.
This session will explore how prediction tools can observe and understand current trends of email-based abuse; recognize the greatest potential opportunities in terms of monetization and influence; and identify untapped criminal opportunities. We then will leverage these tools to evaluate the current environment and predict what types of attacks we are likely to see soon.
John Wagnon discusses the details of the top vulnerability listed in this year's OWASP Top 10 Security Risks: Injection Attacks. Learn what they are and how to guard against them.Read more >
Non-malware attacks – or attacks that exploit applications and processes legitimately running on systems – are not new, but they are increasingly a favorite of cybercriminals for one simple reason: They work.
Also known as fileless malware, non-malware attacks are stealthy techniques that are difficult to detect with traditional antivirus software and out-of-the-box software. Higher education institutions – with their trove of valuable data, including personally identifiable information (PII) – are a prime target for hackers, making them especially susceptible to non-malware attacks.
Watch this webinar and learn:
•How phishing and other tactics have evolved – and some of the top phishing lures
•The smartest three things you can do to defend your data against fileless malware
•How to train your employees to avoid becoming a victim of non-malware attacks
The impact of malware outbreaks in 2017 is short lived compared to the ones we saw a decade ago. One of the key observations in 2017 is we have seen an attack that was infectious across the Internet and also an attack that was not infectious but had similar significant impact.
Cyber epidemics are starting to afflict all business by impacting critical IT infrastructure. To increase the organization’s resilience against cyber-epidemics, you need to validate your attack surface and its susceptibility to attacks.
Cyber-attacks tend to resemble a power law distribution in which a few dozen infiltration vectors account for most breaches and a “long tail” consisting of a large number of less common infiltration vectors account for the rest. It is important to provide timely and accurate information to keep the number of infiltrations low and the impact to your business reduced.
What you will learn from this webinar:
- How to prioritize what is most important when an attack happens.
- Visibility into your attack surface and how to validate what the exposure is.
- How to establish a metric based risk management program.
About the Presenter:
Srinivas Mukkamala is one of the Co-founders and CEO of RiskSense, a cyber security spinoff of New Mexico Tech. Srinivas has been researching and developing security technologies for over 15 years, working on malware analytics (focus on medical control systems and nontraditional computing devices), breach exposure management, Web application security, and enterprise risk reduction.
Srinivas was one of the lead researchers for CACTUS (Computational Analysis of Cyber Terrorism against the US). Dr. Mukkamala has over 120 peer-reviewed publications in the areas of malware analytics, digital forensics, data mining, and bioinformatics. He has a patent on Intelligent Agents for Distributed Intrusion Detection System and Method of Practicing.
Join Albert Caballero, chief information security officer for HBO Latin America, to learn how to automatically pivot from real-time attack behavior detections in the Vectra UI to Carbon Black Response to expedite forensic investigation and isolate compromised hosts.
In this session you will learn:
- How the integration of Vectra and Cb Response automatically brings additional threat context and isolation status from Carbon Black into the Vectra UI, combining network and endpoint visibility for a better understanding of security incidents.
- Hear use cases and how the integration of Vectra and Carbon Black enables HBO Latin America to take real-time action against active threats and attacks – without requiring additional headcount.
Like many other attacks, the high-profile cyberattacks this year (Wannacrry, NotPetya) have exploited vulnerabilities for which patches and updates already existed.
Register for this short webinar for an overview on the biggest attacks of the year and learn more about how Symantec Patch Management provides visibility and compliance across today’s heterogenous environments to protect against similar attacks in the future.