What if I no longer was a white hat? What if I started to hack for fun and profit at other expense?
How would I do it? Could you catch me? How can you stop me?
Join this presentation and get a unique insight into the mind of the hackers trying to get into your systems and steal your information. Learn how it can be done, and what are the precautions and preventive measures you can take now to make sure your company is prepared for attack.
This webinar will explore the current DDoS attack landscape, it will cover the basics of DDoS attacks, current trends including the most recent trends from the newly published 2015 Imperva Incapsula DDoS Report. We will also discuss a detailed analysis of one of today’s modern, multi-vector DDoS attacks. While dissecting this DDoS attack, the talk will explore the anatomy and timeline of the attack, as well as the steps used to mitigate each phase of the assault.This session will close with a review of the aspects of effective DDoS protection solutions used to combat these sophisticated denial of service attacks.Read more >
IT pros in EMEA are feeling pressured to protect themselves from phishing and targeted attacks. In this webinar we will look at recent investigations into targeted and phishing attacks and their potential impact on businesses risks and options for remediation.Read more >
Gartner has recently alerted enterprise IT, security and mobility managers that Mobile Threat Defense (MTD) is necessary to defend enterprises in today’s threat environment. Learn first-hand about details of mobile device attacks that lure employees in with fake Pokemon Go apps. We will also discuss zero day attacks such as the recent Pegasus attack that used zero-day technologies to completely compromise mobile security and spy on all communications and data.Read more >
Proofpoint's Information Security platform takes an entirely new approach, using big data analysis techniques to identify and apply additional security controls to suspicious messages. Watch Proofpoint product experts demonstrate how to protect your organization using Targeted Attack Prevention, Policy-Based Email Encryption for DLP, and real-time email message tracing. Each of these solutions is designed to provide the necessary security tools to elevate email protection.Read more >
After a brief introduction to the world of SEO, we will dive into the different types of web application attacks and manipulations that are made to either degrade your competitor’s ranking or raise your own.Read more >
Cyber attacks are on the rise, and financial institutions are increasingly becoming targets of sophisticated attackers. Join this presentation and learn about the current cyber-attacks affecting the industry.
David Swan, EVP of the Defense Intelligence Group will discuss current attacks, attack trends and forecasts what banks and other financial institutions can expect in the near to middle term.
Phishing and Spear Phishing attacks are the number one starting point for most large data breaches. However, no traditional security technology is currently able to mitigate the risks associated with these type of threats. Join this webinar to learn why phishing attacks are so successful, what capabilities organizations need to carry out a forensic investigation and what questions you need to be able to answer following an attack to respond effectively.Read more >
In this webinar Andrew Shoemaker, a DDoS simulation expert from NimbusDDOS, gives you a rare glimpse into how hackers find the weak points in your defenses and exploit them to level devastating DDoS attacks. You'll see real world examples of the tactics and methods used to create tailored DDoS attacks that can bring down a targeted network or application, and learn how best to defend against them.Read more >
Cyber Attacks are increasing in frequency and sophistication. No longer content to just steal data, criminals are deploying ransomware everywhere and holding businesses hostage on a daily basis. To combat the threats, Regulators are pushing out warnings and recommendations, and IT needs to think and respond differently.
EMC Data Protection offers a wide range of solutions to provide strong defenses against these attacks. This session will walk through the risk, regulations and the solutions.
Email is the most popular communication tool, as well as the entry point for up to 95% of security breaches. As cyber criminals evolve their techniques, targeted, enterprise-facing email attacks are rapidly increasing, fueled by an almost inexhaustible supply of potential victims and the tremendous profits awaiting successful fraudsters. This talk will provide an overview of both the technical and psychological principles these criminals take advantage of, shedding light on why traditional defenses continue to fail. We will then describe a set of new defense mechanisms that enable enterprises to stop these attacks and review the results of early experiments with these approaches, which offer a new perspective on ways to prevent email fraud.Read more >
Over the last few months we have seen DDoS attacks become more ferocious and attackers more sophisticated. As DDoS threats continue to evolve, your traditional mitigation solution may not be enough to protect you.
Watch as we follow a fictitious attacker analysing a target, exploring and finding weaknesses. Experience how the attacker launches a DDoS attack with devastating effects. Learn about the advantages and limitations of various mitigation technologies, and be given a DDoS preparedness roadmap to help you navigate the DDoS landscape.
A DDoS attack is sometimes a smokescreen to cover up much more damaging activity such as theft or fraud. While you’re working frantically to mitigate the DDoS attack and get critical applications back online, cybercriminals could be working under the radar to break into your systems and conduct more malevolent activities.
Learn to listen to your network activity:
-Clues from DDoS attacks that will help you investigate threats
-Why organizations like FFIEC warn banks about the use of DDoS
-Best practices for DDoS protection
Based on on our extensive knowledge of leading practices and experience responding to critical security incidents, we would like to briefly discuss with you the topic of being “Response Ready”. Being prepared for a cyber attack is not easy and usually starts with looking within the organisation and checking your Response Readiness. Let’s talk briefly about your security operations center (SOC) and incident response (IR) capabilities. Maybe after the webinar you can analyse where your IR program needs to develop and how to get there.Read more >