Join Michael Gorelik, distinguished threat researcher and Morphisec Chief Technology Officer and Vice President of R&D, for a close look at top cyber threats targeting enterprises today. He will walk through the where, what and how of the leading attack vectors as well as explore ways to protect your company.
• Learn the primary attack vectors used by cybercriminals to infiltrate an organization
• Understand how different attack techniques work and what damage they can do
• Find out what protection methods work and where they fall short
• Get answers directly from our chief bad-guy researcher during the Q&
Most security solutions look for known threats, or identifiable malware that can be stopped at the perimeter. But today’s advanced hackers are increasingly using techniques to infiltrate networks and applications with benign-looking data or scripts that manipulate legitimate processes and only become weaponized when they when applications are running. The recent explosion of fileless and memory-based attacks including WannaCry, NotPetya, Industroyer and others have effectively exploited these techniques to bypass legacy security.
Learn from Virsec security experts how these attacks leverage benign-looking input to corrupt processes, escalate privileges, hijack control of internal systems, and steal valuable data. Also discussed will be new tools like Virsec that identify and defend against weaponized code in real-time at the application level.
The multitude of recent cyberattacks have a number of things in common: they are sophisticated, multi-pronged, use fileless techniques, and target applications at in process memory – largely invisible to conventional security products.
Attacks including WannaCry, Petya, NotPetya, SystemD, Industroyer, and Apache Struts all leveraged memory-based attacks to infiltrate, pivot, and hijack valuable data. What used to be viewed as arcane, theoretical attacks have now become easily accessible through the Shadow Brokers leak of advanced memory corruption tool kits.
Learn from Virsec experts:
•Why memory attacks are under the radar of most security
•How to map correct memory usage and detect deviations
•New models for protecting applications from the inside
Atiq Raza, CEO of Virsec and tech industry luminary, discusses a unique approach to protecting against today's advanced fileless and memory attacks in real-time.Read more >
Cyber threats are at the top of mind for security professionals everywhere. With high-profile breaches on the rise and valuable customer information at stake, organizations worldwide are looking for ways to train their workforce to be cyber safe and better secure an ever-growing perimeter.
Join this panel of experts as they discuss:
- The biggest trends in cyber crime
- Impact of Cryptocurrencies
- Breaches and preventing future fraud and cyber attacks
- Advancements in security technology
- Why security awareness training should be a key part of your overall data protection strategy
- Dave Klein, Senior Director Security Engineering and Architecture at GuardiCore
- Craig Dods, Chief Architect for Security, Juniper Networks' Strategic Verticals
- Troy Vennon, Cyber Threat Engineer, Columbus Collaboratory
- Jeannie Warner, Security Manager, WhiteHat Security
The email threat landscape is changing. Impersonation attacks and malicious URLs are becoming more popular.
This FireEye webinar features Ken Bagnall, VP Email Security, FireEye and Levi Lloyd, Senior Manager, Detection Services, FireEye who will address changes in email attack tactics:
• How phishing and impersonation attacks are evolving.
• How online/email scams develop.
• What the future of impersonation is.
• What has the best chance of winning against these attacks.
• What techniques are used to detect and stop phishing and impersonation attacks.
Attendees will receive the new FireEye report Changes in Email Attack
Tactics: Based on Data from July to December of 2017.
Though Ransomware was the clear malware du jour for much of 2017, new Proofpoint research focused on the healthcare industry market suggests that this attack vector is subsiding and that healthcare will have to pivot to address a rapidly evolving threat environment.
Join us for a discussion of:
- Just released research that outlines healthcare's most likely threat vectors of 2018
- How to leverage technology to mitigate against the rising tide of email fraud current plaguing healthcare
- Isolation solutions that allow clinicians to use personal messaging applications WITHOUT compromising the security of the health institution
- New techniques that allow meaningful cyber awareness training without adversely impacting clinical workflow
How to stop the primary point of entry.
70% of breaches start on endpoint devices. Unfortunately, gaps in protection exist when users and endpoints are off-network, often leaving AV as the only form of protection.
And reacting to malicious communications and code after attacks launch is simply too late.
It’s time to prevent, detect and respond to attacks targeting endpoints, both on and off your network before damage occurs.
Join Cisco security product experts, Meg Diaz, Joe Malenfant, and Neil Patel to learn how you can not only stop attacks before they occur, but contain and remediate threats that evade front-line defenses, anywhere your users travel.
Register today and reduce your risk of breaches on the endpoint.
With the major cyber-attacks headlining the news, many of these cyber threats fall into five different attack vectors. Whether it's user credentials, personally identifiable information (PII), payment card information, health care information, intellectual property, or another form of data, nothing is safe from these bad actors. So, how do you protect you and your business from these debilitating attacks?
In our upcoming webinar, we arm you with the essential components needed to defend your business against the top five attack vectors we see in a Cyber Security Operations Center (SOC).
After attending you will:
- Recognize what are the top 5 attack vectors and the counter-measures you can take
- Understand the importance of detection and response in the kill-chain for each attack vector
- Discover how Arctic Wolf Networks (AWN) CyberSOC works to provide the essential components to protect against each of them
Register now to understand the different ways an attacker may cause harm to you and your business and how to defend yourself moving forward.
What are the latest trends in the cyber-criminal underworld?
Which attacks are you likely to be preventing as we move further into 2018?
Who’s looking for vulnerability on your network?
These questions and more, answered by Peter Wood FBCS CITP MIEEE CISSP M.Inst.ISP
Chief Executive Officer, First Base Technologies LLP
Peter’s career spans 48 years, with experience in network security, social engineering, threat and risk analysis, red teaming, industrial control systems and electronics. He founded First Base Technologies, one of the UK’s first information security consultancies in 1989. Peter has provided security advice and guidance for businesses of all sizes for more than 28 years, leading a team of expert penetration testers and consultants unrivalled in the industry.
He is also a world-renowned security evangelist, speaking at major conferences and delivering seminars and webinars. He has appeared in documentaries for BBC television, provided commentary on security issues for TV and radio, and written many articles on a variety of security topics.
He is a BCS Fellow, a Chartered IT Professional, CISSP and a member of IISP, ISACA, ISSA, IEEE, ACM and Mensa. He is a visiting lecturer at the University of Sussex, teaching cybersecurity and ethical hacking.
What if I no longer was a white hat? What if I started to hack for fun and profit at other expense?
How would I do it? Could you catch me? How can you stop me?
Join this presentation and get a unique insight into the mind of the hackers trying to get into your systems and steal your information. Learn how it can be done, and what are the precautions and preventive measures you can take now to make sure your company is prepared for attack.
Paul Forney, Chief Security Architect for Schneider Electric and Satya Gupta, CTO of Virsec delivered a joint presentation at the ICS Singapore Conference in April 2018, discussing the explosion of fileless and memory-based attacks, and strategies for protecting critical infrastructure.Read more >
While many people focus on detecting the next cyber threat to wreak havoc, more attention should be paid to detecting precursors to attacks that may already be within your network. In many major attacks, malware and vulnerabilities dwell within networks for months or years before the full exploit is launched. Machine Learning is being applied to detect new threats in the wild, but these techniques can be equally effective when applied internally, to map acceptable application behavior and react quickly if there is a real attack. Join noted security experts for an interactive discussion on strategies to protect your organization from these lurking threats.Read more >
The past year has seen a sharp increase in cyberattacks targeting critical infrastructure such as power plants, water treatment facilities, oil & gas refineries and elsewhere. High-impact attacks such as StuxNet, HaveX, Black Energy, Industroyer, Triton and others have used advanced hacking techniques and memory exploits to hijack control, cause disruption, shut down critical systems or worse. These technique bypass conventional network security tools and have been considered “indefensible” by many security experts.
Hear ICS and security experts discuss how to defend against advanced attacks and protect infrastructure from unknown threats.
Learn how Dell EMC is helping customers protect endpoint data from data loss and attacks through using the Mozy backup solution. Many small to large customers use Mozy to protect critical information stored at the edge. Here are some of the things that will be covered in the session
•What is Mozy online Backup?
•Why are many of Dell EMC customers using Mozy to protect endpoint data?
•How does Mozy mitigate risk from a malware attack?
This demonstration shows a live ransomware attack and how it can be detected in real-time by Virsec, and thwarted by automatically restoring data through the NetApp SnapLock WORM drive system.Read more >
As more businesses embrace digital transformation and migrate to the cloud, they must also address the cybersecurity risks inherent in those opportunities. Given the pace at which cyber-threats evolve, it's simply not possible to detect and stop every threat that enters the network before it does damage. Join IDC analyst, Rob Ayoub and Comodo Cybersecurity’s Director of Sales Engineering, Gus Evangelakos on June 28th at 1pm ET. You will walk away from this webinar knowing:
• Current cyber threat landscape
• The benefits of layered perimeter defense to protect the LAN
• How you can render attacks useless leveraging innovative cybersecurity technology
• How to protect your users without limiting productivity
• Strengthen your organization’s security posture
If all of the email systems in the world shut down tomorrow, would phishing attacks stop?
Why? The attack vectors hackers use to execute phishing campaigns aren’t limited to only email traffic. So defense strategies that focus on protecting just email will miss phishing activity on other attack vectors. For best protection, your security strategy needs a unified approach to protect you from phishing activity across all common attack vectors, including email, web, and network.
Join this webinar and learn:
o Attack vectors hackers exploit to execute phishing campaigns
o How phish bypass security infrastructure
o Strategies to fortify defenses and stop phishing attacks
Ransomware continues to experience record growth in 2017. Traditional solutions aren't enough and can't keep up with hundreds of thousands of new malware versions created daily. File-less attacks and exploits are now the most common vectors for successful ransomware attacks and most companies aren't protected.
Learn the three strategies Avidia Bank implemented to shut out today's sophisticated threats and how you can apply them to protect your own organization:
Register now to learn more on:
- How ransomware is going fileless to get past protection
- What makes everyone a target
- Three protection strategies to minimize the risk to your organization
Jack Danahy is the co-founder and CTO of Barkly, the Endpoint Protection Platform that delivers the strongest protection with the fewest false positives and simplest management. A 25-year innovator in computer, network and data security, Jack was previously the founder and CEO of two successful security companies: Qiave Technologies (acquired by Watchguard Technologies in 2000) and Ounce Labs (acquired by IBM in 2009). Jack is a frequent writer and speaker on security and security issues, and has received multiple patents in a variety of security technologies. Prior to founding Barkly, he was the Director of Advanced Security for IBM, and led the delivery of security services for IBM in North America.
From attacks that abuse PowerShell to attacks that live exclusively in memory, “fileless” threats have become increasingly common and dangerous. They’re built to evade detection from even the most advanced defenses, but that doesn’t mean they can’t be stopped — or that they have to be difficult to understand.
Join us to learn how attackers are using fileless techniques to gain execution, persistence, and lateral movement, and what you can do to keep your company protected.