What if I no longer was a white hat? What if I started to hack for fun and profit at other expense?
How would I do it? Could you catch me? How can you stop me?
Join this presentation and get a unique insight into the mind of the hackers trying to get into your systems and steal your information. Learn how it can be done, and what are the precautions and preventive measures you can take now to make sure your company is prepared for attack.
This webinar will explore the current DDoS attack landscape, it will cover the basics of DDoS attacks, current trends including the most recent trends from the newly published 2015 Imperva Incapsula DDoS Report. We will also discuss a detailed analysis of one of today’s modern, multi-vector DDoS attacks. While dissecting this DDoS attack, the talk will explore the anatomy and timeline of the attack, as well as the steps used to mitigate each phase of the assault.This session will close with a review of the aspects of effective DDoS protection solutions used to combat these sophisticated denial of service attacks.Read more >
Highly-targeted, low volume spear phishing--or business email compromise (BEC)--attacks that impersonate executives and business partners to trick employees are the biggest cyber threat organisations face today. This is not news.
But what may come as a surprise is that the vast majority of BEC attacks are preventable. According to Gartner, Secure Email Gateways are struggling to address social engineering attacks with no payload. But things are changing. New technology can now surpass people and process initiatives to proactively protect email channels, while also removing the guesswork for users.
In this webinar, you’ll learn:
- Why email spoofing works
- What the current BEC trends and attack methods are
- How Proofpoint’s new Email Fraud Defense solution can identify and block BEC attacks before they hit the inbox
With all the attention paid to the technological sophistication of cyber attacks, as well as to the new technologies arising to strengthen defense, one fact often gets overlooked: Security is fundamentally about people.
The adversary is an intelligent actor – while the target is often human as well. The compromise of sensitive information or functionality may be in the crosshairs, but it’s people that are often targeted to gain a foothold inside the victim organization, through techniques such as phishing or social engineering. But here’s the secret: In this targeting lies one of the most unsuspected – but potentially rich – assets to defense an organization can have.
In this webcast, Scott Crawford, Research Director of Information Security for 451 Research, and Allan Carey, Vice President of Business Development from PhishMe take a closer look at:
•How the targeting of people through phishing, impersonation attacks and social engineering can be leveraged to improve security and resistance to attack
•New tactics and tools that make the most of human engagement to defend organizations against these exploits
•Ways to enhance incident response by incorporating human interactions with malicious activity into the evidence chain
Mobile device users interact with numerous Wi-Fi networks at work, home, airports, coffee shops and more. Connecting to wifi networks is second nature, with users’ accepting terms and conditions without realizing the risk of data-loss from malwareless and softwareless wifi attacks. This webcast will help you understand the common attacks and vulnerabilities that users are exposed to when traveling, and what you can do about them.Read more >
IT pros in EMEA are feeling pressured to protect themselves from phishing and targeted attacks. In this webinar we will look at recent investigations into targeted and phishing attacks and their potential impact on businesses risks and options for remediation.Read more >
Gartner has recently alerted enterprise IT, security and mobility managers that Mobile Threat Defense (MTD) is necessary to defend enterprises in today’s threat environment. Learn first-hand about details of mobile device attacks that lure employees in with fake Pokemon Go apps. We will also discuss zero day attacks such as the recent Pegasus attack that used zero-day technologies to completely compromise mobile security and spy on all communications and data.Read more >
We’ve all seen the bake-offs - vendor against vendor, the ‘latest’ malware samples run raw and then packed, and who apparently wins the race against hackers. But there is one major flaw in these tests - they’re only covering a fraction of attacks that occur in the wild. What about exploits? What about script-based attacks, including powershell and VMI? What about attacks that leave no file indicators - how does your security stop them?
Join SentinelOne’s Eran Ashkenazi, VP of Field Services and Support, as he discusses the full spectrum of attacks that are currently out in the wild and what you can do to protect against them.
What you’ll learn:
- The types of attacks, or attack vectors, you should include in your evaluation testing
- Real-world attacks that utilize methods that leave no file-based indicators
- How SentinelOne’s next generation endpoint protection protects against a file-less attack in a live demo
With DDoS cyber attacks rapidly increasing in both size and speed, as well as attacks that are crafted for a specific application or service, it’s never been so critical to ensure your basic availability is sound. Mitigation services can no longer be ‘one size fits all’. Organisations now need a tailored platform for the specific application or service to ensure 100% availability. Without availability ensured then other security overlays are meaningless.
This webinar will look at attack trends and case studies and provide top tips on how to stay ‘always on’ in the face of cyber attacks.
You’ve heard a lot about using artificial intelligence and machine learning to change the odds in your favor in cyber-attacks. Unfortunately it turns out that the bad-guys have great AI too, and with each click they can stealthily adapt, morphing into a new hard-to-detect form. But what if we apply learning in real time, on every endpoint, and allow the endpoints to collaborate to identify the threat?
In this talk Simon Crosby, co-founder and CTO of Bromium, will explore how this new approach can give defenders the edge in an era of targeted attacks.
About the Presenter:
Simon Crosby is a co-founder and CTO of Bromium Inc. – the pioneer of micro-virtualization, which enables PCs to defend themselves by design from all malware. Previously Simon was CTO, Data Center & Cloud at Citrix Systems, which acquired XenSource, where he was co-founder and CTO. He was formerly a Principal Engineer at Intel where he led strategic research on platform security and trust, and founder & CTO of CPlane Inc., a pioneer in Software Defined Networking. He was a faculty member in the Computer Laboratory at the University of Cambridge, UK from 1994-2000. He holds a PhD in Computer Science from the University of Cambridge, UK, and is author of more than 50 peer reviewed papers and patents.
5-Part Webinar Series: Endpoint Protection…what really matters?
Part 3 of 5: Zero-Day Attacks and What To Do About It?
All applications have vulnerabilities and attackers are incented to find them. Once the vulnerability has been discovered, the longer it remains unpatched, the greater the risk of a breach, potential loss of information, and damage to reputation.
Join us to learn what can be done to block exploit attacks on day zero:
• What behaviors and techniques are used to block attacks
• Why exploit prevention plays a critical part in endpoint protection
• How Memory Exploit Mitigation works
Then see Memory Exploit Mitigation in action with a demo Symantec Endpoint Protection.
• Symantec Endpoint Protection 14 Webinar Series Part 1 of 5: Addressing Unknown Threats with Advanced Machine Learning http://bit.ly/SEP14Series0126
• Symantec Endpoint Protection 14 Webinar Series: Part 2 of 5: Block The Risk Of Ransomware http://bit.ly/Part2Webinar0223
The adoption of Internet of Things (IoT), Software-Defined Networks, and Microservices without proper security controls have created a broader attack surface for cyber adversaries, whereby a few infiltration vectors account for most compromises while facing less common and hard to detect infiltration vectors. In this context, Artificial Intelligence (AI) can bolster defenses by analyzing vast volumes of data and assist cyber security professionals in their day-to-day operations. However, the same tools can be leveraged by hackers to find their targets faster and launch attacks quicker to disrupt business operations and attack industrial controls.
In this webinar, renowned cyber security expert Dr. Srinivas Mukkamala will discuss how “malicious AI” could make today’s “cyber carnage” even worse. He will share result from a research study that RiskSense conducted to illustrate how human expertise in combination with AI can be leveraged to mimic a human hacker to find vulnerable threat pairs and launch exploits at scale. Dr. Mukkamala will also discuss how to transition from the traditional human expert model to an AI-based interactive, and iterative model to defend against machine-driven high frequency attacks.
About the Presenter:
Dr. Srinivas Mukkamala is co-founder and CEO of RiskSense. He has been researching and developing security technologies for over 15 years, working on malware analytics (focuses on medical control systems and nontraditional computing devices), breach exposure management, Web application security, and enterprise risk reduction. Mukkamala was one of the lead researchers for CACTUS (Computational Analysis of Cyber Terrorism against the US). He has been published in over 120 peer-reviewed publications in the areas of information assurance, malware analytics, digital forensics, data mining, and bioinformatics. He has a patent on Intelligent Agents for Distributed Intrusion Detection System and Method of Practicing.
Time is not on your side when managing security for a global enterprise and facing down a relentless barrage of cyber attacks. So when confronted with multiple suspect alerts flagged by your SIEM solution, you need a way to easily sift through and identify the attacks that will most likely impact key business processes – and quickly take action.
Presented by renowned industry expert Prof. Avishai Wool, this new webinar will cover security best practices for introducing business context into your organization’s incident response processes, and prioritizing and automating remediation efforts accordingly. This insight will give you the intelligence you need to reduce the time and cost of mitigating cyber attacks by orders of magnitude.
In this webinar Professor Wool will cover how to:
- Augment incident triage with critical business context to assess the severity, risk and potential business impact of an attack
- Prioritize incident remediation efforts based on business risk
- Neutralize impacted systems through zero-touch automation
- Limit the lateral movement of an attacker in, out and across your network
- Keep all stakeholders involved in the remediation process to reduce disruption to the business
The Distributed Denial of Service (DDoS) attack launched Friday, October 21, against Dyn - one of the largest managed DNS infrastructure providers - was the most destructive attack to date launched from an IoT botnet. The threat of mega attacks launched from infected connected devices is now a reality that dramatically changes the paradigm for mobile and fixed operators whose core infrastructure is susceptible to global attacks that are large enough to significantly disrupt subscriber quality of experience (QoE).
Join us in this webinar to learn:
•The impact of IoT driven DDoS mega attacks
•Architectural approaches to volumetric DDOS mitigation
•How to measure and maintain subscriber quality of experience during an attack