Hi [[ session.user.profile.firstName ]]
Sort by:
    • The State of Cyber Resiliency in the Age of Attacks
      The State of Cyber Resiliency in the Age of Attacks Dave Klein (GuardiCore) | Troy Vennon (Columbus Collaboratory) Upcoming: Mar 20 2018 3:00 pm UTC 60 mins
    • Cyber threats are at the top of mind for security professionals everywhere. With high-profile breaches on the rise and valuable customer information at stake, organizations worldwide are looking for ways to train their workforce to be cyber safe and better secure an ever-growing perimeter.

      Join this panel of experts as they discuss:
      - The biggest trends in cyber crime
      - Impact of Cryptocurrencies
      - Breaches and preventing future fraud and cyber attacks
      - Advancements in security technology
      - Why security awareness training should be a key part of your overall data protection strategy

      - Dave Klein, Senior Director Security Engineering and Architecture at GuardiCore
      - Troy Vennon, Cyber Threat Engineer, Columbus Collaboratory

      Read more >
    • Protect and Prevent: 3 strategies for blocking fileless attacks and exploits
      Protect and Prevent: 3 strategies for blocking fileless attacks and exploits Jack Danahy, CTO, Barkly Recorded: Nov 28 2017 6:00 pm UTC 49 mins
    • Ransomware continues to experience record growth in 2017. Traditional solutions aren't enough and can't keep up with hundreds of thousands of new malware versions created daily. File-less attacks and exploits are now the most common vectors for successful ransomware attacks and most companies aren't protected.

      Learn the three strategies Avidia Bank implemented to shut out today's sophisticated threats and how you can apply them to protect your own organization:

      Register now to learn more on:

      - How ransomware is going fileless to get past protection
      - What makes everyone a target
      - Three protection strategies to minimize the risk to your organization

      Jack Danahy is the co-founder and CTO of Barkly, the Endpoint Protection Platform that delivers the strongest protection with the fewest false positives and simplest management. A 25-year innovator in computer, network and data security, Jack was previously the founder and CEO of two successful security companies: Qiave Technologies (acquired by Watchguard Technologies in 2000) and Ounce Labs (acquired by IBM in 2009). Jack is a frequent writer and speaker on security and security issues, and has received multiple patents in a variety of security technologies. Prior to founding Barkly, he was the Director of Advanced Security for IBM, and led the delivery of security services for IBM in North America.

      Read more >
    • Fileless Cyber Attacks Demystified
      Fileless Cyber Attacks Demystified Jack Danahy, CTO, Barkly Recorded: Oct 19 2017 5:00 pm UTC 39 mins
    • From attacks that abuse PowerShell to attacks that live exclusively in memory, “fileless” threats have become increasingly common and dangerous. They’re built to evade detection from even the most advanced defenses, but that doesn’t mean they can’t be stopped — or that they have to be difficult to understand.

      Join us to learn how attackers are using fileless techniques to gain execution, persistence, and lateral movement, and what you can do to keep your company protected.

      Read more >
    • Predict Ransomware Attacks Using AI
      Predict Ransomware Attacks Using AI Jacob Sendowski, Ph.D., Senior Product Manager at Vectra Recorded: Sep 27 2017 8:00 pm UTC 53 mins
    • Encrypting files is where ransomware attacks end, not begin. Understanding the attack lifecycle can save your critical files from destruction.

      Join this interactive Q&A session with Jacob Sendowski, Ph.D., to learn more about:
      • How to use attacker behavior models to detect the precursors of ransomware, including lateral movement, reconnaissance behavior and command and control communications
      • How detecting these precursors enables enterprise security teams to contain and remediate infected machines before ransomware attacks propagate throughout their organization and cause damage

      About the Presenter
      Jacob Sendowski is a Senior Product Manager at Vectra Networks where he is responsible for detections and algorithms as well as hardware platforms. Jacob was previously at Intel, where he held roles in both Intel Capital and Intel Labs. He has a Ph.D. in Electrical Engineering from Caltech.

      Read more >
    • Using the Hacker Supply Chain to Get Ahead of the Attack [Threat Hunting Series]
      Using the Hacker Supply Chain to Get Ahead of the Attack [Threat Hunting Series] Ido Wulkan, Security Researcher and Intelligence Team Lead at IntSights Recorded: Jun 6 2017 6:00 pm UTC 42 mins
    • Cyber attacks don't just happen. You need an attacker who is motivated, has infrastructure, seeks resourcing and performs reconnaissance. And all this happens before the attack. Ironically, most security vendors focus on blocking or identifying activity at the point of attack. But what if you could identify attacks during development, during the hacker supply chain?

      Clear and effective visibility into the attack chain would give security teams a dramatic ability to predict attacks, girding before the attack even begins. In this webinar, security researcher Ido Wulkan will help you understand where to look, what to look for and how to do it.

      About the Presenter:
      Ido has a decade of experience in intelligence research and analysis, focusing on the deep and dark web. Ido served in one of the leading intelligence units of the Israeli Defense Force (IDF) as a cyber intelligence analyst, where he gained intimate knowledge of various threat actors and their techniques. Following his service, Ido worked at several intelligence firms as an analyst and team leader, where he expanded his knowledge of cybercrime ecosystems. Ido now leads IntSights’ cyber intelligence analysts team, where he serves as a focal point for all IntSights’ intelligence.

      Read more >
    • A Guide to Predicting Cyber Attacks
      A Guide to Predicting Cyber Attacks Markus Jakobsson, Chief Scientist at Agari Recorded: May 16 2017 4:00 pm UTC 49 mins
    • The increasing number of email-based cyber attacks on the banking and financial services sector, as well as the continuous evolution of these attacks, requires both Risk Management and Information Security professionals to be constantly vigilant - and prepared - to protect their organizations from these constantly changing, advanced threats.

      This session will explore how prediction tools can observe and understand current trends of email-based abuse; recognize the greatest potential opportunities in terms of monetization and influence; and identify untapped criminal opportunities. We then will leverage these tools to evaluate the current environment and predict what types of attacks we are likely to see soon.

      Read more >
    • Lessons of a Cyber Attack to Prevent Future Cyber Epidemics
      Lessons of a Cyber Attack to Prevent Future Cyber Epidemics Srinivas Mukkamala PhD., CEO and Co-Founder RiskSense Recorded: Nov 14 2017 9:00 pm UTC 47 mins
    • The impact of malware outbreaks in 2017 is short lived compared to the ones we saw a decade ago. One of the key observations in 2017 is we have seen an attack that was infectious across the Internet and also an attack that was not infectious but had similar significant impact.

      Cyber epidemics are starting to afflict all business by impacting critical IT infrastructure. To increase the organization’s resilience against cyber-epidemics, you need to validate your attack surface and its susceptibility to attacks.

      Cyber-attacks tend to resemble a power law distribution in which a few dozen infiltration vectors account for most breaches and a “long tail” consisting of a large number of less common infiltration vectors account for the rest. It is important to provide timely and accurate information to keep the number of infiltrations low and the impact to your business reduced.

      What you will learn from this webinar:

      - How to prioritize what is most important when an attack happens.
      - Visibility into your attack surface and how to validate what the exposure is.
      - How to establish a metric based risk management program.

      About the Presenter:
      Srinivas Mukkamala is one of the Co-founders and CEO of RiskSense, a cyber security spinoff of New Mexico Tech. Srinivas has been researching and developing security technologies for over 15 years, working on malware analytics (focus on medical control systems and nontraditional computing devices), breach exposure management, Web application security, and enterprise risk reduction.

      Srinivas was one of the lead researchers for CACTUS (Computational Analysis of Cyber Terrorism against the US). Dr. Mukkamala has over 120 peer-reviewed publications in the areas of malware analytics, digital forensics, data mining, and bioinformatics. He has a patent on Intelligent Agents for Distributed Intrusion Detection System and Method of Practicing.

      Read more >