Yahoo closed 2016 with another revelation about their poor state of security. This time they admitted of losing all their user credentials in 2013.
Adding to Hold Security's previous intelligence from the 2014 breach, Alex Holden, CISO will discuss exclusive details about situation with Yahoo.
Join the interactive Q&A and learn:
- Where is the stolen data?
- Who is behind this breach?
- What to expect next from Yahoo.
Cyber threats are more sophisticated than ever, slipping past perimeter defenses and hiding in the normal flow of network communications. For all you GOT fans, it’s a lot like Wildlings slipping past The Wall.
Data breaches are going undetected for more than 200 days, and in most cases, the breached company learns about the breach from outside their organization. What’s the common denominator? The Network. Much like the North, the network remembers.
A lack of high-definition network visibility has extended the breach detection window and prolonged data breach investigations. New methods of network visibility, learning analytics and automation are now available to accelerate and simplify the breach-hunting journey – past, present and future.
In this webinar, we will examine:
• Why IT and cyber security organizations today struggle with breach detection and investigations
• Why legacy approaches to analyze network traffic (SIEM, packet recorders, network forensics) are extending and complicating cyber investigations, and
• A new “time machine” model of network security analytics that accelerates the breach detection and incident response workflow
This event will also look at the architectural considerations and investment required for implementing this new model of network-based breach detection, as well as examples of the types of threats that can be discovered after the threat slips past preventative security measures, such as firewalls, anti-virus and intrusion prevention.
Chances are, you and a lot of people you know could be a few of the 143 million consumers affected by the major data breach recently disclosed by Equifax.
Join this interactive Q&A panel to discover how this breach impacts you and the steps you can take today to minimize the likelihood of a future cyber attack related to this breach:
- How to discover if your personal information has been exposed in this breach
- What is the impact on consumers and organizations of all sizes
- What to expect in the future? Cyber threats related to the breach
- How can to protect your data and secure your organization
- Dave Klein, Senior Director Security Engineering and Architecture at GuardiCore
- Dr. Al Hartmann, Chief Scientist, Ziften
- Neill Feather, President of SiteLock
- Patrick Bedwell, Head of Product Marketing, Lastline
What steps are you taking to minimise your risk of becoming a data breach victim? In this webinar, Symantec and a guest speaker from Forrester share best practices to proactively protect your critical data with data-centric security.
Get advice on preventing data breaches from these industry experts:
• Guest Speaker Heidi Shey, Senior Analyst, Forrester. Heidi serves Security & Risk Professionals with solutions for data security and privacy. She also researches sensitive data discovery, data loss prevention, cybersecurity, customer-facing breach response and more.
• Nico Popp, Senior Vice President, Information Protection, Symantec. Nico is the former CTO of VeriSign Security Services where he led efforts to develop new products and services for Trust Services and Identity Protection.
Join these authorities as they explain how a holistic approach to data security and identity puts you back in control.
Turn Raw Threat Intelligence Into Context and Action
Attackers don’t stand still; your defenses shouldn’t either. See how multi-method threat prevention can be used to detect and prevent the most evasive threats and command-and-control traffic, and open up any source of threat intelligence to be used for automated prevention. These capabilities drive up the cost of successful data breaches for attackers, making their efforts too expensive to consider.
You will learn more about:
•How an evasion-resistant analysis environment defeats whole classes of VM evasion techniques.
•Threat prevention capabilities that automate the blocking of command-and-control traffic in a way that previously required teams of signature writers.
•How to enable security teams to gain leverage from any source of threat intelligence and drive automated prevention.
Protecting user identities and preventing phishing attacks are key tactical priorities for today’s security professional. The majority of breaches involve password theft at some stage of the attack. Nearly two-thirds of the breaches analyzed by Verizon in the 2016 Data Breach Incident Report (DBIR) used stolen credentials. This is because the vast majority of organizations continue to use password-based credentials as the primary means of securing user access, and it is easier for an attacker to steal passwords than it is to find and hack a vulnerable system.
As a result, password stealing techniques are used by a broad spectrum of attackers to breach organizations, compromise their networks and steal critical data from internal data centers and the cloud. Traditional approaches to stop credential phishing rely only on classifying the phishing site before the user encounters it. If the organization’s security products miss a new phishing site, their only recourse is hoping the user doesn’t proceed and enters his credentials.
Tune into this BrightTALK - Palo Alto Networks video interview as Alexander Hinchliffe discusses the need to protect user credentials and advises how to improve your businesses security stature.
Ransomware, BEC, and malware all start with phishing attacks. Phishing education tries to make users security experts, and fails to stop breaches. Attacks always start with tiny patterns that reveal the attacker's plans. Prevention stops attacks before they happen. Area 1 Security reveals its unique approach to preemptive cybersecurity, stopping all types of phishing at their source.Read more >
What are the lessons learned from the recent slate of mega-breaches (Equifax, CIA, NSA)? How can we apply these lessons toward educating out workforce and strengthening our organizations' security posture?
Join this interactive panel with cyber security experts to learn more about:
- Why the Equifax data breach was inevitable
- How to prepare against the next big one
- How to detect breaches faster
- The first 24 hours after a breach
- The importance of employee security training
- What CISOs can learn from this breach
- Rick Holand, VP Strategy, Digital Shadows
- Chris Sullivan, CISO/CTO, Core Security
- Willian Leichter, VP Marketing, VIrsec Security
Equifax, a massive credit reporting agency, disclosed that a data breach it discovered on July 29 may have impacted up to 143 million consumers in the United States. That's almost half the country.
Join this interactive Q&A panel to discover how this breach impacts you:
- Who is a victim and what this breach means for consumers and businesses
- What should Equifax customers do
- How to protect against and detect breaches faster
- How can we protect our data against future breaches
- Michael Davis, CTO of CounterTack
- Corey Williams, Senior Director of Products & Marketing, Centrify
- Elizabeth Zalman, Co-founder & CEO, strongDM
The recent Equifax data breach, which may have jeopardized the personal information of 143 million U.S. consumers, will likely haunt us for years to come.
Join this interactive panel with experts from the cyber security, identity and privacy space to learn more about:
- What we know occurred or is likely to have occurred
- Data Breach Timeline - too slow or too fast
- External communications - how has the breach been handled and communicated
- Internal Actions - security remediation, work with law enforcement, root cause, incident response
- External forces - lawsuits, media scrutiny, and customer communications
- Dr. Christopher Pierson, CSO, Viewpost
- Sarah Squire, Founder and Principal Consultant, Engage Identity
- Debra Farber, Host of The Privacy Pact, ITSPmagazine
With 143 million personally identifiable records stolen, the recent Equifax data breach is one of the largest and most damaging cyber-attacks to date. Hackers may have accessed highly valuable information, including our social security numbers, addresses, birth dates and credit card information.
What can we do do contain the damage as consumers, as well as organizations? How can we move on from this breach?
Join this interactive panel discussion with cyber security experts across the spectrum to hear their thoughts on:
- The key takeaways consumers and enterprises should act on to protect against cyber scams and attacks related to this breach
- Managing IT risk and vulnerabilities
- How to improve breach prevention, detection and response
- What to expect in the future
- Igor Baikalov, Chief Scientist, Securonix
- Chris Petersen, CTO, SVP of R&D & Co-Founder, LogRhythm
- Sam Abadir, Director of Product Management, LockPath
- Carl Wright, CRO, AttackIQ
With increased volume and sophistication of intrusions and tightening data privacy compliance requirements such as GDPRs 72 hour notification, organizations must reduce their cyber–attack incident response times.
During this webinar, join CSPi and Cisco as we demonstrate an integrated and automated solution for cyber-breach detection and investigation leveraging Cisco FirePower Next Gen firewalls and IPS/IDS products coupled with CSPi’s Myricom nVoy solution, enabling your security team to:
- Receive Immediate notification when an intrusion directly impacts their most critical assets triggering the start of a focused investigation
- Conduct focused forensic analysis
- Easily validate and then determine the scope of the potential breach including what type of data was involved, and what data records were exposed
- Reduce analysis from weeks to hours
Join this interactive Q&A panel to discover the biggest lessons of the recent Equifax breach and how to apply them toward improving your and your organizations cyber security.
Viewers will learn:
- The magnitude of the impact of this breach across consumers and industries
- The true costs of a breach
- How to discover if your personal information has been exposed and what you can do about it
- What to expect in terms of cyber threats in the future
- How can to protect your data and secure your organization
- Expert recommendations on improving breach protection, detection and response
- Brian Robison, Sr. Director of Security Technology, Cylance
- Stephan Chenette, CEO, AttackIQ
- Michael Davis, CTO, CounterTack
- Kevin Flynn, Global Director of Products, Skybox Security
You’re a CIO, CISO or DPO - and you’ve been woken up in the middle of the night because personal data held by your organisation has been discovered for sale on the dark web. This disclosure puts the privacy of your customers at risk. What do you do next?
Join this session to learn about the impact of GDPR and go through a breach investigation and response scenario as it would be after GDPR comes into effect in May 2018. You’ll hear from Splunk’s Data Privacy Officer Elizabeth Davies and Splunk’s Security Ninja Matthias Maier.
What you will learn:
- What breach response will look like under the GDPR
- What tools and processes a data privacy officer will rely on in case of a breach
- What departments and entities will be involved beyond IT
- What activities are currently happening within organisations to prepare for the GDPR
- What the consequences of the breach could be
Data breaches have become frequent and more impactful in the last couple of years, with the latest massive breach revealed by Equifax taking the cake. Equifax is one of three major credit reporting agencies, and this breach leaves pretty much everyone's financial data vulnerable to cyber criminals.
Join this interactive panel and ask your most pressing questions, as well as learn about:
- How this breach exposing personal data, including social-security numbers, for 143 million Americans will affect you and your business
- What you can do today to minimize your data exposure and protect against cyber attacks
- What to expect in the future
- Expert recommendations on how to improve your personal cybersecurity and your company's security.
- Nathan Wenzler, Chief Security Strategist at AsTech Consulting
- Dan Lohrmann, CSO & Chief Strategist for Security Mentor
- John Bambenek, Threat Systems Manager at Fidelis
The massive Equifax data breach may involve as many as 143 million US consumers whose personal information was accessed by hackers between May and July.
Join this interactive discussion with security experts and researchers to find out how this breach impacts your life and potentially, your organization.
- Timeline of Equifax and why this may be the worst hack yet
- Has your data been exposed in the hack?
- What should you do right away?
- When to expect the scams and cyber attacks related to this hack?
- Expert recommendations on how to stay safe online in the age of breaches and ransomware attacks.
- Vince Tocce, Vince in the Bay Podcast
- Judy Towers, Cyber Intelligence Analyst, Private Company
- Ray Watson, VP Global Technology, Masergy Communications
- Rob Graham, a well-known cybersecurity expert, creator of BlackICE, sidejacking, and masscan
The recent Equifax data breach is perhaps the largest in history and has barraged the company and its senior executives with a complex and challenging range of legal, financial and technological issues -- issues that every corporation and its outside counsel will inevitably (and unfortunately) encounter.
In this timely webcast, John Reed Stark, seasoned data response professional and former Chief of the SEC's Office of Internet Enforcement, drills down to explain it all.
Don't miss this early opportunity for a detailed analysis, presented in plain English, of the many critical caveats, reminders and takeaways from this evolving and ironic cybersecurity incident.
Recent studies have found attackers using multiple different methods to impact higher education institutions. And email is the common culprit that enables these advanced threats to breach campuses. Attackers continue to evolve their techniques to bypass even the latest email security tools, leaving institutions to deal with the often costly and time-consuming clean up. To fight back, institutions need a unified solution that solves the entire email threat problem covering both malware and malware-free threats. Join this webinar to learn how to build an advanced email security strategy that gives you visibility into threats and empowers you to proactively protect your campus.Read more >