Hi [[ session.user.profile.firstName ]]
Sort by:
    • Breaches are Coming! What To Do When They Go Beyond the Wall
      Breaches are Coming! What To Do When They Go Beyond the Wall Tony Thompson, Vice President; Rajdeep Wadhwa, Product Management Recorded: Aug 10 2016 5:00 pm UTC 39 mins
    • Cyber threats are more sophisticated than ever, slipping past perimeter defenses and hiding in the normal flow of network communications. For all you GOT fans, it’s a lot like Wildlings slipping past The Wall.

      Data breaches are going undetected for more than 200 days, and in most cases, the breached company learns about the breach from outside their organization. What’s the common denominator? The Network. Much like the North, the network remembers.

      A lack of high-definition network visibility has extended the breach detection window and prolonged data breach investigations. New methods of network visibility, learning analytics and automation are now available to accelerate and simplify the breach-hunting journey – past, present and future.

      In this webinar, we will examine:
      • Why IT and cyber security organizations today struggle with breach detection and investigations
      • Why legacy approaches to analyze network traffic (SIEM, packet recorders, network forensics) are extending and complicating cyber investigations, and
      • A new “time machine” model of network security analytics that accelerates the breach detection and incident response workflow

      This event will also look at the architectural considerations and investment required for implementing this new model of network-based breach detection, as well as examples of the types of threats that can be discovered after the threat slips past preventative security measures, such as firewalls, anti-virus and intrusion prevention.

      Read more >
    • Mega Breaches of 2016 - Yahoo Next Victim
      Mega Breaches of 2016 - Yahoo Next Victim Alex Holden, Founder and CISO of Hold Security, LLC Recorded: Oct 4 2016 6:00 pm UTC 45 mins
    • Review of threat landscape of this year's major breach revelations. Why are they all out now? Who are the bad guys? What drives them? Navigating a web of lies and deception to measure current threat landscape. What do you need to know about current ramifications of Yahoo's disclosure?

      Presenter Info:
      Alex Holden is the founder and CISO of Hold Security. Holden is credited with the discovery of many high profile breaches including Adobe Systems, initial vendor breach that led to the discovery of the JPMorgan Chase breach, and the independent discovery of the Target breach. Considered one of the leading security experts, he regularly voices his professional opinion in mainstream media.

      Read more >
    • [Video Interview] Threat Management and the Keys to Avoiding a Major Data Breach
      [Video Interview] Threat Management and the Keys to Avoiding a Major Data Breach Ross Brewer, VP & MD, LogRhythm & Josh Downs, Community Manager, BrightTALK Upcoming: Mar 2 2017 3:00 pm UTC 30 mins
    • Research shows that 76% of companies suffered a data breach in 2016, so it’s now almost inevitable that hackers will gain access to your company and your sensitive data.

      Security professionals are now looking to deal with breaches faster, to keep their company off the front page and with heavy GDPR fines on the horizon, they’re wise to do so.

      Organisations are fearful of damaging data breaches but unsure of the best course of action to protect themselves from major cyber incidents. Whilst a large per cent of businesses focus on building up perimeter defences, not enough are concentrating on monitoring their own network to detect threats and mitigate them before significant damage is done.

      Tune into this in-depth one-on-one interview to discover:

      •More about the current threat landscape and the dangers to your organisation.

      •How you can reduce the time to detect and respond to threats without adding staff to accomplish the job.

      •More about how cutting edge technology can be used such as:
      oAdvanced machine analytics, which are key to discovering potential threats quickly.
      oSecurity automation and orchestration capabilities, which increase the efficiency of the threat lifecycle management process.

      •The influence that GDPR will have and steps you need to take.

      Read more >
    • Endpoint Breach: What Attackers Do Next to Penetrate Your Organization
      Endpoint Breach: What Attackers Do Next to Penetrate Your Organization Roi Abutbul, CEO & Founder, Javelin Networks Recorded: Feb 22 2017 8:00 pm UTC 40 mins
    • Once breached at the endpoint, what does an attacker do? Where is he going? What does he want? The truth of APTs and advanced attacks is that they just don't want one machine - they want access to the heart of the organization. Since 1999, Microsoft has made the Windows Domain the heart of the network. Once accessed, it permits the attacker to control the organization - undetected and indefinitely. This is what the attacker wants. This webinar will discuss all moves an attacker can make to go from a compromised machine to achieve his goal from a statistical point of view; we will present the probability of detection and evidence-gathering for any move made along the way.

      Roi is CEO and Founder of Javelin Networks, a post breach containment technology that focuses on stopping attackers from credential misuse and lateral movement after compromising a machine. Roi served in the Israeli Air Force at the OFEK unit where he worked on the security of the Israeli satellite launch, Arrow missiles and the Air Force drones. As a network and security engineer, he was influential in designing, developing, analyzing, implementing large enterprise communication networks, both nationally and around the world. Worked for four years as a Security consultant, leading ongoing projects at the Vatican and other military organizations.

      Read more >
    • Double Yahoo Breach: Nothing You Can Do About It, But Learn
      Double Yahoo Breach: Nothing You Can Do About It, But Learn Morey Haber, VP Technology, BeyondTrust | Sean Martin, CISSP, Editor in Chief, ITSPmagazine Recorded: Jan 11 2017 8:00 pm UTC 52 mins
    • It's time to stop pretending this is not going to happen to you. At work, or in your everyday life, we need to learn how to live with cybersecurity. If we want to play in an IoT and Internet-connected world, we need to learn how to play by the rules.

      Sure, not all of the rules have been set for every situation, but there are plenty that have been defined that continue to be ignored. Either nobody has taught you what these rules are. Or, it may seem the rules don't apply to you or your business. Either way, it's time to stop being numb to the news of the next new breach and start paying attention. It's time to understand the rules and being to follow them - they apply to everyone.

      In this ITSPmagazine Experts Corner interview with Morey Haber, VP of Technology at BeyondTrust, we will explore some of the core questions to ask yourself given the recent announcement of the second Yahoo breach of 1 billion accounts:
      - What is the value of password management?
      - What are the risks associated with password re-use?
      - What are the keys to successfully controlling access to critical assets?
      - Why is managing privileged access so important?
      - How can two-factor authentication be your best friend?

      We look forward to having a great conversation with Morey as he discusses the details of the two Yahoo breaches and what they mean to us as individuals, as businesses, and as a society. We hope you will join us and join in on the conversation.

      Read more >
    • Next Generation Data Breach Response: Preparing Your C-Suite and Board
      Next Generation Data Breach Response: Preparing Your C-Suite and Board King & Spalding, Rite Aid, and Kroll Recorded: Dec 8 2016 6:00 pm UTC 58 mins
    • In today’s complex and ever-changing security landscape, every C-Suite and Board knows of cyber risk, but what does it really mean to be prepared to respond to a data breach incident? Top executives do not have to become cyber security experts, but they must make sure their organization’s breach response plans and strategies are defined and set. While they will not directly lead technical, legal and notification efforts to address data breaches, they do need to act as internal champions of proper planning and prevention.

      Identifying and closing security gaps, directing communication channels, and developing and regularly testing incident response plans are as important now as managing any other business risk or concern. Therefore, company leadership must take charge and direct their organizations to conduct extensive preparation efforts to mitigate those risks and make certain everyone stands ready to execute against the established procedures and policies when a breach occurs.
      In this webinar, you will hear from experts who have been on the inside and outside of data breach response efforts. You will learn:

      •Why the C-Suite and Board need to champion planning and prevention efforts.
      •How to get Executive buy-in.
      •Ways to build stronger response structures from the top.
      •How to construct response architectures. Who needs to be responsible for what?
      •Cyber Risk – What are the latest threats and what does the C-Suite and Board need to understand?
      •Developing and directing an Incident Response Plan: Where do the C-Suite and Board fit in?
      •Examples our experts have seen – the good and the bad

      Read more >