Yahoo closed 2016 with another revelation about their poor state of security. This time they admitted of losing all their user credentials in 2013.
Adding to Hold Security's previous intelligence from the 2014 breach, Alex Holden, CISO will discuss exclusive details about situation with Yahoo.
Join the interactive Q&A and learn:
- Where is the stolen data?
- Who is behind this breach?
- What to expect next from Yahoo.
Cyber threats are more sophisticated than ever, slipping past perimeter defenses and hiding in the normal flow of network communications. For all you GOT fans, it’s a lot like Wildlings slipping past The Wall.
Data breaches are going undetected for more than 200 days, and in most cases, the breached company learns about the breach from outside their organization. What’s the common denominator? The Network. Much like the North, the network remembers.
A lack of high-definition network visibility has extended the breach detection window and prolonged data breach investigations. New methods of network visibility, learning analytics and automation are now available to accelerate and simplify the breach-hunting journey – past, present and future.
In this webinar, we will examine:
• Why IT and cyber security organizations today struggle with breach detection and investigations
• Why legacy approaches to analyze network traffic (SIEM, packet recorders, network forensics) are extending and complicating cyber investigations, and
• A new “time machine” model of network security analytics that accelerates the breach detection and incident response workflow
This event will also look at the architectural considerations and investment required for implementing this new model of network-based breach detection, as well as examples of the types of threats that can be discovered after the threat slips past preventative security measures, such as firewalls, anti-virus and intrusion prevention.
Review of threat landscape of this year's major breach revelations. Why are they all out now? Who are the bad guys? What drives them? Navigating a web of lies and deception to measure current threat landscape. What do you need to know about current ramifications of Yahoo's disclosure?
Alex Holden is the founder and CISO of Hold Security. Holden is credited with the discovery of many high profile breaches including Adobe Systems, initial vendor breach that led to the discovery of the JPMorgan Chase breach, and the independent discovery of the Target breach. Considered one of the leading security experts, he regularly voices his professional opinion in mainstream media.
We built security into Microsoft products and services from the start. That’s how we deliver a comprehensive, agile platform to better protect your endpoints, move faster to detect cybersecurity threats, and respond to security breaches across the smallest and largest of organizations.
Join this session to learn more about:
- Preventing identity compromise
- Securing apps and data
- Expanding device controls
- Safeguarding your cloud infrastructure
Sony, Target and now Yahoo! -- you can't let this to happen to you or your business. Help your organization avoid being front page news due to a security breach.
Every organization large and small wants to avoid this all too common reality. From the unintentional sharing of data by employees through a rogue email, to losing data via a lost computer, to surviving hacker attacks, there's a lot to manage.
Join this webcast to learn the top 5 ways to protect your organization and make sure your company isn't the next one hacked.
On December 14 Yahoo revealed a new breach affecting more than 1 billion users’ data. This breach is separate to the hack it disclosed earlier this year, which was the biggest data breach on record. Join John Bambenek, Threat Systems Manager at Fidelis Cybersecurity on the latest developments in the Yahoo breaches, what it means for you and steps to take today.Read more >
Research shows that 76% of companies suffered a data breach in 2016, so it’s now almost inevitable that hackers will gain access to your company and your sensitive data.
Security professionals are now looking to deal with breaches faster, to keep their company off the front page and with heavy GDPR fines on the horizon, they’re wise to do so.
Organisations are fearful of damaging data breaches but unsure of the best course of action to protect themselves from major cyber incidents. Whilst a large per cent of businesses focus on building up perimeter defences, not enough are concentrating on monitoring their own network to detect threats and mitigate them before significant damage is done.
Tune into this in-depth one-on-one interview to discover:
•More about the current threat landscape and the dangers to your organisation.
•How you can reduce the time to detect and respond to threats without adding staff to accomplish the job.
•More about how cutting edge technology can be used such as:
oAdvanced machine analytics, which are key to discovering potential threats quickly.
oSecurity automation and orchestration capabilities, which increase the efficiency of the threat lifecycle management process.
•The influence that GDPR will have and steps you need to take.
Once breached at the endpoint, what does an attacker do? Where is he going? What does he want? The truth of APTs and advanced attacks is that they just don't want one machine - they want access to the heart of the organization. Since 1999, Microsoft has made the Windows Domain the heart of the network. Once accessed, it permits the attacker to control the organization - undetected and indefinitely. This is what the attacker wants. This webinar will discuss all moves an attacker can make to go from a compromised machine to achieve his goal from a statistical point of view; we will present the probability of detection and evidence-gathering for any move made along the way.
Roi is CEO and Founder of Javelin Networks, a post breach containment technology that focuses on stopping attackers from credential misuse and lateral movement after compromising a machine. Roi served in the Israeli Air Force at the OFEK unit where he worked on the security of the Israeli satellite launch, Arrow missiles and the Air Force drones. As a network and security engineer, he was influential in designing, developing, analyzing, implementing large enterprise communication networks, both nationally and around the world. Worked for four years as a Security consultant, leading ongoing projects at the Vatican and other military organizations.
Cyber threats are constantly evolving, increasing in both sophistication and how they impact victims. In today’s world, you must battle a wide range of adversaries, from hacktivists to state-sponsored threats. The most significant of these threats are advanced attackers who carefully plan and execute breaches into victim organisations.
In this live webinar, Roger J. Francis, Senior Consultant at Mandiant, a FireEye company, will discuss real-world incidents and steps organisations should take to minimise the financial impact of a data breach.
With 2016 behind us, is this the last Yahoo breach we’ll hear about? Join Chris Roberts, Chief Security Architect at Acalvio Technologies as he discusses the lessons to be learned from the recently disclosed Yahoo breaches, and the nagging questions infosecurity professionals will try to answer in 2017.Read more >
Today, every organization is at risk of cyber attacks. It is no longer the question of if, but when. Attackers are motivated, sophisticated and not limited by national borders. With IoT devices increasing in adoption and becoming intrinsic elements in our smart city infrastructure, industrial control systems and transportation systems, improving cybersecurity is essential.
Join this keynote panel and learn the latest trends in cyber attacks, hacks and breaches in an increasingly IoT world, and the recommendations on how to strengthen the security of our most critical assets.
- Fred Wilmot, CTO of PacketSled
- Usman Choudhary, Chief Product Officer at ThreatTrack
- Chris Roberts, Chief Security Architect at Acalvio
- Sushila Nair, Principal Consultant at NTT Security
- Joseph Carson, Cyber Evangelist at Thycotic
In September 2016, Yahoo disclosed that the company lost access control for over 500 million accounts. Turns out the largest breach in history of 500M Yahoo accounts in 2014 is only half as much as the latest and largest hack ever discovered – 1B Yahoo accounts lost in 2013.
Join Chris Webber, Security Strategist at Centrify, as he examines the Yahoo breach incidents, the causes behind them, the damage they caused, and how they could have been avoided.
It's time to stop pretending this is not going to happen to you. At work, or in your everyday life, we need to learn how to live with cybersecurity. If we want to play in an IoT and Internet-connected world, we need to learn how to play by the rules.
Sure, not all of the rules have been set for every situation, but there are plenty that have been defined that continue to be ignored. Either nobody has taught you what these rules are. Or, it may seem the rules don't apply to you or your business. Either way, it's time to stop being numb to the news of the next new breach and start paying attention. It's time to understand the rules and being to follow them - they apply to everyone.
In this ITSPmagazine Experts Corner interview with Morey Haber, VP of Technology at BeyondTrust, we will explore some of the core questions to ask yourself given the recent announcement of the second Yahoo breach of 1 billion accounts:
- What is the value of password management?
- What are the risks associated with password re-use?
- What are the keys to successfully controlling access to critical assets?
- Why is managing privileged access so important?
- How can two-factor authentication be your best friend?
We look forward to having a great conversation with Morey as he discusses the details of the two Yahoo breaches and what they mean to us as individuals, as businesses, and as a society. We hope you will join us and join in on the conversation.
What should small and mid-sized businesses take away from the news of (another) Yahoo breach? Tune in for a brief overview of a massive data breach that has come to light.Read more >
In today’s complex and ever-changing security landscape, every C-Suite and Board knows of cyber risk, but what does it really mean to be prepared to respond to a data breach incident? Top executives do not have to become cyber security experts, but they must make sure their organization’s breach response plans and strategies are defined and set. While they will not directly lead technical, legal and notification efforts to address data breaches, they do need to act as internal champions of proper planning and prevention.
Identifying and closing security gaps, directing communication channels, and developing and regularly testing incident response plans are as important now as managing any other business risk or concern. Therefore, company leadership must take charge and direct their organizations to conduct extensive preparation efforts to mitigate those risks and make certain everyone stands ready to execute against the established procedures and policies when a breach occurs.
In this webinar, you will hear from experts who have been on the inside and outside of data breach response efforts. You will learn:
•Why the C-Suite and Board need to champion planning and prevention efforts.
•How to get Executive buy-in.
•Ways to build stronger response structures from the top.
•How to construct response architectures. Who needs to be responsible for what?
•Cyber Risk – What are the latest threats and what does the C-Suite and Board need to understand?
•Developing and directing an Incident Response Plan: Where do the C-Suite and Board fit in?
•Examples our experts have seen – the good and the bad