Hi [[ session.user.profile.firstName ]]
Sort by:
    • Get a Clue About IT Security Analysis - SIEM 101
      Get a Clue About IT Security Analysis - SIEM 101 Joe Schreiber & Garrett Gross Recorded: Nov 12 2014 11:05 pm UTC 43 mins
    • Everyone in IT knows that security is a big deal, but did you know that SIEM (security information and event management) can help protect your network from data breaches, even when traditional defenses fail?

      If SIEM a mystery to you, lets grab Colonel Mustard, the candlestick and head to the library because this mystery is about to be solved. We'll be giving out more than just clues in this webinar: you'll discover explanations of security concepts, tools, tips and tricks as we unravel the mystery of how to better protect your network. Bring your magnifying glass, because you’ll also learn about event correlation, EPS, normalization and other things that will surely impress your friends.

      Learn from our chief gumshoe and noted SIEM Enthusiast Joe Schreiber. He’ll explain the reasons that SIEM exists, how it works, and most importantly - what you can do with it.

      IT WAS MR. BODDY ALL ALONG!

      Read more >
    • NotPetya: Ransomware or Wiper? Nation State or Criminal Gang?
      NotPetya: Ransomware or Wiper? Nation State or Criminal Gang? Dr. Mounir Hahad, Sr. Director at Cyphort Recorded: Jul 6 2017 6:00 pm UTC 37 mins
    • On the heels of WannaCry, the world awoke on June 27 to another cyber attack that employs ransomware as a weapon. But this one is different and has fueled much speculation as to whether it is truly a ransomware attack or a wiper/destroyer attack meant to inflict irreversible damage. In this webinar, we will review some of the details of this attack and discuss clues towards motives and potential threat actors behind this attack.

      About the Presenter:
      Mounir Hahad, Ph.D. is Sr Director at Cyphort, a Security Analytics company headquartered in Santa Clara, CA. Mounir is the head of Cyphort Labs, the group responsible for conducting threat research within Cyphort and driving detection enhancements for Cyphort’s Advanced Detection Fabric which uses behavioral analysis along with machine learning to detect advanced threats and correlate those incidents with ingested information from third party solutions. Mounir holds a Ph.D. in computer science from the University of Rennes.

      Read more >
    • Seeing Over the Horizon: Predictive and Preventive Security Based on the Kill-Ch
      Seeing Over the Horizon: Predictive and Preventive Security Based on the Kill-Ch Tim Helming and Mike Cloppert Recorded: Nov 7 2016 5:45 pm UTC 62 mins
    • The Kill Chain model is a useful way to understand how adversaries are able to compromise their victims. During the earliest stages of preparation for an attack, the reconnaissance phase, attackers have not yet breached the victim environment, but they are, in fact, leaving subtle clues behind. These clues can be detected and enriched to help an organization prepare defenses ahead of the first directly invasive move by the adversary.

      In this recorded webinar, you will learn:

      -The 7 steps of the cyber kill chain
      -Prepare defenses ahead of the first directly invasive move by the adversary
      -How DomainTools data and tools enable you to apply this strategy to your own organization

      Guest Speaker - Mike Cloppert

      Michael has worked as a security analyst in various sectors including the Financial, Federal Government, and Defense industries. He has an undergraduate degree in Computer Engineering from the University of Dayton, an MS in Computer Science from The George Washington University, has received a variety of industry certifications including SANS GCIA, GREM, and GCFA, and is a SANS Forensics and IR blog contributor. Michael's past speaking engagements include the DC3 Cybercrime Conference, IEEE, and SANS amongst various others.

      Read more >
    • Risk-Cloud-Crypto
      Risk-Cloud-Crypto Donald Parker, CISSP, CCSK, ITIL, MCSE Recorded: Sep 28 2017 5:00 pm UTC 57 mins
    • The three emerging pillars of cybersecurity include Risk Management, Cloud Security, and Cryptography. Cybersecurity can't be implemented efficiently without risk management. The cloud is taking over and here to stay. Cryptography is the clue that holds it all together.

      Donald Parker, CISSP, CCSK, ITIL, MCSE

      As a Sergeant in the US Army, cybersecurity instructor, inventor, author, and consultant to the Federal Government, Donald Parker has dedicated his entire career of over 23 years to the Information Technology industry with a special focus on Information Security. Mr. Parker has taught CISSP and other cybersecurity classes all over the United States and abroad, including Holland, Germany, and Guam. He holds a US patent for a physical computer security device that he believes will provide the greatest defense to one of the greatest threats on the Internet, Bot Networks. He has also developed a mechanical cryptographic cipher. Donald has authored a book on passing the CISSP exam and has published an audio version of the book online with over a million downloads. He has helped federal agencies and fortune 100 corporations comply with the ever-evolving cybersecurity landscape. As an independent consultant and small business owner for the past 10 years, he successfully completed more than a dozen short to midterm contracts. The knowledge gained from more than 25 different public and private sector environments has afforded him a birds-eye view of this exciting new field. Many of Mr. Parker’s customers and students refer to him as a one-man band in the since that; he can identify the laws, regulations, requirements and policies that an organization must comply with and actually implement the security controls necessary to demonstrate compliance. Donald has developed a STEM program to teach kids and young adults cyber security basics and prepare them for capture the flag competitions.

      Read more >
    • Becoming a Threat Hunter in Your Enterprise
      Becoming a Threat Hunter in Your Enterprise John H Sawyer, Senior Security Analyst at InGuardians and Chris Pace, Technology Advocate at Recorded Future Recorded: Apr 14 2017 12:45 pm UTC 63 mins
    • You’re tired of waiting. Tired of waiting for your technology to alert you that there’s already a problem. You want to be more proactive, sink your hands into those threat intelligence feeds, dig into those behavioral analytics reports, follow one clue after another after another, until it leads you to a would-be attacker, before they finish carrying out their grand plan. What you want is to be a threat hunter.

      And why not? Organizations who use threat hunting find it reduces their attack surface and enhances their incident response speed and accuracy. Yet few have formal programs in place with clear methodologies and repeatable processes. Attend this webinar and you’ll learn:

      • How threat hunting works
      • What a formal threat hunting program looks like
      • What skills any threat hunter should have
      • The threat hunter’s essential tricks and techniques of the trade

      Read more >
    • Threat intelligence and predictions for 2017 with Kaspersky Lab
      Threat intelligence and predictions for 2017 with Kaspersky Lab Amar Singh Recorded: Jan 6 2017 3:15 pm UTC 60 mins
    • Join us to learn about the top predictions for 2017, as identified by Kaspersky Lab's Global Research & Analysis Team (GReAT). Gain the latest intelligence on the threat landscape and our predictions for 2017

      We face a future of increasingly subtle and sophisticated threat factors; a world where traditional clues and indicators are no longer enough on their own to identify and block attacks; where information is wielded as a weapon, misdirection is king, and global networks of connected devices can be used to paralyse the Internet. What does this mean for business in 2017?

      Kaspersky Lab UK's Principal Security Researcher, David Emm, shall present the Who, What, How and Why in Kaspersky Lab's predictions for 2017 and explain how they will affect the cyber-security landscape throughout the year.

      - Who: The business sectors we predict will be particularly targeted in 2017 and who will attack them.

      - What: The data, behaviour and habits that will expose businesses to increasingly sophisticated threat factors.

      - How: The technical methods through which businesses will be targeted.

      - Why: What Kaspersky predict to be the endgame of 2017's cyber-criminals.

      Hosted by Amar Singh

      Read more >
    • The CSI Imperative
      The CSI Imperative Jeff Rumburg, Managing Partner at MetricNet Recorded: Feb 7 2017 7:00 pm UTC 63 mins
    • The CSI Imperative – How Successful Support Organizations Institutionalize Continual Service Improvement

      The advent of Chief Service Officers and Chief Improvement Officers offer telling clues about why some support organizations succeed at institutionalizing continual service improvement while most others fail. For these pioneering companies, CSI is not a mere slogan, project or program, but rather a core discipline that is carefully developed, nurtured, and managed over time.

      In this presentation, Mr. Rumburg, who has been retained as an IT service and support expert by some of the world’s largest corporations, will present case studies of support organizations that have successfully built a culture and discipline of continual service improvement. Additionally, he will provide a sample CSI timeline and an empirical model for Continual Service Improvement.

      Attendees will learn about the core discipline of CSI, the role of chief service and chief improvement officers, common pitfalls of implementing CSI, and the five success factors for effective CSI.

      Read more >