Successful salespeople gather clues that help them quickly build rapport with prospects and customers. They shorten their sales cycle and sell more when they use these clues to persuade customers to buy. You will improve your sales results and make your selling easier when you learn these persuasion strategies.Read more >
The Cisco Connected Life User Experience (CLUE) is a global research initiative that measures the regional adoption rates of select advanced application/services across three user categories - at home (residential services), at work (business services) and on the move (mobile services). This webcast provides a unique perspective on the advanced services that subscribers are using today.Read more >
Everyone in IT knows that security is a big deal, but did you know that SIEM (security information and event management) can help protect your network from data breaches, even when traditional defenses fail?
If SIEM a mystery to you, lets grab Colonel Mustard, the candlestick and head to the library because this mystery is about to be solved. We'll be giving out more than just clues in this webinar: you'll discover explanations of security concepts, tools, tips and tricks as we unravel the mystery of how to better protect your network. Bring your magnifying glass, because you’ll also learn about event correlation, EPS, normalization and other things that will surely impress your friends.
Learn from our chief gumshoe and noted SIEM Enthusiast Joe Schreiber. He’ll explain the reasons that SIEM exists, how it works, and most importantly - what you can do with it.
IT WAS MR. BODDY ALL ALONG!
Going to AWS re:Invent? Or not sure? Let Deb Schleede, our Community Manager and Jarrett Plante, our Event Manager, clue you in on what to expect - and what might be unexpected - at the biggest AWS event of the year!
Deb and Jarrett will discuss:
- The show floor
- The speakers
- The after-hours events and parties
- the best swag
- setting up meetings
Get prepped for re:Invent with this and much more.
On the heels of WannaCry, the world awoke on June 27 to another cyber attack that employs ransomware as a weapon. But this one is different and has fueled much speculation as to whether it is truly a ransomware attack or a wiper/destroyer attack meant to inflict irreversible damage. In this webinar, we will review some of the details of this attack and discuss clues towards motives and potential threat actors behind this attack.
About the Presenter:
Mounir Hahad, Ph.D. is Sr Director at Cyphort, a Security Analytics company headquartered in Santa Clara, CA. Mounir is the head of Cyphort Labs, the group responsible for conducting threat research within Cyphort and driving detection enhancements for Cyphort’s Advanced Detection Fabric which uses behavioral analysis along with machine learning to detect advanced threats and correlate those incidents with ingested information from third party solutions. Mounir holds a Ph.D. in computer science from the University of Rennes.
The Kill Chain model is a useful way to understand how adversaries are able to compromise their victims. During the earliest stages of preparation for an attack, the reconnaissance phase, attackers have not yet breached the victim environment, but they are, in fact, leaving subtle clues behind. These clues can be detected and enriched to help an organization prepare defenses ahead of the first directly invasive move by the adversary.
In this recorded webinar, you will learn:
-The 7 steps of the cyber kill chain
-Prepare defenses ahead of the first directly invasive move by the adversary
-How DomainTools data and tools enable you to apply this strategy to your own organization
Guest Speaker - Mike Cloppert
Michael has worked as a security analyst in various sectors including the Financial, Federal Government, and Defense industries. He has an undergraduate degree in Computer Engineering from the University of Dayton, an MS in Computer Science from The George Washington University, has received a variety of industry certifications including SANS GCIA, GREM, and GCFA, and is a SANS Forensics and IR blog contributor. Michael's past speaking engagements include the DC3 Cybercrime Conference, IEEE, and SANS amongst various others.
The three emerging pillars of cybersecurity include Risk Management, Cloud Security, and Cryptography. Cybersecurity can't be implemented efficiently without risk management. The cloud is taking over and here to stay. Cryptography is the clue that holds it all together.
Donald Parker, CISSP, CCSK, ITIL, MCSE
As a Sergeant in the US Army, cybersecurity instructor, inventor, author, and consultant to the Federal Government, Donald Parker has dedicated his entire career of over 23 years to the Information Technology industry with a special focus on Information Security. Mr. Parker has taught CISSP and other cybersecurity classes all over the United States and abroad, including Holland, Germany, and Guam. He holds a US patent for a physical computer security device that he believes will provide the greatest defense to one of the greatest threats on the Internet, Bot Networks. He has also developed a mechanical cryptographic cipher. Donald has authored a book on passing the CISSP exam and has published an audio version of the book online with over a million downloads. He has helped federal agencies and fortune 100 corporations comply with the ever-evolving cybersecurity landscape. As an independent consultant and small business owner for the past 10 years, he successfully completed more than a dozen short to midterm contracts. The knowledge gained from more than 25 different public and private sector environments has afforded him a birds-eye view of this exciting new field. Many of Mr. Parker’s customers and students refer to him as a one-man band in the since that; he can identify the laws, regulations, requirements and policies that an organization must comply with and actually implement the security controls necessary to demonstrate compliance. Donald has developed a STEM program to teach kids and young adults cyber security basics and prepare them for capture the flag competitions.
You’re tired of waiting. Tired of waiting for your technology to alert you that there’s already a problem. You want to be more proactive, sink your hands into those threat intelligence feeds, dig into those behavioral analytics reports, follow one clue after another after another, until it leads you to a would-be attacker, before they finish carrying out their grand plan. What you want is to be a threat hunter.
And why not? Organizations who use threat hunting find it reduces their attack surface and enhances their incident response speed and accuracy. Yet few have formal programs in place with clear methodologies and repeatable processes. Attend this webinar and you’ll learn:
• How threat hunting works
• What a formal threat hunting program looks like
• What skills any threat hunter should have
• The threat hunter’s essential tricks and techniques of the trade
Join us to learn about the top predictions for 2017, as identified by Kaspersky Lab's Global Research & Analysis Team (GReAT). Gain the latest intelligence on the threat landscape and our predictions for 2017
We face a future of increasingly subtle and sophisticated threat factors; a world where traditional clues and indicators are no longer enough on their own to identify and block attacks; where information is wielded as a weapon, misdirection is king, and global networks of connected devices can be used to paralyse the Internet. What does this mean for business in 2017?
Kaspersky Lab UK's Principal Security Researcher, David Emm, shall present the Who, What, How and Why in Kaspersky Lab's predictions for 2017 and explain how they will affect the cyber-security landscape throughout the year.
- Who: The business sectors we predict will be particularly targeted in 2017 and who will attack them.
- What: The data, behaviour and habits that will expose businesses to increasingly sophisticated threat factors.
- How: The technical methods through which businesses will be targeted.
- Why: What Kaspersky predict to be the endgame of 2017's cyber-criminals.
Hosted by Amar Singh
In this webinar, we shall discuss the origins alternative finance and share clues to understand what the future holds. We shall also review what alternative finance will mean for traditional finance organisations, savers investors and businesses alike.
-Alternative Finance - alternative to what exactly?
-Looking back and looking forward to the future of alternative finance
-Review different participants' perspectives, outlining opportunities and challenges for each.
The CSI Imperative – How Successful Support Organizations Institutionalize Continual Service Improvement
The advent of Chief Service Officers and Chief Improvement Officers offer telling clues about why some support organizations succeed at institutionalizing continual service improvement while most others fail. For these pioneering companies, CSI is not a mere slogan, project or program, but rather a core discipline that is carefully developed, nurtured, and managed over time.
In this presentation, Mr. Rumburg, who has been retained as an IT service and support expert by some of the world’s largest corporations, will present case studies of support organizations that have successfully built a culture and discipline of continual service improvement. Additionally, he will provide a sample CSI timeline and an empirical model for Continual Service Improvement.
Attendees will learn about the core discipline of CSI, the role of chief service and chief improvement officers, common pitfalls of implementing CSI, and the five success factors for effective CSI.
A DDoS attack is sometimes a smokescreen to cover up much more damaging activity such as theft or fraud. While you’re working frantically to mitigate the DDoS attack and get critical applications back online, cybercriminals could be working under the radar to break into your systems and conduct more malevolent activities.
Learn to listen to your network activity:
-Clues from DDoS attacks that will help you investigate threats
-Why organizations like FFIEC warn banks about the use of DDoS
-Best practices for DDoS protection
Attackers can't hide on the Internet—in fact, they leave behind fingerprints in areas you may not realize. Prior to launching an attack, the bad guys need to set up servers, obtain IP addresses, and register domains to use in the campaign. This often happens before they perform reconnaissance on their targets or create the malware payload. All of this activity leaves clues about the attackers.
What if you could uncover the infrastructure attackers are staging and identify threats BEFORE the kill chain begins?
Join our webcast on July 30th with Guest Speaker, Forrester Research, Inc. Principal Analyst, Rick Holland and Dan Hubbard, OpenDNS Chief Technology Officer, to hear more about:
What attackers do before the kill chain
How you can spot their activity
How you can leverage this information to stay ahead of attacks