Hi [[ session.user.profile.firstName ]]
Sort by:
    • Protect and Prevent: 3 strategies for blocking fileless attacks and exploits
      Protect and Prevent: 3 strategies for blocking fileless attacks and exploits Jack Danahy, CTO, Barkly Recorded: Nov 28 2017 6:00 pm UTC 49 mins
    • Ransomware continues to experience record growth in 2017. Traditional solutions aren't enough and can't keep up with hundreds of thousands of new malware versions created daily. File-less attacks and exploits are now the most common vectors for successful ransomware attacks and most companies aren't protected.

      Learn the three strategies Avidia Bank implemented to shut out today's sophisticated threats and how you can apply them to protect your own organization:

      Register now to learn more on:

      - How ransomware is going fileless to get past protection
      - What makes everyone a target
      - Three protection strategies to minimize the risk to your organization


      Jack Danahy is the co-founder and CTO of Barkly, the Endpoint Protection Platform that delivers the strongest protection with the fewest false positives and simplest management. A 25-year innovator in computer, network and data security, Jack was previously the founder and CEO of two successful security companies: Qiave Technologies (acquired by Watchguard Technologies in 2000) and Ounce Labs (acquired by IBM in 2009). Jack is a frequent writer and speaker on security and security issues, and has received multiple patents in a variety of security technologies. Prior to founding Barkly, he was the Director of Advanced Security for IBM, and led the delivery of security services for IBM in North America.

      Read more >
    • IoT Architecture, Vulnerabilities and Exploits
      IoT Architecture, Vulnerabilities and Exploits Kevin McNamee, Nokia's Threat Intelligence Lab Recorded: Jun 13 2018 9:00 pm UTC 62 mins
    • This webinar will explore the end-to-end IoT architectures that are in use today. This will be done from a security perspective, itemizing the vulnerabilities that are present at each level of the architecture.

      Kevin McNamee of Nokia's Threat Intelligence Lab will then take a detailed look at actual exploits of IoT vulnerabilities from field cases over the past couple of years. The webinar will conclude with a summary of actions that can be taken to reduce the risk of cyberattack and subsequent compromise of IoT devices.

      About the Speaker:
      Kevin McNamee heads up Nokia's Threat Intelligence Lab. This lab analyzes thousands of mobile malware samples each day to create the detection rules that power Nokia’s network based malware detection system. Previously at Alcatel-Lucent he was director of Security Research with Alcatel-Lucent's Bell Labs, specializing in the analysis of malware propagation and detection. He has had speaking engagements at RSA, BlackHat, SECTOR, (ISC)2, Virus Bulletin and BSides.

      Read more >
    • Prevention Week Part 2: Defeat Zero-Day Exploits by Automating Prevention
      Prevention Week Part 2: Defeat Zero-Day Exploits by Automating Prevention Michael Moshiri | Director, Advanced Endpoint Protection at Palo Alto Networks Recorded: Jul 19 2016 5:00 pm UTC 61 mins
    • Your endpoint security should easily prevent known threats. But can it also prevent unknown threats from compromising your environment? More importantly, can it automate this prevention so you don’t have to assign scarce resource to investigate alerts?

      In this webinar, you’ll discover a revolutionary approach to defeating zero-day exploits. We’ll examine current approaches to exploit prevention, discuss the top 10 zero-day exploits of 2015, and analyze unknown threats on the day they became known.

      You’ll learn:
      •How to future-proof your endpoint security to protect your users from unknown threats
      •Why other approaches to endpoint protection cannot prevent zero-day exploits
      •Which applications were targeted by the top 10 zero-day exploits discovered in 2015
      •How to automate threat prevention through a natively-integrated, next-generation security platform

      Read more >
    • A New Way of Predicting Exploitability - Kenna Security with Exploit Prediction
      A New Way of Predicting Exploitability - Kenna Security with Exploit Prediction Ed Bellis, CTO, Co-Founder, Michael Roytman, Chief Data Scientist Recorded: Mar 21 2018 5:00 pm UTC 41 mins
    • Do you think security is overdue for actionable forecasts rather than security dogma? Are you a security leader tired of worrying about the next vulnerability with a logo and a web site? If we can forecast the weather, we can use similar models to foresee which vulnerabilities attackers are likely to weaponize.

      Join Kenna Security's Michael Roytman, Chief Data Scientist and Ed Bellis, CTO, Co-Founder and ex-CISO at Orbitz for a live webinar where they will debut Kenna Security's new Exploit Prediction, the industry's first vulnerability exploit prediction capability, a significant breakthrough for security professionals looking to develop a more mature proactive approach to vulnerability management.

      In this webinar cover:

      "How Kenna Exploit Prediction has delivered 94 percent predictive accuracy
      "How to adopt a proactive approach to contextualize, prioritize and remediate vulnerabilities, based on risk
      "How the Kenna Security Platform with Exploit Predictions can help align security, IT operations, and executive management with a single view of risk
      "A demonstration of the Kenna Security platform with the new Exploit Prediction capabilities

      Read more >
    • Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
      Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits Sacha Dawes, Principal Product Marketing Manager, AlienVault Recorded: Jan 9 2018 6:00 pm UTC 37 mins
    • As you've likely heard, Meltdown and Spectre are vulnerabilities that exist in Intel CPUs built since 1995. Hackers can exploit Meltdown and Spectre to get hold of information stored in the memory of other running programs. This might include passwords stored in a password manager or browser, photos, emails, instant messages and even business-critical documents.

      Join us for a technical webcast to learn more about these threats, and how the security controls in AlienVault Unified Security Management (USM) can help you mitigate these threats.

      You'll learn:

      What the AlienVault Labs security research team has learned about these threats
      How to scan your environment (cloud and on-premises) for the vulnerability with AlienVault USM Anywhere
      How built-in intrusion detection capabilities of USM Anywhere can detect exploits of these vulnerabilities
      How the incident response capabilities in USM Anywhere can help you mitigate attacks

      Hosted By
      Sacha Dawes
      Principal Product Marketing Manager
      Sacha joined AlienVault in Feb 2017, where he is responsible for the technical marketing of the AlienVault Unified Security Management (USM) family of solutions. He brings multiple years of experience from product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he has delivered both SaaS-delivered and boxed-product solutions that address the IT security, identity and management space. Originally from the UK, Sacha is based in Austin, TX.

      Read more >
    • Take a Deeper Dive: A Flaw, a Vulnerability, and an Exploit
      Take a Deeper Dive: A Flaw, a Vulnerability, and an Exploit Nathan Michalov, CA Veracode Solutions Architect Recorded: Jun 13 2018 3:30 pm UTC 18 mins
    • Your organization cannot afford to let potential system flaws or weaknesses in your software applications be exploited. That is why knowing the distinct differences between these weaknesses is critical in successfully addressing them. During this webinar, one of CA Veracode’s security implementation experts will discuss how to identify these risk factors within your application landscape, and to:

      •Learn a practical approach to helping security and development teams address these factors
      •Learn about the methods and solutions attackers typically rely on to perform application vulnerability discovery and compromise
      •Learn from examples of how organizations rely on application security technology and services to gain visibility into their overall landscape – and act upon it in the right way

      Read more >
    • Petya Variant Ransomware: How to Detect the Vulnerability and Exploits
      Petya Variant Ransomware: How to Detect the Vulnerability and Exploits Sacha Dawes, Principal Product Marketing Manager. Chris Doman, Threat Engineer Recorded: Jun 27 2017 6:35 pm UTC 32 mins
    • As you've likely heard, a variant of the Petya malware is spreading rapidly and is known to have affected organizations worldwide, regardless of size. This variant of Petya follows a similar attack method to last month's WannaCry ransomware, though it uses the PsExec and WMI services for distribution.

      Once compromised, the ransomware will overwrite the Master Boot Record (MBR), encrypt individual files that match a list of file extensions (including documents, archives, and more), and after a reboot of the system will present the user a message requesting a ransom in Bitcoin to decrypt the system. As with WannaCry, the ETERNALBLUE exploit toolkit (which was released by the Shadow Brokers group in April 2017) is suspected to be a key part of the attack.

      Join us for a 30-minute technical webcast to learn more about this Petya variant, and how the unified security controls in AlienVault USM Anywhere can help you quickly identify vulnerable systems and attacks.

      You'll learn:

      What the AlienVault Labs security research team has uncovered about this threat
      How to scan your environment (cloud and on-premises) for critical vulnerabilities with AlienVault USM
      How AlienVault USM leverages threat intelligence for early detection of threats like this variant of Petya
      How built-in response orchestration capabilities in AlienVault USM can stop the threat from spreading

      Read more >
    • Exploit Kits and Ransomware in State & Local Governments & Education
      Exploit Kits and Ransomware in State & Local Governments & Education Brad Duncan - Threat Intelligence Analyst - Palo Alto Networks Recorded: Oct 26 2016 4:00 pm UTC 53 mins
    • Criminal groups use exploit kits as one of the main distribution methods to infect Windows hosts with malware. Exploit kits are designed to work behind the scenes while you are browsing the web. During the past year, the most common malware distributed by exploit kits has been ransomware.

      In most cases, a potential victim visits a compromised website as the first step in an infection chain. Behind the scenes, the victim is redirected to an exploit kit. The exploit kit gathers information about the victim's system, determines the appropriate exploit, and infects any vulnerable hosts.

      In this presentation, Brad Duncan reviews fundamental concepts of exploit kit activity for the SLED vertical and demonstrates how ransomware infections happen through this method. Brad also discusses preventative measures people and organizations can take to combat this very real threat.

      Read more >
    • Exploit Kits Don't Stop, Neither Should Your Business.
      Exploit Kits Don't Stop, Neither Should Your Business. Proofpoint Recorded: Dec 8 2016 12:30 am UTC 41 mins
    • Exploit kits don’t stop. Neither should your business with CERT Australia.

      Ransomware has one goal: to get your money. It locks away files until payment is made.
      Webinar invitation: December 8th at 11:30am AEST

      Join Chris Firman, Technical Adviser at CERT Australia and Jennifer Cheng, Director, Product at Proofpoint for a live webinar about Ransomware. They will address:

      •Ransomware evolution
      •Why ransomware is surging
      •Where it comes from
      •How are actors bypassing common security controls
      •Should you pay or not? What to consider
      •CERT recommended migrations

      Read more >
    • Staying Ahead of Hackers with NSS CAWS Advanced Exploit Testing
      Staying Ahead of Hackers with NSS CAWS Advanced Exploit Testing Brendan Patterson, director of product management, and Rob Johnson, sales engineer Recorded: Nov 17 2016 5:00 pm UTC 40 mins
    • Over 90% of all breaches are enabled by a few hundred commercial exploit kits that hackers share and sell in the black market. The typical IT environment may have thousands of unpatched vulnerabilities, but at any given time, only a small handful of vulnerabilities are being actively exploited. To stay ahead of these attacks, WatchGuard participates in NSS exploit testing using CAWS (Cyber Advanced Warning System) - a cloud hosted software service that actively monitors and harvests live cyber threats and attacks, and then tests them against environments protected by the most widely used security solutions in the industry.

      Join Brendan Patterson, director of product management at WatchGuard, and Rob Johnson, sales engineer at NSS Labs, for a behind the scenes look at the CAWS test system, and how it helps enable WatchGuard to stop hackers in their tracks.

      Read more >
    • Reporting Risk Posture to the Board: Increase Confidence with Exploit Prediction
      Reporting Risk Posture to the Board: Increase Confidence with Exploit Prediction Jonathan Cran, Head of Research & Jerry Gamblin, Principal Security Engineer, at Kenna Security Recorded: Apr 24 2018 8:00 pm UTC 45 mins
    • Reporting your organization's risk posture to the board shouldn't be a scary annual or quarterly monologue, where you're on the hot seat; instead, it should be an ongoing opportunity for bilateral communication that helps drive your security strategy. Fully understanding their perspectives, priorities, and biases paves the way for valuable partnership between security executives and members of the board.

      Join Kenna Security's Jonathan Cran, Head of Research, Jerry Gamblin, Principal Security Engineer, and Jeff Aboud, Director of Product Marketing for a live webinar as they discuss:

      1. Define what "just enough security" means to your business
      - Understand the resources and roadmap for the business
      - Ensure team members understand and buy into the priorities
      - Understand how to partner with your business executives

      2. Prioritize based on bottom line impact
      - Know which systems drive business value
      - Partner with the business and the board to drive prioritization
      - Build a risk burndown or "time to green" plan

      3. Report risk and manage incidents with the C-level and board
      - Define regular communication with your board
      - Partner cross-functionally with legal teams
      - Manage crisis communication and how to avoid going "end-of-the-world"

      Read more >