Hi [[ session.user.profile.firstName ]]
Sort by:
    • Threat Actors Follow The Money | 2018 Human Factor Report
      Threat Actors Follow The Money | 2018 Human Factor Report Patrick Wheeler, Director of Threat Intelligence, Proofpoint Recorded: May 9 2018 5:00 pm UTC 59 mins
    • The human factor—the instincts of curiosity and trust that lead well-meaning people to click, download, install, move funds, and more—is simply more reliable and lucrative than exploits with increasingly short shelf lives.

      Here are the key findings from Proofpoint’s 2018 Human Factor Report, exploring the ways in which threat actors continue to refine their approaches to social engineering with well-crafted lures and schemes that regularly trick even savvy users.

      Join Proofpoint Director of Threat Intelligence as we discuss:

      -- Trends in volume and type of attack providing useful insights for both defenders and organizations.
      -- Ransomware and Email Fraud - how effective have they become and who is being targeted the
      most.
      -- How bad actors are using cloud services

      Read more >
    • The role of threat intelligence in an effective security operation
      The role of threat intelligence in an effective security operation Oleg Glebov, Threat Management and Defense Solution Leader, Alexander Liskin, Heuristic Detection Group Manager Kaspersky Lab Recorded: Jul 31 2018 10:00 am UTC 60 mins
    • Experts predict a busy year for cybersecurity threats… a rise in general and accidental malware infections, an increased risk of targeted ransomware attacks and new types of malware and malicious tools all lie ahead.

      Threat intelligence is a key component of any effective security operation. Without exceptional, coordinated threat intelligence, cyber threats simply can’t be reliably identified or stopped.

      Kaspersky Lab is hosting a webinar on the key role of threat intelligence in an effective security operation. The webinar will be presented by Oleg Glebov, solution leader for our Threat Management and Defense portfolio and Alexander Liskin, Kaspersky Lab anti-malware research expert.

      The webinar is aimed at anyone with a professional interest in cybersecurity and threat intelligence, in particular IT security officers, incident response specialists and SOC analysts.

      The webinar will cover the following topics:
      • the current threat landscape – and the methods cybercriminals use to evade detection;
      • the critical role threat data feeds play in protecting you from attack;
      • the increasing importance of proven, established sandboxing – and the capabilities of Kaspersky Lab’s Cloud Sandbox;
      • APT and Financial Threat Intelligence Reporting;
      • how our experts use Threat Lookup for incident investigation;
      • Kaspersky’s Threat Intelligence Services – and how we can help build a comprehensive Incident Response (IR) framework with our Threat Intelligence Portal and Cloud Sandbox.

      Read more >
    • Under the Hood with AlienVault Labs: Leveraging Threat Intelligence
      Under the Hood with AlienVault Labs: Leveraging Threat Intelligence Sacha Dawes, Principal Product Marketing Manager, AlienVault & Chris Doman, Threat Engineer, OTX, AlienVault Recorded: Jun 14 2018 4:00 pm UTC 56 mins
    • Threat intelligence offers the ability to improve threat detection and response using information on attack methods previously reported by others, but only if it can be effectively integrated into security controls and processes. So, how do you go from threat data to actionable insights?

      Join AlienVault for this webcast to get a look under the hood at how the AlienVault Labs threat research team turns threat data and indicators of compromise (IoC’s) into comprehensive, actionable threat intelligence.

      We'll cover:

      - What threat intelligence is, and how it speeds threat detection and incident response
      - Key questions to help you evaluate threat intelligence sources
      - How the AlienVault Labs team analyzes threat data, and turns it into actionable information
      - How AlienVault USM Anywhere integrates threat intelligence with multiple security capabilities to accelerate threat detection and response

      Hosted By
      Sacha Dawes
      Principal Product Marketing Manager
      Sacha has over 15 years of experience in technology and information security across product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he delivered solutions to address the IT security, identity and management space. Before joining AlienVault, he worked in the office of the EVP for Cloud and Enterprise business at Microsoft. Originally from the UK, Sacha is based in Austin TX and holds a Masters in Computer Science from Vanderbilt University.

      Chris Doman
      Threat Engineer, OTX
      Chris works on Alienvault OTX as a Threat Engineer. He’s had a long interest in security, but joined the industry after winning the civilian section of the Department of Defense's forensics competition. Chris runs a popular threat intelligence portal (ThreatCrowd.org) in his spare time, and holds a CCHIA (Certified Host Intrusion Analyst) from CREST and a degree in Computer Science from the University of Cambridge.

      Read more >
    • Understanding Ransomware: Insights from Threat Research
      Understanding Ransomware: Insights from Threat Research Erika Noerenberg | Senior Malware Analyst | LogRhythm Recorded: Mar 20 2018 8:00 pm UTC 44 mins
    • Ransomware has dominated recent cybersecurity news and made mainstream headlines throughout 2017. While there are ways to protect organizations against ransomware, cybercriminals are constantly evolving their tactics to stay ahead of security teams.

      In this webcast, Erika Noerenberg, senior malware analyst, will discuss the ransomware threat and the biggest ransomware events to date, including WanaCry and NotPetya. She’ll also provide valuable threat intelligence and key defensive strategies to help you protect your organization from ransomware.

      You’ll learn:
      • An introduction to ransomware
      • Notable ransomware threats
      • Ransomware threat research
      • Key mitigation and defensive strategies

      Register now to hear about the rise of ransomware and tips to defend your organization.

      Read more >
    • Understanding Ransomware: Insights from Threat Research
      Understanding Ransomware: Insights from Threat Research Erika Noerenberg | Senior Malware Analyst | LogRhythm Recorded: Aug 8 2018 12:00 am UTC 43 mins
    • Ransomware has dominated recent cybersecurity news and made mainstream headlines throughout 2017. While there are ways to protect organizations against ransomware, cybercriminals are constantly evolving their tactics to stay ahead of security teams.

      In this webcast, Erika Noerenberg, senior malware analyst, will discuss the ransomware threat and the biggest ransomware events to date, including WanaCry and NotPetya. She’ll also provide valuable threat intelligence and key defensive strategies to help you protect your organization from ransomware.

      You’ll learn:
      • An introduction to ransomware
      • Notable ransomware threats
      • Ransomware threat research
      • Key mitigation and defensive strategies

      Register now to hear about the rise of ransomware and tips to defend your organization.

      Read more >
    • Best Practices for Threat Hunting
      Best Practices for Threat Hunting Jonny Milliken, Threat Intelligence Manager, Alert Logic Recorded: Jul 18 2018 2:00 pm UTC 39 mins
    • Cyber threats are increasing in both sophistication and frequency, often overwhelming Security Operation Center (SOC) staff. As a result, more organizations are moving away from traditional reactive security while incorporating threat hunting techniques in their cybersecurity strategy.

      Go threat hunting with Jonny Milliken, Threat Research Manager at Alert Logic and join this webinar – here you’ll learn why more organizations are adding threat hunting capabilities, and why it should be a top priority for you as well.


      Highlights include:
      - Should we fight automation with automation?
      - How to construct your security operations to build to scale and react quickly to new threats
      - Known and unknown threats
      - Threat detection vs. threat hunting

      Read more >
    • Security Threat Research: New Real-World Attacks Update
      Security Threat Research: New Real-World Attacks Update Oleg Kolesnikov, Director of Threat Research, Securonix Recorded: Jun 26 2018 5:00 pm UTC 44 mins
    • Join this webinar to learn about the latest threats and attack techniques that the Securonix Threat Research team is seeing in the wild. You will also learn how you can leverage user and big data security analytics to increase the chances of detecting such threats and techniques at an early stage.

      Topics we are planning to talk about include:
      - A persistent crypto jacking attack recently seen in the wild
      - One of the most virulent and prevalent mass-scale ransomware attacks seen so far this year
      - Techniques used by attackers to steal hashes without using mimikatz and without touching lsass
      - How security analytics can increase your chances of early detection of such attacks and techniques

      Read more >
    • Going on the offensive: Incorporating threat hunting into your security
      Going on the offensive: Incorporating threat hunting into your security Andrew Costis, threat research engineer, LogRhythm Recorded: Mar 20 2018 10:00 am UTC 60 mins
    • Threat hunting is the latest strategy to keep networks secure. Put simply, it refers to the process of proactively searching for advanced threats that may have eluded security systems. In other words, going after the ones that slipped through the net.

      It’s important to know that threat hunting is more than industry hype. It provides security professionals with a powerful weapon with which to combat threat actors. So, is time to go on the offensive?

      •Learn why threat hunting should be on your security mandate for 2018
      •Discover some of the core requirements for getting started with threat hunting
      •Hear how you can you jump start your threat hunting mindset
      •Learn how a simple threat hunt can unravel a more sophisticated attack

      Join our webinar to hear Andrew Costis, threat research engineer at LogRhythm Labs, outline how a simple hunt uncovered a malicious insider attack by a privileged user.

      Read more >
    • 3 Things To Know About Comodo's Threat Intelligence Report
      3 Things To Know About Comodo's Threat Intelligence Report Comodo Cybersecurity Recorded: Jul 23 2018 4:00 pm UTC 2 mins
    • The Comodo Threat Intelligence Lab monitors, filters and contains, and analyzes malware, ransomware, viruses and other "unknown" potentially dangerous files 24x7x365 in over 190 countries around the world. With 5 offices spread across the Americas, Asia, and Europe (and staff covering over 190 countries), the Lab is made up of more than 120 IT security professionals, ethical hackers, computer scientists and engineers (all full-time Comodo Lab employees) analyzing millions of potential pieces of malware, phishing, spam or other malicious/unwanted files and emails every day. The Comodo Threat Intelligence Lab also works with trusted partners in academia, government and industry to gain additional insights into known and potential threats.

      For More Information: https://bit.ly/2LdXdnr

      Read more >
    • How to Combat the 7 Common Emergent Threats
      How to Combat the 7 Common Emergent Threats Keiron Shepherd, Senior Systems Engineer - Security, F5 Networks Recorded: Mar 21 2018 3:00 pm UTC 64 mins
    • In today’s digital marketplace, your applications are the backbone of your business. However, cloud-based apps create a host of complex challenges and new risks. With automated tools and hackers for hire, threats are increasing and cybercrime has turned into a game for profit. The digital world has opened the door to unprecedented threats, putting your corporate data and reputation at risk.

      Join us for this webinar to learn about:
      • The 7 most common threats to your apps and data: Malicious bots, Credential stuffing, DDoS, Ransomware, Web fraud, Phishing, and Malware
      • How you can leverage threat intelligence to secure your apps and data
      • Where to spend your security budget to provide the strongest level of protection

      By watching this webinar, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://f5.com/about-us/policies/privacy-policy).

      Read more >
    • Threat Hunting, the Difference Between Safe and Sorry
      Threat Hunting, the Difference Between Safe and Sorry Dr. Jonny Milliken, Threat Intelligence Manager, Alert Logic; Holger Schulze, CEO, Cybersecurity Insiders Recorded: Aug 2 2018 3:00 pm UTC 46 mins
    • Think Threat Hunting is a nice-to-have, or just a buzz word? Think again. Threat hunting is critical for early detection of unknown threats and advanced attacks that turn into undetected breaches.

      In today’s complex cybersecurity landscape, threats are becoming more sophisticated, frequent, and elusive. It’s no longer enough to depend on traditional, reactive security to stay safe – incorporating threat hunting techniques in your cybersecurity strategy is a necessity.

      Threat hunting puts security on the offense. Rather than just waiting for an attack to trip an alarm, threat hunting takes a comprehensive, holistic approach to proactively monitor for and identify suspicious or potentially malicious activity, so you can take action earlier.

      Hear from experts on how and why threat hunting is critical for your cybersecurity strategy. In this webinar, we’ll cover:

      • How these advanced multi-step attacks work and go undetected
      • How to find evidence of emerging threats and preserve indicators of compromise
      • Logs, and why they are a threat hunter’s best friend
      • Using techniques like honey pots to draw out malicious insiders and would-be cyber attackers

      Read more >
    • Trends in Security: How to Create a Scalable Threat-modeling Practice
      Trends in Security: How to Create a Scalable Threat-modeling Practice Chandu Ketkar, Principal Consultant, Synopsys Recorded: Jul 17 2018 8:00 pm UTC 45 mins
    • For most organizations, performing threat-modeling is a difficult and an expensive undertaking. There are good reasons why this is the case. Threat modeling traditionally requires an experienced security architect with knowhow in architecture patterns, design patterns, a breadth of technologies, and above all deep security knowledge.

      Join this webinar and learn:

      - Consistency/Reliability: Use of patterns allows us to identify recurring problems/patterns and provide consistently the same solution. In security this means that identifying patterns during threat modeling will allow us to create consistent design, development, testing, and risk guidance.

      - Efficiency: Use of patterns allows us to automate some part of a problem while leaving the more complex concerns to be tackled by experts. This creates efficiencies.

      - Commonly understood taxonomy: Patterns create a common taxonomy for organizing knowledge, training users/practitioners, communicating with stakeholders (developers, testers, architects, security analysts, etc.)

      Read more >
    • Going on the offensive: Incorporating threat hunting into your security
      Going on the offensive: Incorporating threat hunting into your security Andrew Costis, threat research engineer, LogRhythm Recorded: Jun 6 2018 12:00 am UTC 60 mins
    • Threat hunting is the latest strategy to keep networks secure. Put simply, it refers to the process of proactively searching for advanced threats that may have eluded security systems. In other words, going after the ones that slipped through the net.

      It’s important to know that threat hunting is more than industry hype. It provides security professionals with a powerful weapon with which to combat threat actors. So, is time to go on the offensive?

      •Learn why threat hunting should be on your security mandate for 2018
      •Discover some of the core requirements for getting started with threat hunting
      •Hear how you can you jump start your threat hunting mindset
      •Learn how a simple threat hunt can unravel a more sophisticated attack

      Join our webinar to hear Andrew Costis, threat research engineer at LogRhythm Labs, outline how a simple hunt uncovered a malicious insider attack by a privileged user.

      Read more >
    • Hunting Rogue Elements: Fighting the Insider Threat
      Hunting Rogue Elements: Fighting the Insider Threat Kevin Eley, LogRhythm & Jonathan Zulberg, LogRhythm Recorded: May 23 2018 12:00 am UTC 43 mins
    • Customer data falling into the hands of cybercriminals. It’s the stuff of nightmares for any organisation. Today the insider threat has the potential to pose a bigger risk to cybersecurity than external hackers.

      In this webinar, LogRhythm experts will take you through a real use case in which data worth millions of pounds was stolen. And they will explain how the incident could have been stopped with the right response and mitigation approach.

      Join the webinar to:

      • Learn how cybercrime has evolved so much that insider threats now rival external threats
      • See a live display of activity generated by an insider threat
      • Discover cybersecurity innovations that can detect and respond to insider threats in real time

      Join us to get a better understanding of the insider threat – and how to combat rogue elements in your organisation.

      Read more >
    • 3 Challenges of Using EDR for Threat Hunting [2/3 Threat Hunting Series]
      3 Challenges of Using EDR for Threat Hunting [2/3 Threat Hunting Series] Chris Gerritz, the Founder of Infocyte, Rohit Dhamankar is VP of Product at Infocyte Recorded: Mar 27 2018 6:00 pm UTC 57 mins
    • In part 2 of our myth busting webinar series, threat hunters from Infocyte will discuss how to scalably and proactively hunt for unknown threats across the entire enterprise network with an approach called Forensic State Analysis (FSA). We will compare FSA against three of the traditional methods of threat hunting that you may have been told are the “only” ways to perform threat hunting.

      We will look at the pitfalls of relying on Endpoint Detection (EDR) software as a substitute for proactive threat hunting, and examine some of the common misconceptions. We will also show how FSA arms security practitioners with an effective and efficient methodology to hunt without relying solely on sophisticated security infrastructure, big data or experts.

      In EDR vs FSA, you will learn about:

      - The use cases for traditional Endpoint Detection
      - The challenges of using real-time detection tools to find hidden threats
      - How to hunt at scale and simplify the threat hunting process using FSA

      About the presenters:
      Chris Gerritz, the Founder of Infocyte, is a pioneer in defensive cyberspace operations having built the U.S. Air Force's first interactive Defensive Counter Cyberspace (DCC) practice. Infocyte is the result of Chris’ experience hunting adversaries within some of the largest and most targeted defense networks in the world. His experience provides him with an unmatched level of operational expertise and equips him with a highly refined perspective on how to tackle today's security threats.

      Rohit Dhamankar is VP of Product at Infocyte, and is responsible for defining the company's product and strategy. Dhamankar brings more than 15 years of security industry experience across product management, threat research, technical sales and customer solutions.

      Read more >