Yahoo closed 2016 with another revelation about their poor state of security. This time they admitted of losing all their user credentials in 2013.
Adding to Hold Security's previous intelligence from the 2014 breach, Alex Holden, CISO will discuss exclusive details about situation with Yahoo.
Join the interactive Q&A and learn:
- Where is the stolen data?
- Who is behind this breach?
- What to expect next from Yahoo.
Cyber threats are more sophisticated than ever, slipping past perimeter defenses and hiding in the normal flow of network communications. For all you GOT fans, it’s a lot like Wildlings slipping past The Wall.
Data breaches are going undetected for more than 200 days, and in most cases, the breached company learns about the breach from outside their organization. What’s the common denominator? The Network. Much like the North, the network remembers.
A lack of high-definition network visibility has extended the breach detection window and prolonged data breach investigations. New methods of network visibility, learning analytics and automation are now available to accelerate and simplify the breach-hunting journey – past, present and future.
In this webinar, we will examine:
• Why IT and cyber security organizations today struggle with breach detection and investigations
• Why legacy approaches to analyze network traffic (SIEM, packet recorders, network forensics) are extending and complicating cyber investigations, and
• A new “time machine” model of network security analytics that accelerates the breach detection and incident response workflow
This event will also look at the architectural considerations and investment required for implementing this new model of network-based breach detection, as well as examples of the types of threats that can be discovered after the threat slips past preventative security measures, such as firewalls, anti-virus and intrusion prevention.
Review of threat landscape of this year's major breach revelations. Why are they all out now? Who are the bad guys? What drives them? Navigating a web of lies and deception to measure current threat landscape. What do you need to know about current ramifications of Yahoo's disclosure?
Alex Holden is the founder and CISO of Hold Security. Holden is credited with the discovery of many high profile breaches including Adobe Systems, initial vendor breach that led to the discovery of the JPMorgan Chase breach, and the independent discovery of the Target breach. Considered one of the leading security experts, he regularly voices his professional opinion in mainstream media.
Research shows that 76% of companies suffered a data breach in 2016, so it’s now almost inevitable that hackers will gain access to your company and your sensitive data.
Security professionals are now looking to deal with breaches faster, to keep their company off the front page and with heavy GDPR fines on the horizon, they’re wise to do so…
Organisations are fearful of damaging data breaches but unsure of the best course of action to protect themselves from major cyber incidents. Whilst a large per cent of businesses focus on building up perimeter defences, not enough are concentrating on monitoring their own network for the best chance to detect threats and mitigate them before significant damage is done.
Tune into this in-depth one-on-one interview to learn:
- More about the threatscape and the dangers to your organisation
- The influence that GDPR will have and steps you need to take
- Processes for responding to a breach
- The workflow for effective threat management
We built security into Microsoft products and services from the start. That’s how we deliver a comprehensive, agile platform to better protect your endpoints, move faster to detect cybersecurity threats, and respond to security breaches across the smallest and largest of organizations.
Join this session to learn more about:
- Preventing identity compromise
- Securing apps and data
- Expanding device controls
- Safeguarding your cloud infrastructure
Sony, Target and now Yahoo! -- you can't let this to happen to you or your business. Help your organization avoid being front page news due to a security breach.
Every organization large and small wants to avoid this all too common reality. From the unintentional sharing of data by employees through a rogue email, to losing data via a lost computer, to surviving hacker attacks, there's a lot to manage.
Join this webcast to learn the top 5 ways to protect your organization and make sure your company isn't the next one hacked.
On December 14 Yahoo revealed a new breach affecting more than 1 billion users’ data. This breach is separate to the hack it disclosed earlier this year, which was the biggest data breach on record. Join John Bambenek, Threat Systems Manager at Fidelis Cybersecurity on the latest developments in the Yahoo breaches, what it means for you and steps to take today.Read more >
Once breached at the endpoint, what does an attacker do? Where is he going? What does he want? The truth of APTs and advanced attacks is that they just don't want one machine - they want access to the heart of the organization. Since 1999, Microsoft has made the Windows Domain the heart of the network. Once accessed, it permits the attacker to control the organization - undetected and indefinitely. This is what the attacker wants. This webinar will discuss all moves an attacker can make to go from a compromised machine to achieve his goal from a statistical point of view; we will present the probability of detection and evidence-gathering for any move made along the way.
Roi is CEO and Founder of Javelin Networks, a post breach containment technology that focuses on stopping attackers from credential misuse and lateral movement after compromising a machine. Roi served in the Israeli Air Force at the OFEK unit where he worked on the security of the Israeli satellite launch, Arrow missiles and the Air Force drones. As a network and security engineer, he was influential in designing, developing, analyzing, implementing large enterprise communication networks, both nationally and around the world. Worked for four years as a Security consultant, leading ongoing projects at the Vatican and other military organizations.
With 2016 behind us, is this the last Yahoo breach we’ll hear about? Join Chris Roberts, Chief Security Architect at Acalvio Technologies as he discusses the lessons to be learned from the recently disclosed Yahoo breaches, and the nagging questions infosecurity professionals will try to answer in 2017.Read more >
Cyber threats are constantly evolving, increasing in both sophistication and how they impact victims. In today’s world, you must battle a wide range of adversaries, from hacktivists to state-sponsored threats. The most significant of these threats are advanced attackers who carefully plan and execute breaches into victim organisations.
In this live webinar, Roger J. Francis, Senior Consultant at Mandiant, a FireEye company, will discuss real-world incidents and steps organisations should take to minimise the financial impact of a data breach.
Today, every organization is at risk of cyber attacks. It is no longer the question of if, but when. Attackers are motivated, sophisticated and not limited by national borders. With IoT devices increasing in adoption and becoming intrinsic elements in our smart city infrastructure, industrial control systems and transportation systems, improving cybersecurity is essential.
Join this keynote panel and learn the latest trends in cyber attacks, hacks and breaches in an increasingly IoT world, and the recommendations on how to strengthen the security of our most critical assets.
- Fred Wilmot, CTO of PacketSled
- Usman Choudhary, Chief Product Officer at ThreatTrack
- Chris Roberts, Chief Security Architect at Acalvio
- Sushila Nair, Principal Consultant at NTT Security
- Joseph Carson, Cyber Evangelist at Thycotic
In September 2016, Yahoo disclosed that the company lost access control for over 500 million accounts. Turns out the largest breach in history of 500M Yahoo accounts in 2014 is only half as much as the latest and largest hack ever discovered – 1B Yahoo accounts lost in 2013.
Join Chris Webber, Security Strategist at Centrify, as he examines the Yahoo breach incidents, the causes behind them, the damage they caused, and how they could have been avoided.
What should small and mid-sized businesses take away from the news of (another) Yahoo breach? Tune in for a brief overview of a massive data breach that has come to light.Read more >
It's time to stop pretending this is not going to happen to you. At work, or in your everyday life, we need to learn how to live with cybersecurity. If we want to play in an IoT and Internet-connected world, we need to learn how to play by the rules.
Sure, not all of the rules have been set for every situation, but there are plenty that have been defined that continue to be ignored. Either nobody has taught you what these rules are. Or, it may seem the rules don't apply to you or your business. Either way, it's time to stop being numb to the news of the next new breach and start paying attention. It's time to understand the rules and being to follow them - they apply to everyone.
In this ITSPmagazine Experts Corner interview with Morey Haber, VP of Technology at BeyondTrust, we will explore some of the core questions to ask yourself given the recent announcement of the second Yahoo breach of 1 billion accounts:
- What is the value of password management?
- What are the risks associated with password re-use?
- What are the keys to successfully controlling access to critical assets?
- Why is managing privileged access so important?
- How can two-factor authentication be your best friend?
We look forward to having a great conversation with Morey as he discusses the details of the two Yahoo breaches and what they mean to us as individuals, as businesses, and as a society. We hope you will join us and join in on the conversation.
Netskope, the leading Cloud Access Security Broker, has partnered with the Ponemon Institute, the foremost expert on data breach research, to understand the state of cloud threats, including cloud malware and cloud-related data breaches. The webinar will include an in-depth look at trends and survey data, including:
- Malware in cloud services – how much is there, how it got there, and how cloud propagates it
- Data breaches and cloud – does cloud make data breaches more likely, and why?
- Data breach costs and outcomes, and how those change when cloud is involved