What are the latest trends in the cyber-criminal underworld?
Which attacks are you likely to be preventing as we move further into 2018?
Who’s looking for vulnerability on your network?
These questions and more, answered by Peter Wood FBCS CITP MIEEE CISSP M.Inst.ISP
Chief Executive Officer, First Base Technologies LLP
Peter’s career spans 48 years, with experience in network security, social engineering, threat and risk analysis, red teaming, industrial control systems and electronics. He founded First Base Technologies, one of the UK’s first information security consultancies in 1989. Peter has provided security advice and guidance for businesses of all sizes for more than 28 years, leading a team of expert penetration testers and consultants unrivalled in the industry.
He is also a world-renowned security evangelist, speaking at major conferences and delivering seminars and webinars. He has appeared in documentaries for BBC television, provided commentary on security issues for TV and radio, and written many articles on a variety of security topics.
He is a BCS Fellow, a Chartered IT Professional, CISSP and a member of IISP, ISACA, ISSA, IEEE, ACM and Mensa. He is a visiting lecturer at the University of Sussex, teaching cybersecurity and ethical hacking.
The impact of malware outbreaks in 2017 is short lived compared to the ones we saw a decade ago. One of the key observations in 2017 is we have seen an attack that was infectious across the Internet and also an attack that was not infectious but had similar significant impact.
Cyber epidemics are starting to afflict all business by impacting critical IT infrastructure. To increase the organization’s resilience against cyber-epidemics, you need to validate your attack surface and its susceptibility to attacks.
Cyber-attacks tend to resemble a power law distribution in which a few dozen infiltration vectors account for most breaches and a “long tail” consisting of a large number of less common infiltration vectors account for the rest. It is important to provide timely and accurate information to keep the number of infiltrations low and the impact to your business reduced.
What you will learn from this webinar:
- How to prioritize what is most important when an attack happens.
- Visibility into your attack surface and how to validate what the exposure is.
- How to establish a metric based risk management program.
About the Presenter:
Srinivas Mukkamala is one of the Co-founders and CEO of RiskSense, a cyber security spinoff of New Mexico Tech. Srinivas has been researching and developing security technologies for over 15 years, working on malware analytics (focus on medical control systems and nontraditional computing devices), breach exposure management, Web application security, and enterprise risk reduction.
Srinivas was one of the lead researchers for CACTUS (Computational Analysis of Cyber Terrorism against the US). Dr. Mukkamala has over 120 peer-reviewed publications in the areas of malware analytics, digital forensics, data mining, and bioinformatics. He has a patent on Intelligent Agents for Distributed Intrusion Detection System and Method of Practicing.
As the scale, sophistication, and targeting of cyber-attacks increase, organisations need to manage risk in ways beyond those traditionally handled by the information security function.
In this webinar, Steve Durbin, Managing Director at the ISF will offer his insights into how security and business teams across the entire organisation can work together to minimise the impact of a breach, in order to protect organisations from damaging shareholder value and business reputation.
About the presenter
Steve Durbin is Managing Director of the Information Security Forum (ISF). His main areas of specialism include strategy, information technology, cybersecurity and the emerging security threat landscape across both the corporate and personal environments.
Cyber threats are at the top of mind for security professionals everywhere. With high-profile breaches on the rise and valuable customer information at stake, organizations worldwide are looking for ways to train their workforce to be cyber safe and better secure an ever-growing perimeter.
Join this panel of experts as they discuss:
- The biggest trends in cyber crime
- Impact of Cryptocurrencies
- Breaches and preventing future fraud and cyber attacks
- Advancements in security technology
- Why security awareness training should be a key part of your overall data protection strategy
- Dave Klein, Senior Director Security Engineering and Architecture at GuardiCore
- Craig Dods, Chief Architect for Security, Juniper Networks' Strategic Verticals
- Troy Vennon, Cyber Threat Engineer, Columbus Collaboratory
- Jeannie Warner, Security Manager, WhiteHat Security
Join us for this 45 minute webinar on 7th June at 10am UK that will ensure that your Business is Seamlessly Up and Running in Minutes. Understand how Ultimate Damage Limitation for Cyber-Attacks is Achieved through Business Continuity within Software-Defined Storage.
Reasons to attend:
Severity of cyber-attacks are judged by the length of time critical systems, data and applications are down. The ability to have a Business Continuity and Disaster Recovery enabled infrastructure mitigates the risk, offering zero downtime, zero Recovery Point Objective, and seamless rollback in time to the point before the attack hits.
Joining the webinar equips you with 3 essential skills for damage limitation:
Learn how to:
* Implement multi layered protection that offers
* Achieve additional resiliency with disaster recovery to the Cloud and 3rd Site
* Rollback to the point immediately before the attack
Your host for the meeting, Garry Carpenter has immersed himself in all things business continuity for the past few decades and is one of the leading UK authorities in the field.
Though Ransomware was the clear malware du jour for much of 2017, new Proofpoint research focused on the healthcare industry market suggests that this attack vector is subsiding and that healthcare will have to pivot to address a rapidly evolving threat environment.
Join us for a discussion of:
- Just released research that outlines healthcare's most likely threat vectors of 2018
- How to leverage technology to mitigate against the rising tide of email fraud current plaguing healthcare
- Isolation solutions that allow clinicians to use personal messaging applications WITHOUT compromising the security of the health institution
- New techniques that allow meaningful cyber awareness training without adversely impacting clinical workflow
Every year consultants from Mandiant, a FireEye company, respond to a wide variety of cyber incidents by threat groups around the world. This experience is summarised in the annual M-Trends report, which explores changes in the cyber threat landscape.
During this webinar, our Vice President Stuart McKenzie will discuss:
- Longer-term trends in today's threat landscape
- Sophisticated and harmful APT groups to look out for
- Which organisations are most likely to be retargeted by attackers
- The difficulty of finding skilled personnel and how it affects the security function
- How weaknesses in security fundamentals contributed to successful compromises
- Best practice red teaming tactics for improved security defense
Sean Sullivan, Security Advisor and researcher at F-Secure, discusses how the Internet of Things (IoT) exposes consumers to potential cybercrime, which industries are most susceptible to cyber attacks, the percentage of companies that are confident in their cyber security measures, and predictions for the cyber security industry.Read more >
2017 was the year of cyber attacks and high profile data breaches. Discover what cyber security professionals should be focusing on in order to secure their organizations in 2018.
This interactive Q&A panel will discuss:
- The trends shaping the cyber threat landscape in 2018
- Lessons from the biggest cyber events of the year
- Recommendations for CISOs on securing the enterprise in an age of frequent and persistent attacks
- The technological advancements in the fight against cyber criminals and the processes organizations need to have in place to enable their security teams
- Amar Singh, Cyber Management Alliance
- Stuart Davis, Director, Global Services & Intelligence Europe, Middle East & Africa at Mandiant
- Edward Tucker, CIO, DP Governance
- Dharminder Debisarun, Industry Security Architect, Palo Alto Networks
Increasingly sensitive school and local government data is being targeted by cyber criminals. In 2016, there was a startling 40% growth in data breaches, with over 172k records exposed in the US.
• Understand how cyber criminals are approaching their targets
• Discover how phishing, hacking and selling info in the black market works
• Learn valuable tools and strategies to secure private information from cyber criminals
About the Presenter: Alpesh Shah is the Practice Director and Cyber Security Solutions Architect Manager at Presidio. He supports both fortune 500 companies and government agencies in designing leading edge, complex and enterprise level cloud and security solutions. His passion for information security encouraged him to obtain several technical and business level certifications like CISSP, CISM, CEH, CHP, Security+ and ITILv3. With over a decade of experience in the IT industry, he specializes in managed security solutions, threat and vulnerability management, governance and compliance (HIPAA, PCI, FEDRAMP, ISO 27001, NIST), Disaster Recovery and Business Continuity Planning amongst other areas.
Defending from increasingly advanced and targeted cyberattacks is a constant challenge. Organizations need to gain a true understanding of their network security gaps and vulnerabilities from the perspective of an attacker in order to better address the risk these gaps and vulnerabilities can place on their operations.
Join Anthony Paimany, Principle Red Team Consultant at Cylance®, as he demonstrates how cyberattacks are executed to test assumptions at every level of detection and response and discusses:
- Cyberattackers’ primary tools, techniques, and procedures
- How to determine gaps in defensive controls
- How to identify and prioritize these risks through penetration tests, assessments, and social engineering
Learn more about how IoT is posing new cyber threats, how Fortune 500 companies are integrating cyber security into their firm, biggest threats & opportunities, and more with Stew Wolfe, Associate Principal, Cisco Global Security, and Raj Lala, President & CEO of Evolve ETFs.Read more >
Find out how the government is tackling cyber threats, legislation for cyber security, gender diversity in STEM, cybercrime predictions and more with Robert Hudyma, Professor at Ryerson University in the Ted Rogers School of Management, and Raj Lala, President & CEO of Evolve ETFs.Read more >
Analyzing cyber-attacks from last year, this session will cover leading trends, and identify potential evolution both in the defensive and offensive fields going forward. As we do so, we will explore the increasing importance of automation and the diminishing role of the human professional in large scale networks.
About the Speaker:
Adi Ashkenazy is the VP Product for XM Cyber, an innovative cyber security start-up developing a revolutionary breach and attack simulation solution, capable of identifying critical attack paths towards key organizational assets, while providing actionable prioritized remediation. Prior to XM Cyber, Adi served as deputy director of an elite cyber technology department in the prime minister's office in Israel, leading Israel's finest engineers and security professionals through some of the most complex cyber security challenges in the world today.