Have you ever wondered what a cybercriminal operation looks like? Do you want to know how cybercriminals have evolved and which vulnerabilities they’re now exploiting? In this session, James Lyne, Global Head of Security Research at Sophos, will answer these questions and more as he provides a profile of the modern cybercriminal.
Customer Convo: Threat Analysis
Digital Identities have become the new perimeter in the fight against cybercriminals. Businesses need to come together to coordinate an effective defence and real time sharing of internet scale intelligence.
* Explosive Cybercrime growth comes from criminals leveraging the internet – how can we use that same leverage to our advantage?
* We can’t trust the endpoint and we can’t trust the user credentials – how do we operate in this new world?
* How can real time sharing of anonymous Digital Identity behavior provide a new type of protection while offering improvements in end user experience?
We often hear that cyber criminals are sophisticated and that they are organized. But what does that mean exactly? What does it mean to our organizations? Hear how HPE is digging into the world of cyber-criminals to understand it and to disrupt it. See how these businesses are organized and when we look closely, see how they look a lot like our businesses. With a value chain that includes finance, marketing, customer and even legal functions, our approach to adversaries’ shifts from one that is basic and rudimentary to one that recognizes these organizations as competitors. We can begin to take these competitors into account when planning for future business innovations. Learn about the most valuable hacking business types, their motivations, and the weaknesses of this underground marketplace so that you can most-effectively protect your enterprise against these adversaries.Read more >
On June 2, 2014, Operation Tovar was announced, a multi-national initiative to disrupt the Gameover Zeus botnet and seize infrastructure supporting Cryptolocker ransomware. This initiative was, in part aided by security experts from the Dell SecureWorks Counter Threat Unit (CTU). Gameover Zeus and Cryptolocker were part of a larger cybercriminal ecosystem representative of threats faced by many organizations today.
During this interactive webcast, Ben Feinstein, Director of CTU Operations and Development, will discuss details of the adversary’s operations and tradecraft behind Gameover Zeus and Operation Tovar. Ben will also share clear guidance on how to defend against similar threats in the future. As a result, security professionals can draw lessons on how to better defend against and respond to this broader class of threats. The webcast will answer key questions such as:
- How did the Gameover Zeus botnet operate and deliver its malware payloads to thousands of systems worldwide?
- How was the Gameover Zeus threat group monetizing their botnet?
- What was Operation Tovar and how did it work?
- Why do these threats matter to your organization?
- What concrete actions should your organization be taking to address this class of threats?
As the use of cybertechnology grows, organizations and their security solutions are increasingly caught in the crosshairs of a growing global cybercriminal industry. No longer is it enough to simply detect network breaches. You need to prevent cyberthreats such as ransomware, IoT DDoS attacks and encrypted malware. Learn more about these threats and why it’s time to add new cyberdefenses to your business security arsenal.Read more >
Cybercriminals are increasingly banding together, organizing more sophisticated attacks that are more predatory in nature. Cybercrooks’ rapid adoption of new technologies and efficacy in information sharing has trumped traditional static enterprise defenses. In order for organizations to stay protected, they must learn from their adversaries.
What lessons can we learn from cybercriminals that can be applied to boost an organization’s overall security strategy?
Paul Brettle, HP’s EMEA Security Specialist Manager, will examine the means and motivations driving cybercriminal behavior and how improvements such as benchmarking can persuade criminals to look elsewhere for targets while helping security professionals develop stronger defenses.
Cybercrime has evolved dramatically over the past decade. Learn the latest techniques that today’s well-organized criminals and nation states are using to steal valuable information, and how information security can keep pace with this relentless and dynamic threat landscape.
Andrzej Kawalec, Chief Technology Officer of HP Security, will focus on the role of the chief information security officer (CISO) in protecting our critical information.
Like everyone else, providers of critical infrastructure are concerned about the increasing sophistication and success of Cybercriminals/Advanced Threats. However in addressing this security risk, they have additional complicating factors to address. These include:
· Inaccessible locations
· Harsh environmental conditions
· Proprietary systems
· Old infrastructure
· The price of failure
Today’s discussion will explore 5 industry-specific use cases that reflect these challenges, as well as explain how to overcome them for increased security and reliability.
Whether you are an individual or an organisation, it is useful to understand the inner workings of the cybercriminal world and to be aware of the threats targeting you, your money and your information.
One way cybercriminals obtain the resources and connections they need to engage in their activities is through the Internet underground or “dark web.” Definitions of the Internet underground may vary, but to Secureworks, it means the collection of Internet forums, digital shop fronts and chat rooms that cybercriminals use to form alliances, trade tools and techniques, and sell compromised data that can include banking details, personally identifiable information and other content.
Join the Counter Threat Units E-Crime lead Alex Tilley as he talks through the undergorund like never before.
This webinar will cover:
* Key findings from our visibility into criminal forums and technical monitoring of global criminal activity
* Cybercrime categories and the significant risk to individuals ad organisations
* The complexity of the criminal landscape and diverse capabilities of threat actors
* The continuation of online crime as a market economy