Hi [[ session.user.profile.firstName ]]
Sort by:
    • Cybercriminals – The Unaddressed Competition
      Cybercriminals – The Unaddressed Competition Kerry Matre, Sr. Manager, HPE Security Recorded: Mar 28 2016 8:50 pm UTC 30 mins
    • We often hear that cyber criminals are sophisticated and that they are organized. But what does that mean exactly? What does it mean to our organizations? Hear how HPE is digging into the world of cyber-criminals to understand it and to disrupt it. See how these businesses are organized and when we look closely, see how they look a lot like our businesses. With a value chain that includes finance, marketing, customer and even legal functions, our approach to adversaries’ shifts from one that is basic and rudimentary to one that recognizes these organizations as competitors. We can begin to take these competitors into account when planning for future business innovations. Learn about the most valuable hacking business types, their motivations, and the weaknesses of this underground marketplace so that you can most-effectively protect your enterprise against these adversaries.

      Read more >
    • Game Over for Gameover Zeus: Disrupting a Global Cybercriminal Operation
      Game Over for Gameover Zeus: Disrupting a Global Cybercriminal Operation Ben Feinstein, Dell SecureWorks Director of Counter Threat Unit (CTU) Operations & Development Recorded: Jul 31 2014 6:00 pm UTC 60 mins
    • On June 2, 2014, Operation Tovar was announced, a multi-national initiative to disrupt the Gameover Zeus botnet and seize infrastructure supporting Cryptolocker ransomware. This initiative was, in part aided by security experts from the Dell SecureWorks Counter Threat Unit (CTU). Gameover Zeus and Cryptolocker were part of a larger cybercriminal ecosystem representative of threats faced by many organizations today.

      During this interactive webcast, Ben Feinstein, Director of CTU Operations and Development, will discuss details of the adversary’s operations and tradecraft behind Gameover Zeus and Operation Tovar. Ben will also share clear guidance on how to defend against similar threats in the future. As a result, security professionals can draw lessons on how to better defend against and respond to this broader class of threats. The webcast will answer key questions such as:

      - How did the Gameover Zeus botnet operate and deliver its malware payloads to thousands of systems worldwide?
      - How was the Gameover Zeus threat group monetizing their botnet?
      - What was Operation Tovar and how did it work?
      - Why do these threats matter to your organization?
      - What concrete actions should your organization be taking to address this class of threats?

      Read more >
    • Security Lessons from Cybercriminals
      Security Lessons from Cybercriminals Paul Brettle, EMEA HP Security Specialist Manager, HP Enterprise Security Recorded: Jun 12 2013 10:00 am UTC 43 mins
    • Cybercriminals are increasingly banding together, organizing more sophisticated attacks that are more predatory in nature. Cybercrooks’ rapid adoption of new technologies and efficacy in information sharing has trumped traditional static enterprise defenses. In order for organizations to stay protected, they must learn from their adversaries.

      What lessons can we learn from cybercriminals that can be applied to boost an organization’s overall security strategy?

      Paul Brettle, HP’s EMEA Security Specialist Manager, will examine the means and motivations driving cybercriminal behavior and how improvements such as benchmarking can persuade criminals to look elsewhere for targets while helping security professionals develop stronger defenses.

      Read more >
    • 2017 State of Cybercrime
      2017 State of Cybercrime Alex Tilley, CTU E-Crimes Lead Recorded: Oct 17 2017 3:00 am UTC 61 mins
    • Whether you are an individual or an organisation, it is useful to understand the inner workings of the cybercriminal world and to be aware of the threats targeting you, your money and your information.

      One way cybercriminals obtain the resources and connections they need to engage in their activities is through the Internet underground or “dark web.” Definitions of the Internet underground may vary, but to Secureworks, it means the collection of Internet forums, digital shop fronts and chat rooms that cybercriminals use to form alliances, trade tools and techniques, and sell compromised data that can include banking details, personally identifiable information and other content.

      Join the Counter Threat Units E-Crime lead Alex Tilley as he talks through the undergorund like never before.

      This webinar will cover:
      * Key findings from our visibility into criminal forums and technical monitoring of global criminal activity
      * Cybercrime categories and the significant risk to individuals ad organisations
      * The complexity of the criminal landscape and diverse capabilities of threat actors
      * The continuation of online crime as a market economy

      Read more >