This presentation will discuss the most recent information on advances within the cybercriminal underground. Discussion will revolve around the different cybercriminal business models used within the underground and how this affects you. From Organized crime to the Mentor/Apprentice models we’ll give you information you need to better understand how the underground economy works.Read more >
Have you ever wondered what a cybercriminal operation looks like? Do you want to know how cybercriminals have evolved and which vulnerabilities they’re now exploiting? In this session, James Lyne, Global Head of Security Research at Sophos, will answer these questions and more as he provides a profile of the modern cybercriminal.
Customer Convo: Threat Analysis
Digital Identities have become the new perimeter in the fight against cybercriminals. Businesses need to come together to coordinate an effective defence and real time sharing of internet scale intelligence.
* Explosive Cybercrime growth comes from criminals leveraging the internet – how can we use that same leverage to our advantage?
* We can’t trust the endpoint and we can’t trust the user credentials – how do we operate in this new world?
* How can real time sharing of anonymous Digital Identity behavior provide a new type of protection while offering improvements in end user experience?
We often hear that cyber criminals are sophisticated and that they are organized. But what does that mean exactly? What does it mean to our organizations? Hear how HPE is digging into the world of cyber-criminals to understand it and to disrupt it. See how these businesses are organized and when we look closely, see how they look a lot like our businesses. With a value chain that includes finance, marketing, customer and even legal functions, our approach to adversaries’ shifts from one that is basic and rudimentary to one that recognizes these organizations as competitors. We can begin to take these competitors into account when planning for future business innovations. Learn about the most valuable hacking business types, their motivations, and the weaknesses of this underground marketplace so that you can most-effectively protect your enterprise against these adversaries.Read more >
On June 2, 2014, Operation Tovar was announced, a multi-national initiative to disrupt the Gameover Zeus botnet and seize infrastructure supporting Cryptolocker ransomware. This initiative was, in part aided by security experts from the Dell SecureWorks Counter Threat Unit (CTU). Gameover Zeus and Cryptolocker were part of a larger cybercriminal ecosystem representative of threats faced by many organizations today.
During this interactive webcast, Ben Feinstein, Director of CTU Operations and Development, will discuss details of the adversary’s operations and tradecraft behind Gameover Zeus and Operation Tovar. Ben will also share clear guidance on how to defend against similar threats in the future. As a result, security professionals can draw lessons on how to better defend against and respond to this broader class of threats. The webcast will answer key questions such as:
- How did the Gameover Zeus botnet operate and deliver its malware payloads to thousands of systems worldwide?
- How was the Gameover Zeus threat group monetizing their botnet?
- What was Operation Tovar and how did it work?
- Why do these threats matter to your organization?
- What concrete actions should your organization be taking to address this class of threats?
Cybercriminals are increasingly banding together, organizing more sophisticated attacks that are more predatory in nature. Cybercrooks’ rapid adoption of new technologies and efficacy in information sharing has trumped traditional static enterprise defenses. In order for organizations to stay protected, they must learn from their adversaries.
What lessons can we learn from cybercriminals that can be applied to boost an organization’s overall security strategy?
Paul Brettle, HP’s EMEA Security Specialist Manager, will examine the means and motivations driving cybercriminal behavior and how improvements such as benchmarking can persuade criminals to look elsewhere for targets while helping security professionals develop stronger defenses.
Cybercrime has evolved dramatically over the past decade. Learn the latest techniques that today’s well-organized criminals and nation states are using to steal valuable information, and how information security can keep pace with this relentless and dynamic threat landscape.
Andrzej Kawalec, Chief Technology Officer of HP Security, will focus on the role of the chief information security officer (CISO) in protecting our critical information.
Osterman Research finds that security decision makers are still concerned – and rightly so – about the effectiveness of their security defenses to prevent the infiltration of malware. Email is the #1 threat vector for your organization, and phishing is the easiest way to bypass your defenses.
Join Michael Osterman, of Osterman Research, and ThreatTrack Security to hear more about the security challenges organizations like yours face in regard to email and other threat vectors, and solutions you can implement to improve your security posture:
We will discuss how:
· Cybercriminals are getting better and more efficient
· Users are sharing more information through social media and making organizations more vulnerable to phishing attacks and other threats.
· Malware is “improving” and is harder to detect and remediate.
· IT should implement robust and layered security solutions based on strong threat intelligence, including how the cloud should be used as part of a robust security infrastructure.
· Decision makers should conduct a thorough analysis of the entire organization to understand where data is stored and who has access to it, as well as the tools that employees are using to access corporate data and network resources.
· IT should establish detailed and thorough acceptable use policies for the use of every type of communication or collaboration system that is in place now or might be used in the foreseeable future.
ThreatTrack Security will also show how it’s newest advanced malware solution, ThreatSecure, can help organizations detect and monitor malicious activity.
Like everyone else, providers of critical infrastructure are concerned about the increasing sophistication and success of Cybercriminals/Advanced Threats. However in addressing this security risk, they have additional complicating factors to address. These include:
· Inaccessible locations
· Harsh environmental conditions
· Proprietary systems
· Old infrastructure
· The price of failure
Today’s discussion will explore 5 industry-specific use cases that reflect these challenges, as well as explain how to overcome them for increased security and reliability.