Hi [[ session.user.profile.firstName ]]
Sort by:
    • Game Over for Gameover Zeus: Disrupting a Global Cybercriminal Operation Game Over for Gameover Zeus: Disrupting a Global Cybercriminal Operation Ben Feinstein, Dell SecureWorks Director of Counter Threat Unit (CTU) Operations & Development Recorded: Jul 31 2014 6:00 pm UTC 60 mins
    • On June 2, 2014, Operation Tovar was announced, a multi-national initiative to disrupt the Gameover Zeus botnet and seize infrastructure supporting Cryptolocker ransomware. This initiative was, in part aided by security experts from the Dell SecureWorks Counter Threat Unit (CTU). Gameover Zeus and Cryptolocker were part of a larger cybercriminal ecosystem representative of threats faced by many organizations today.

      During this interactive webcast, Ben Feinstein, Director of CTU Operations and Development, will discuss details of the adversary’s operations and tradecraft behind Gameover Zeus and Operation Tovar. Ben will also share clear guidance on how to defend against similar threats in the future. As a result, security professionals can draw lessons on how to better defend against and respond to this broader class of threats. The webcast will answer key questions such as:

      - How did the Gameover Zeus botnet operate and deliver its malware payloads to thousands of systems worldwide?
      - How was the Gameover Zeus threat group monetizing their botnet?
      - What was Operation Tovar and how did it work?
      - Why do these threats matter to your organization?
      - What concrete actions should your organization be taking to address this class of threats?

      Read more >
    • Cybercriminals – The Unaddressed Competition Cybercriminals – The Unaddressed Competition Kerry Matre, Sr. Manager, HPE Security Recorded: Mar 28 2016 8:50 pm UTC 30 mins
    • We often hear that cyber criminals are sophisticated and that they are organized. But what does that mean exactly? What does it mean to our organizations? Hear how HPE is digging into the world of cyber-criminals to understand it and to disrupt it. See how these businesses are organized and when we look closely, see how they look a lot like our businesses. With a value chain that includes finance, marketing, customer and even legal functions, our approach to adversaries’ shifts from one that is basic and rudimentary to one that recognizes these organizations as competitors. We can begin to take these competitors into account when planning for future business innovations. Learn about the most valuable hacking business types, their motivations, and the weaknesses of this underground marketplace so that you can most-effectively protect your enterprise against these adversaries.

      Read more >
    • Security Lessons from Cybercriminals Security Lessons from Cybercriminals Paul Brettle, EMEA HP Security Specialist Manager, HP Enterprise Security Recorded: Jun 12 2013 10:00 am UTC 43 mins
    • Cybercriminals are increasingly banding together, organizing more sophisticated attacks that are more predatory in nature. Cybercrooks’ rapid adoption of new technologies and efficacy in information sharing has trumped traditional static enterprise defenses. In order for organizations to stay protected, they must learn from their adversaries.

      What lessons can we learn from cybercriminals that can be applied to boost an organization’s overall security strategy?

      Paul Brettle, HP’s EMEA Security Specialist Manager, will examine the means and motivations driving cybercriminal behavior and how improvements such as benchmarking can persuade criminals to look elsewhere for targets while helping security professionals develop stronger defenses.

      Read more >
    • Best Practices for Dealing with Phishing and Next-Generation Malware Best Practices for Dealing with Phishing and Next-Generation Malware Michael Osterman, Osterman Research, and ThreatTrack Security Recorded: Jun 18 2015 4:00 pm UTC 28 mins
    • Osterman Research finds that security decision makers are still concerned – and rightly so – about the effectiveness of their security defenses to prevent the infiltration of malware. Email is the #1 threat vector for your organization, and phishing is the easiest way to bypass your defenses.

      Join Michael Osterman, of Osterman Research, and ThreatTrack Security to hear more about the security challenges organizations like yours face in regard to email and other threat vectors, and solutions you can implement to improve your security posture:

      We will discuss how:

      · Cybercriminals are getting better and more efficient
      · Users are sharing more information through social media and making organizations more vulnerable to phishing attacks and other threats.
      · Malware is “improving” and is harder to detect and remediate.
      · IT should implement robust and layered security solutions based on strong threat intelligence, including how the cloud should be used as part of a robust security infrastructure.
      · Decision makers should conduct a thorough analysis of the entire organization to understand where data is stored and who has access to it, as well as the tools that employees are using to access corporate data and network resources.
      · IT should establish detailed and thorough acceptable use policies for the use of every type of communication or collaboration system that is in place now or might be used in the foreseeable future.

      ThreatTrack Security will also show how it’s newest advanced malware solution, ThreatSecure, can help organizations detect and monitor malicious activity.

      Read more >