BrightTALK's Josh Downs looks back at the key thought leaders interviewed at Infosecurity Europe 2015 and gives an advance preview to the exciting speakers at the Hackers and Threats Summit 2015.Read more >
Today's networks will have a wireless component on them in some
capacity. This includes SCADA and industrial, LAN's and even vehicles.
This honeypot, called romanHunter, will demonstrate one way to detect
and gather data on whether or not your networks are likely being
attacked. This information can be used to alter the overall security
posture of the organization. This webinar will discuss these topics and
include a demonstration with theory on how to apply this same ideology
on other platforms.
Please join us for a live Q&A session on:
Thursday June 11th, 9pm EST/ Friday June 12th, 11am AEST
Join Steve Durbin, Managing Director of the Information Security Forum, for a Q&A session on the "Hackers and Threats- Cybercrime Syndicates Go Global" webinar
Before the Q&A:
•View the BrightTalk Webinar:
•If you'd like, please send any questions you want to ask to Vicky Taylor (email@example.com) or alternatively, ask them during the session.
"Organisations around the globe are struggling to cope with the quantum speed and sophistication of attacks by organised cyber criminal syndicates and going forward will need to prepare to be targeted 24x7 by multiple assailants. Criminal organisations have become more sophisticated, mature and are migrating their activities online at greater pace. They have begun to develop complex hierarchies, partnerships and collaborations that mimic large private sector organisations and are taking their activities global. Organisations that wish to keep pace with these developments and remain financially viable will need to take action now.
This webcast will share guidance and tips on how organisations can identify and protect the areas of their business that could be impacted by cybercrime activity."
This On-Demand webcast features our researchers who developed the Underground Hacker Markets report for Dell SecureWorks. In it, they revisit the hacker underground, identifying changes from 2013 and highlighting notable trends. Viewers will learn valuable tips on how to protect customer data and security advice from the Dell SecureWorks Count Threat Unit (CTU) researchers.Read more >
In today’s world of advanced persistent threats, security professionals need to implement new methods and strategies to gain the upper hand in protecting their business. Thinking like an attacker isn't really good enough. However, incorporating hacker methodologies & tools will give security teams the situational awareness and intelligence needed to respond quickly to new & previously unknown threats.
Thinking like an attacker isn't good enough, nor are traditional solutions, as smart adversaries already know which technologies they'll disable on your system. However, incorporating the right hacker-like methods and tools can give security teams a new level of situational awareness and context needed to respond quickly to targeted, persistent threats.
Attendees will learn a new approach consisting of four fundamentals: Detect, Remediate, Analyze and Resist. The presentation will provide detailed information including how to:
• Use attacker technology and tools against adversaries to detect their presence on all endpoints
• Incorporate the same stealth techniques that attackers use to remain hidden from you - so you can monitor them
• Leverage forensics at the point of attack to better understand the overall threat
• Use big data analytics to collect and analyze behavioral data across the enterprise
Are You A Target?
What makes your company a potential target? How can you know if your network is being set up for an attack? What can you do to protect your network and data once you've been targeted?
Tune in for insightful information and go inside the mind of a hacker with our Director of Security Research, Corey Nachreiner.
Follow along as you are driven through demonstrations of how hackers case networks, mark vulnerabilities, and later return to infiltrate the network and extract valuable data. Most importantly, find out what you can do to protect your network.
Register for the webinar and learn:
- What types of hackers are out there - and why you could be a target!
- Hacking tools and techniques - straight from the Hacker Toolkit. Watch as we perform real-world attack methods against servers, clients, and web applications.
- How to protect your network at each stage - from thwarting hacker reconnaissance missions, to defending against exploits and blended attacks.
- Protection from today's cybercriminals requires the right blend of intelligently-layered security technologies, smart policies, and an informed IT team. Learn more about the hacker landscape, and how you can protect your network and data, in a live webinar from WatchGuard.
Cybercrime continues to increase, with nearly 100% of Forbes Global 2000 companies reporting data breaches within the last 12 months.
It is estimated that over 200 nations have Intelligence capabilities and their #1 target is the United States. Cyber tools, used for exploitation, can also be used for cyber attacks. These capabilities are being built by the 1,000s. The result is that most US corporations have been penetrated. Furthermore, most network security appliances may stop a novice attack but they are no match for a sophisticated threat actor. The presentation will explore the evolving threat, why we should care, and what we can and cannot do to counter this never ending, dynamic and evolving threat.
Organisations around the globe are struggling to cope with the quantum speed and sophistication of attacks by organised cyber criminal syndicates and going forward will need to prepare to be targeted 24x7 by multiple assailants. Criminal organisations have become more sophisticated, mature and are migrating their activities online at greater pace. They have begun to develop complex hierarchies, partnerships and collaborations that mimic large private sector organisations and are taking their activities global. Organisations that wish to keep pace with these developments and remain financially viable will need to take action now.
This webcast will share guidance and tips on how organisations can identify and protect the areas of their business that could be impacted by cybercrime activity.
Learn about common evasion techniques used by advanced threats, attacks that leverage those techniques, and SentinelOne security predictions for 2015.Read more >
"It's a great situation when you have a hobby which becomes a job. And for a lot of hackers, we're doing something for fun, and somebody's going to pay us to do it." Jack Daniel, Technical Product Manager at Tenable and a well-known industry figure, comments on the transformations that many hackers encounter as they enter the world of productivity and management.Read more >