Hi [[ session.user.profile.firstName ]]
Sort by:
    • Hackers vs Organisations: The Dawn of Actionable Threat Intelligence Hackers vs Organisations: The Dawn of Actionable Threat Intelligence Yogi Chandiramani, Director of Engineering and Jens Monrad, Global Intelligence Liaison, FireEye Recorded: Apr 13 2016 1:00 pm UTC 46 mins
    • Year after year, it has been demonstrated that the offence is ahead of the defense in the world of cybercrime. Although, organisations are getting better at detecting a compromise in its network, it is still taking 146 days to detection compared to the minutes it takes hackers to walk away with the keys to the kingdom. Current security controls are not stopping hackers from getting inside organisations due to their leverage of other techniques, such as social engineering, to intrude and disrupt networks. Hackers are winning the battle with an unfair advantage - which can somewhat be seen as "cyber superpowers".

      In this webinar, FireEye experts will describe how to defend against these “cyber superpowers" leveraging the powers of threat intelligence to be equipped for this battle in good against evil. However, many companies see “intelligence" as large volumes of information, which is essentially just unstructured data, without any context thus making it incomprehensible. Companies need actionable intelligence, which can help them anticipate future attacks and improve their response against ongoing attacks. With the right actionable threat intelligence, an organisation can build its own superpowers to defend against the evil of hackers.

      Read more >
    • Insight to the Underground Hacker Marketplace Insight to the Underground Hacker Marketplace Alex Tilley, SecureWorks Counter Threat Unit Recorded: Jun 16 2016 12:00 am UTC 50 mins
    • Customer service is the motto. Hackers are now extending their service hours, guaranteeing their work, and expanding their offerings to keep customers coming back.

      Imagine a marketplace where illegal vendors offer a wide range of goods, tools, and training to enable a hacker to exploit or breach unsuspecting individuals, groups or organizations. Furthermore, imagine the walls of this marketplace lined with advertisements offering services and information.

      The point is, the underground marketplace is booming and only getting bigger, more sophisticated, and competitive. Knowing what you and your organization are up against and where your information could potentially be going and what it’s worth is a great way to help prioritize what you protect.

      Alex Tilley of SecureWorks Counter Threat Unit Intelligence team and former Australian Federal Police Senior Technical Analyst, will walk us through the Underground Hacker Market Place and discuss the important issues and what it means to Australian organisations. This unique look into the market place will show you how threat actors organise and resource themselves for the tasks they set. Furthermore we will be looking at the kind of data they are selling on after it has been stolen. This eye opening topic will leave you informed about a place not too many people get to see.

      Read more >
    • Q&A session: Hackers and Threats- Cybercrime syndicates go global Q&A session: Hackers and Threats- Cybercrime syndicates go global Steve Durbin, Managing Director, ISF Ltd Recorded: Jun 12 2015 1:00 am UTC 28 mins
    • Please join us for a live Q&A session on:

      Thursday June 11th, 9pm EST/ Friday June 12th, 11am AEST

      Join Steve Durbin, Managing Director of the Information Security Forum, for a Q&A session on the "Hackers and Threats- Cybercrime Syndicates Go Global" webinar

      Before the Q&A:

      •View the BrightTalk Webinar:
      https://www.brighttalk.com/webcast/9923/140645

      •If you'd like, please send any questions you want to ask to Vicky Taylor (vtaylor@shelde.com) or alternatively, ask them during the session.

      "Organisations around the globe are struggling to cope with the quantum speed and sophistication of attacks by organised cyber criminal syndicates and going forward will need to prepare to be targeted 24x7 by multiple assailants. Criminal organisations have become more sophisticated, mature and are migrating their activities online at greater pace. They have begun to develop complex hierarchies, partnerships and collaborations that mimic large private sector organisations and are taking their activities global. Organisations that wish to keep pace with these developments and remain financially viable will need to take action now.

      This webcast will share guidance and tips on how organisations can identify and protect the areas of their business that could be impacted by cybercrime activity."

      Read more >
    • Using Hackers' Own Methods & Tools to Defeat Persistent Threats Using Hackers' Own Methods & Tools to Defeat Persistent Threats Michael Davis, CTO, CounterTack Recorded: Mar 12 2014 6:00 pm UTC 40 mins
    • In today’s world of advanced persistent threats, security professionals need to implement new methods and strategies to gain the upper hand in protecting their business. Thinking like an attacker isn't really good enough. However, incorporating hacker methodologies & tools will give security teams the situational awareness and intelligence needed to respond quickly to new & previously unknown threats.

      Thinking like an attacker isn't good enough, nor are traditional solutions, as smart adversaries already know which technologies they'll disable on your system. However, incorporating the right hacker-like methods and tools can give security teams a new level of situational awareness and context needed to respond quickly to targeted, persistent threats.

      Attendees will learn a new approach consisting of four fundamentals: Detect, Remediate, Analyze and Resist. The presentation will provide detailed information including how to:

      • Use attacker technology and tools against adversaries to detect their presence on all endpoints
      • Incorporate the same stealth techniques that attackers use to remain hidden from you - so you can monitor them
      • Leverage forensics at the point of attack to better understand the overall threat
      • Use big data analytics to collect and analyze behavioral data across the enterprise

      Read more >
    • Inside the Mind of a Hacker Inside the Mind of a Hacker Corey Nachreiner, Director, Security Research, WatchGuard Recorded: Dec 11 2013 5:00 pm UTC 62 mins
    • Are You A Target?

      What makes your company a potential target? How can you know if your network is being set up for an attack? What can you do to protect your network and data once you've been targeted?

      Tune in for insightful information and go inside the mind of a hacker with our Director of Security Research, Corey Nachreiner.

      Follow along as you are driven through demonstrations of how hackers case networks, mark vulnerabilities, and later return to infiltrate the network and extract valuable data. Most importantly, find out what you can do to protect your network.

      Register for the webinar and learn:

      - What types of hackers are out there - and why you could be a target!
      - Hacking tools and techniques - straight from the Hacker Toolkit. Watch as we perform real-world attack methods against servers, clients, and web applications.
      - How to protect your network at each stage - from thwarting hacker reconnaissance missions, to defending against exploits and blended attacks.
      - Protection from today's cybercriminals requires the right blend of intelligently-layered security technologies, smart policies, and an informed IT team. Learn more about the hacker landscape, and how you can protect your network and data, in a live webinar from WatchGuard.

      Read more >
    • Hackers and Threats: Cybercrime Syndicates Go Global Hackers and Threats: Cybercrime Syndicates Go Global Steve Durbin, Managing Director, ISF Ltd Recorded: Jun 9 2015 1:00 pm UTC 47 mins
    • Organisations around the globe are struggling to cope with the quantum speed and sophistication of attacks by organised cyber criminal syndicates and going forward will need to prepare to be targeted 24x7 by multiple assailants. Criminal organisations have become more sophisticated, mature and are migrating their activities online at greater pace. They have begun to develop complex hierarchies, partnerships and collaborations that mimic large private sector organisations and are taking their activities global. Organisations that wish to keep pace with these developments and remain financially viable will need to take action now.

      This webcast will share guidance and tips on how organisations can identify and protect the areas of their business that could be impacted by cybercrime activity.

      Read more >