This September BrightTALK will be hosting some of the industry's leading cyber speakers as they discuss Network Security & Hacking.
Click below to register for the Summit:
Patient health is at grave risk in the current digital era, as sophisticated adversaries utilize technology to perform digital attacks that can result in physical harm. While Healthcare IT typically prioritizes protecting patient records (PHI), this omits the crucial overall healthcare mission of championing patient health against possible attacks against the healthcare digital ecosystem.
This webinar will present and analyze real world attack scenarios against the healthcare ecosystem, the mindset of hackers, and the complexity of constraints facing health IT security.
Join us for this webinar as we:
• Discuss why patient health is at risk and why it is a target for sophisticated adversaries
• Investigate the complexity of constraints facing Health IT and the barriers that must be overcome to succeed in this effort
• Highlight key findings from ISE’s groundbreaking research study, Hacking Hospitals*, including the types of healthcare systems investigated, the nature of the investigation, and the objectives of the assessments
• Present a blueprint with actionable steps that IT Security leaders can follow to properly secure and protect their hospital IT infrastructure, sensitive information, and their patients
*ISE’s research study, Hacking Hospitals - http://www.securityevaluators.com/hospitalhack/
Technology trends such as cloud, mobile, and collaboration help businesses boost growth and competitiveness but each brings it own set of security gaps that give attackers a clear path to slip malware into the network, evade detection, and steal valuable information.
In 2014, global malware attacks increased by 136%. Attackers launch twice as many unique attacks. These are trying times for every organization as it faces elevated risk from the latest threats and cyber-criminals bent of greed and nefarious deed. Join us as security experts look at some of the latest security challenges and discusses the building block of developing a resilient security defense system to help you effectively combat evolving threats as they emerge.
You will learn how to better protect your networks as well as yourself with solutions that reduce work for IT and security teams.
In this webinar, you will:
1. get up to speed on the current threat landscape
2. discover ways to take advantage of modern-day network security tools and services for ongoing protection against new threats
3. learn why it truly counts to have a nimble threat research and response team working for you
4. and why it truly makes a big difference to have multiple layers of threat protection to bolster your security posture
With the widespread use of connected devices, hackers have configured new ways to access your smartphones and laptops, even without you knowing. The Pineapple is a router that stages a fake WIFI access point, compromising the security of any smart device that unknowingly connects to it. During the live webinar, Johan Hybinette, CISO at HOSTING, will be going over the following discussion points:
- The technical makeup of the pineapple router
- How the Pineapple hacks into connected devices
- What personal information is at the most risk
- What you can do to protect yourself from this malicious form of identity theft
Join this roundtable of experts as the discuss they latest and greatest in growth hacking for user growth. They plan to open the kimono on their own best practices that have generated repeatable and scalable growth. No time for theoretical discussions, this is hands on stuff!
- Digital marketing vs. growth hacking: what’s the difference?
- How to identify, acquire, and engage your target audience
- Ways to turn your fans, followers and likes into qualified leads (even sales)
- Beyond the basics: advanced social media and growth tactics for the pros
- Best kept community management secrets will be revealed
Panel: To be Announced Soon!
What's all the hype really about? Join Natascha as she tells you more about the trend of growth hacking and why this concept may be a game changer for your organization.Read more >
Growth-hacking rose to prominence in 2010 as a model to rapidly grow a company through unconventional techniques. The concept caught on with marketers at large and small companies as well as its fair share of detractors. In this spirited interview, Christine Crandell discusses with Greg Ott, Intuit’s VP of Marketing for QuickBooks Online, growth-hacking’s applicability to larger organizations and if it can help to reverse Marketing’s cred as corporate bad boy.
The 20 minute video interview with 10 minute audience Q&A will also explore how technology drives change companies may not be ready for and how marketers can turn to their advantage.
Your company can learn valuable lessons about risk strategy and incident response from what happened to Hacking Team, a firm that supplies surveillance tools to government agencies. Widely accused of helping governments spy on dissidents and journalists, Hacking Team found itself hacked with embarrassing, possibly damaging results. ESET senior security researcher Stephen Cobb explains the missteps made and the lessons to be learned during this webinar.
•How Hacking Team’s mistakes mirrored those made by Sony
•How employees’ weak passwords helped facilitate the breach
•How transparency would have helped Hacking Team’s credibility
•Why every company must review what might be exposed in a breach
Every day, the techniques, attack vectors, and tools used by ethical and non-ethical hackers grows exponentially. In lieu of the recent breach conducted by the ‘Shadow Brokers” on the NSA, a new hacking arsenal has been released into the wild. Unfortunately, for the majority who are unaware of this recent breach, they not only open themselves up to being compromised, but also do not possess the skill-set and proper security measures required to combat against these nefarious actors - and their advanced weaponry.
Join us in this session where we’ll discuss:
•Black-Hats and White-Hats and the intrinsic life-cycle of the hacking process
•The real motivations and skills behind state-sponsored hackers, hacktivists, and script kiddies
•How hackers will use the NSA tools for even more nefarious activities
•How to combat these highly-sophisticated hacking tools with the right defenses
Alicia Webb interviews SecureNinja’s Senior Security instructor Wayne Burke as he discusses the launch of a new advanced Cybersecurity training offering entitled “Offensive Hacking and Penetration Testing” This course is the most recent to be added to the SecureNinja SWAT: Advanced Cyber Warfare Series of trainings. More information info about this unique course offering can be found at SecureNInja.com ( https://secureninja.com/training-courses/advanced-cyber-warfare-offensive-hacking-swat-special-weapons-and-tactics.html ).
This (5) five day boot camp provides students with the knowledge and real world hands-on practical skills for performing Advanced Cyber Warfare Hacking and Penetration Testing. The course is based on vendor neutral Open Source software and tools. You will learn both hardware and software design intricacies of the latest attack tool vectors. This vendor neutral course will greatly benefit anyone in the IT Security intelligence spectrum, for those who are responsible for designing, securing, implementing and security hardening.
Also included in this series is “Offensive Mobile Application Hacking”
For more information on all of SecureNinja's training and certification courses and bootcamps, visit https://secureninja.com or call 703-535-8600 Option 1
Don't miss an episode of SecureNinjaTV!
Subscribe to our YouTube channel at http://youtube.com/secureninja
Like us on Facebook at http://facebook.com/secureninja
Follow us on Twitter @secureninja
Connect with us on LinkedIn
"That's a lot of why you're seeing the major media companies, the major cloud providers, the major telcos, for example, being targeted in today's environment. They're being utilized as trusted conduits to their constituencies." Tom Kellermann, VP of Cybersecurity at Trend Micro, gives a primer on so-called "island hopping" network attacks and how hackers are using them successfully to take over infrastructures.Read more >