Hi [[ session.user.profile.firstName ]]
Sort by:
    • Hacking Hospitals
      Hacking Hospitals Axel Wirth, Distinguished Technical Architect, Symantec & Ted Harrington, Executive Partner, Independent Security Evaluators Recorded: Jun 8 2016 5:00 pm UTC 61 mins
    • Patient health is at grave risk in the current digital era, as sophisticated adversaries utilize technology to perform digital attacks that can result in physical harm. While Healthcare IT typically prioritizes protecting patient records (PHI), this omits the crucial overall healthcare mission of championing patient health against possible attacks against the healthcare digital ecosystem.

      This webinar will present and analyze real world attack scenarios against the healthcare ecosystem, the mindset of hackers, and the complexity of constraints facing health IT security.

      Join us for this webinar as we:

      • Discuss why patient health is at risk and why it is a target for sophisticated adversaries
      • Investigate the complexity of constraints facing Health IT and the barriers that must be overcome to succeed in this effort
      • Highlight key findings from ISE’s groundbreaking research study, Hacking Hospitals*, including the types of healthcare systems investigated, the nature of the investigation, and the objectives of the assessments
      • Present a blueprint with actionable steps that IT Security leaders can follow to properly secure and protect their hospital IT infrastructure, sensitive information, and their patients

      *ISE’s research study, Hacking Hospitals - http://www.securityevaluators.com/hospitalhack/

      Read more >
    • Hacking Airwaves with Pineapples
      Hacking Airwaves with Pineapples Johan Hybinette, CISO at HOSTING Recorded: Sep 22 2016 7:00 pm UTC 39 mins
    • With the widespread use of connected devices, hackers have configured new ways to access your smartphones and laptops, even without you knowing. The Pineapple is a router that stages a fake WIFI access point, compromising the security of any smart device that unknowingly connects to it. During the live webinar, Johan Hybinette, CISO at HOSTING, will be going over the following discussion points:

      - The technical makeup of the pineapple router
      - How the Pineapple hacks into connected devices
      - What personal information is at the most risk
      - What you can do to protect yourself from this malicious form of identity theft

      Read more >
    • Live Hacking: Raising Awareness
      Live Hacking: Raising Awareness Finn Steglich Recorded: Nov 25 2016 9:20 am UTC 33 mins
    • Unlike other dangers in the daily business and private life, cases of misuse in the IT sector often do not become known to the victims. Confidential data that might be stolen by a hacking attack remain on the hard drive of the PC or laptop and thus data theft goes undetected. Due to the lack of reported damages as well as the individually different perception of dangers in general, the importance of IT security is still totally underestimated. Therefore, a live hacking event is an adequate demonstration of how easy it is sometimes to gain access to third-party data without any authorization. Possible topics demonstrated by the speaker could include, amongst many others, price manipulation attacks on online shops, Google hacking, or attacks on public wireless networks.

      Read more >
    • The Hacking Team Hack: Lessons Learned for Enterprise Security
      The Hacking Team Hack: Lessons Learned for Enterprise Security Stephen Cobb, Sr. Security Researcher Recorded: Jul 22 2015 5:00 pm UTC 57 mins
    • Your company can learn valuable lessons about risk strategy and incident response from what happened to Hacking Team, a firm that supplies surveillance tools to government agencies. Widely accused of helping governments spy on dissidents and journalists, Hacking Team found itself hacked with embarrassing, possibly damaging results. ESET senior security researcher Stephen Cobb explains the missteps made and the lessons to be learned during this webinar.

      Key takeaways:
      •How Hacking Team’s mistakes mirrored those made by Sony
      •How employees’ weak passwords helped facilitate the breach
      •How transparency would have helped Hacking Team’s credibility
      •Why every company must review what might be exposed in a breach

      Read more >
    • Zero Touch Hacking: Data Exposed Using Open Source Intelligence
      Zero Touch Hacking: Data Exposed Using Open Source Intelligence Aamir Lakhani, Founder, Dr. Chaos Recorded: Nov 16 2016 10:00 pm UTC 36 mins
    • Drug dealers, weapon brokers, criminals and your next-door neighbor are all leaving their data behind, begging you to look at it. We hear stories every day of how hackers steal data from corporations, governments and individuals. However, the real story is that they do not need to steal the data when we give it away for free. Using public data, tricks, buying used equipment and peering into people's darkest secrets is just the beginning. Aamir Lakhani, ethical hacker and cybersecurity researcher, will use real world scenarios to show how he was able to retrieve information, track down people who wanted to remain hidden and obtain intellectual data with zero touch hacking.

      Read more >
    • NSA Hacking Tools Exposed... Who's Next?
      NSA Hacking Tools Exposed... Who's Next? Cody Mercer, Sr. Threat Research Analyst, NSFOCUS Recorded: Sep 7 2016 5:00 pm UTC 61 mins
    • Every day, the techniques, attack vectors, and tools used by ethical and non-ethical hackers grows exponentially. In lieu of the recent breach conducted by the ‘Shadow Brokers” on the NSA, a new hacking arsenal has been released into the wild. Unfortunately, for the majority who are unaware of this recent breach, they not only open themselves up to being compromised, but also do not possess the skill-set and proper security measures required to combat against these nefarious actors - and their advanced weaponry.

      Join us in this session where we’ll discuss:
      •Black-Hats and White-Hats and the intrinsic life-cycle of the hacking process
      •The real motivations and skills behind state-sponsored hackers, hacktivists, and script kiddies
      •How hackers will use the NSA tools for even more nefarious activities
      •How to combat these highly-sophisticated hacking tools with the right defenses

      Read more >
    • SWAT: Offensive Hacking and Penetration Testing Training and Certification Boot
      SWAT: Offensive Hacking and Penetration Testing Training and Certification Boot Alicia Webb, Wayne Burke Recorded: May 29 2013 1:15 pm UTC 12 mins
    • Alicia Webb interviews SecureNinja’s Senior Security instructor Wayne Burke as he discusses the launch of a new advanced Cybersecurity training offering entitled “Offensive Hacking and Penetration Testing” This course is the most recent to be added to the SecureNinja SWAT: Advanced Cyber Warfare Series of trainings. More information info about this unique course offering can be found at SecureNInja.com ( https://secureninja.com/training-courses/advanced-cyber-warfare-offensive-hacking-swat-special-weapons-and-tactics.html ).
      This (5) five day boot camp provides students with the knowledge and real world hands-on practical skills for performing Advanced Cyber Warfare Hacking and Penetration Testing. The course is based on vendor neutral Open Source software and tools. You will learn both hardware and software design intricacies of the latest attack tool vectors. This vendor neutral course will greatly benefit anyone in the IT Security intelligence spectrum, for those who are responsible for designing, securing, implementing and security hardening.
      Also included in this series is “Offensive Mobile Application Hacking”
      For more information on all of SecureNinja's training and certification courses and bootcamps, visit https://secureninja.com or call 703-535-8600 Option 1

      Don't miss an episode of SecureNinjaTV!

      Subscribe to our YouTube channel at http://youtube.com/secureninja

      Like us on Facebook at http://facebook.com/secureninja

      Follow us on Twitter @secureninja

      Connect with us on LinkedIn

      Read more >