Hi [[ session.user.profile.firstName ]]
Sort by:
    • Using Threat Intelligence to Stop Cyber Attacks Using Threat Intelligence to Stop Cyber Attacks Levin Gundert, Vice President of Intelligence and Strategy, Recorded Future Recorded: Sep 1 2016 5:15 pm UTC 66 mins
    • How can enterprises use threat intelligence data to detect and stop attackers more quickly and efficiently? How can security teams identify the relevant threat information and use it to develop a swift defense? What specific threat information is needed, and how can enterprises use it to stop a particular attacker or exploit?

      In this informative webinar you'll hear security experts discuss practical ways to use threat intelligence from the web to identify the methods used by online attackers and to ferret out sophisticated attacks that wouldn’t be recognized by traditional information security defenses.

      Listen now and you'll also:

      * Learn how to integrate threat intelligence into your current practices for enterprise data defense and incident response.
      * Gain specific advice on how you can use real-time threat intelligence to fight new attacks targeted at your enterprise.

      Read more >
    • Using the power of threat Intelligence with the board Using the power of threat Intelligence with the board Richard Turner - President EMEA, FireEye & Daniel McWhorter, Chief Intelligence Strategist, FireEye Recorded: Jul 7 2016 1:00 pm UTC 46 mins
    • Today, CEOs and board members are bombarded with media reports about cybercriminals, hacktivists, and catastrophic data breaches. CISOs and senior IT executives need to be proactive about keeping top executives informed about genuine threats to the enterprise and why the IT organisation is investing in specific programs, technologies and staff.

      Threat intelligence can help CISOs and senior IT executives communicate with non-technical top executives in terms of risks and threats to the business and the financial and political goals of threat actors. It can help them respond quickly and accurately to questions about incidents publicised in national and industry media, as well as cybersecurity priorities. When incidents occur, threat intelligence can help IT executives better inform the CEO and board about potential responses, so everyone can agree on appropriate next steps

      Join Richard Turner, EMEA President and Dan McWhorter, Chief Intelligence Strategist in this live webinar for an inside look at how Cyber Threat Intelligence can help executives assess and communicate strategic risks threatening their business.

      Learn how to better:
      - Identify and prioritize real threats relevant to your enterprise amidst a deluge of media, reports and false alarms.
      - Communicate risks, threats and response in terms top-level executives understand.
      - Assess the risk of new initiatives to strategically direct investments in people, programs and technology that minimize corporate exposure.
      - Prevent and predict evolving cyber threats by exposing the means, motives and technologies behind threat actors known to target your industry.

      Read more >
    • Hackers vs Organisations: The Dawn of Actionable Threat Intelligence Hackers vs Organisations: The Dawn of Actionable Threat Intelligence Yogi Chandiramani, Director of Engineering and Jens Monrad, Global Intelligence Liaison, FireEye Recorded: Apr 13 2016 1:00 pm UTC 46 mins
    • Year after year, it has been demonstrated that the offence is ahead of the defense in the world of cybercrime. Although, organisations are getting better at detecting a compromise in its network, it is still taking 146 days to detection compared to the minutes it takes hackers to walk away with the keys to the kingdom. Current security controls are not stopping hackers from getting inside organisations due to their leverage of other techniques, such as social engineering, to intrude and disrupt networks. Hackers are winning the battle with an unfair advantage - which can somewhat be seen as "cyber superpowers".

      In this webinar, FireEye experts will describe how to defend against these “cyber superpowers" leveraging the powers of threat intelligence to be equipped for this battle in good against evil. However, many companies see “intelligence" as large volumes of information, which is essentially just unstructured data, without any context thus making it incomprehensible. Companies need actionable intelligence, which can help them anticipate future attacks and improve their response against ongoing attacks. With the right actionable threat intelligence, an organisation can build its own superpowers to defend against the evil of hackers.

      Read more >
    • A New Era of User-Driven Business Intelligence at VMware A New Era of User-Driven Business Intelligence at VMware Ginger Victor Manager, Business Intelligence Analytics, VMware Recorded: Oct 16 2015 1:25 pm UTC 44 mins
    • As businesses scale, you need to be agile to keep up with the pace of building analytics and retrieving information quickly for the company. It is crucial then to improve the organization’s self-service capabilities and drive same-platform adoption in order to transform the business into an Enterprise-ready environment.

      Hear from VMware as they share their key learnings from their Tableau journey of deploying self-service analytics across the organization. Through this webinar, you will learn how to:

      Draw synergies and expertise across your company
      Continue to scale while giving business users more empowerment
      Develop new insight and accelerate data-driven decisions
      Excite executive teams through real-time data access and powerful visualizations

      Read more >
    • Weaponize Your Threat Intelligence for Breach Prevention Weaponize Your Threat Intelligence for Breach Prevention Scott Simkin, Sr. Threat Intelligence Manager at Palo Alto Networks Recorded: Apr 21 2016 6:00 pm UTC 55 mins
    • Today the economics of cyber attacks favor the adversary. With the explosion of access to automated and highly effective attack techniques, now everyone has the ability to become an “advanced attacker,” a status once reserved for the most sophisticated advanced persistent actors. With this evolution, the cost of launching successful attacks has plummeted, putting more pressure on Cybersecurity professionals to manually defend against an increasing volume and sophistication of attacks.

      Organizations require new ways to “weaponize” the threat intelligence they have to prevent attacks before they can cause damage, without adding additional security resources.

      We will cover:
      •How to know your network better than an adversary.
      •The value of delivering real-time prevention for targeted attacks.
      •How to architect your defenses for prevention to save time and resources traditionally spent on remediation.

      Read more >
    • Making Sense of Threat Intelligence Making Sense of Threat Intelligence Al Cooley, Director, DeepSight Cyber Intelligence, Symantec & Humphrey Christian, VP, Product Management, BayDynamics Recorded: Feb 25 2016 6:00 pm UTC 52 mins
    • As the cyber threat landscape expands, so does need for good threat intelligence. The marketplace has exploded with sources of threat information, from the Internet, to open source code, to commercial threat data. But companies struggle with finding a way to collect the right threat information, to organize and prioritize it into true insights that are meaningful to their businesses.

      Join this live webinar to hear about the power of threat intelligence combined with analytics and how you can use the joint offering with Symantec DeepSight and Bay Dynamics Risk Fabric, a Cyber Risk Analytics platform, to protect your assets from the ever changing threat landscape in today’s cyberspace.

      You will learn:
      • What is effective threat intelligence?
      • How the different processes in your security and risk organization benefit from threat intelligence
      • How your vulnerability and risk management teams can benefit from threat intelligence
      • How Symantec and Bay Dynamics can help vulnerability and risk management teams become more productive in integrating threat intelligence into their workflow and maturing their capabilities

      Read more >
    • Understanding The Game Changer - Cyber Threat Intelligence Understanding The Game Changer - Cyber Threat Intelligence Martin Lee, Intelligence Manager, Alert Logic Recorded: Oct 27 2015 3:00 pm UTC 59 mins
    • The frequency and severity of cyber attacks are on the rise as cyber criminals adapt their methods of attack for maximum profit: from adopting a mass-market approach for compromising as many organisations as possible, through to more sophisticated attacks that target specific companies. This is why building a cyber security strategy that has data-driven threat intelligence at its core is so critical.

      In this session, Martin Lee, Intelligence Manager discusses why a cyber threat intelligence capability is so critical, share insights into current threat vectors and how threat intelligence should be integrated into your cyber security strategy to help countering threats.

      Topics covered:
      - Review how the cyber threat landscape is evolving and driving new approaches for organisations to counter threats
      - Insight into how the underground cyber-economy works
      - Understand why threat intelligence should be a key element of your security operations
      - Show how threat intelligence can counter the threat posed to organisations

      Read more >
    • Fortinet Forms Exclusive Alliance with Exodus Intelligence Fortinet Forms Exclusive Alliance with Exodus Intelligence Jonas Tichenor Digital Strategist and Exodus Intelligence CEO, Logan Brown Recorded: May 7 2015 4:00 pm UTC 3 mins
    • An exciting announcement made at RSA 2015 is strategic partnership between Fortinet and Exodus Intelligence (featured recently on the cover of Time magazine). The relationship is designed to facilitate information sharing between the two organizations, to further protect enterprises across the globe from looming cyber threats. The combination of Fortinet’s FortiGuard Labs broad threat research coverage and the unique expertise Exodus provides on the latest emerging zero-day threats, provides a significant benefit in gaining advanced notice of attacks before they have already infiltrated an organization’s network. In addition to the intelligence sharing elements of the partnership, both Exodus and Fortinet will work on the development of new customer-facing threat mitigation and incident response services. Fortinet's Jonas Tichenor and Exodus Intelligence CEO, Logan Brown sat down to talk about what this all means.

      Read more >
    • Threat Intelligence – Staying in Lock-Step with Attackers Threat Intelligence – Staying in Lock-Step with Attackers Rick Hayes, Sr. Consultant for Cyber Intelligence Services at Dell SecureWorks and Mike Rothman, President of Securosis Recorded: Oct 30 2013 3:20 pm UTC 52 mins
    • A rapidly evolving threat landscape is being driven by a growing sophistication among attackers. As a result, organizations must move closer to the threat they face and marshal change in their operations to move ‘in lock-step’ with attackers that pose a direct and credible threat to their operations and reputations. Threat intelligence provides the visibility into threats brewing across the Internet beyond the network edge – closing the gap between what organizations can see today and where these actors reside.

      In this webinar, Mike Rothman, President of Securosis and prolific security blogger, and Rick Hayes, Sr. Consultant for Cyber Intelligence Services at Dell SecureWorks, pair up to discuss the challenges ahead for organizations and how focused Threat Intelligence has a key role to play. The session will discuss why a threat intelligence capability is so critical, share insights into specific threat vectors and how threat intelligence played a direct role in countering threats.

      Topics covered:

      - How the threat landscape is evolving and driving new approaches for security organizations to counter the threat
      - Why threat intelligence must become a key element of security operations going forward
      - Show how threat intelligence can counter the threat posed to organizations

      Read more >