Hi [[ session.user.profile.firstName ]]
Sort by:
    • State of the Internet / Security 2018: Web Attacks and Zero Trust Best Practices
      State of the Internet / Security 2018: Web Attacks and Zero Trust Best Practices Nick Hawkins, Senior Director, Product Management, Enterprise; Aseem Ahmed, Senior Product Manager, Cloud Security, Akamai Recorded: Aug 8 2018 5:00 am UTC 57 mins
    • Get the latest information on real-world incidents, security best practices and trends from Akamai’s Summer 2018 State of the Internet / Security Report: Web Attacks as well as more information on our Zero Trust security best practices in our upcoming live webinar.

      You’ll learn:

      · A deep dive into bots and credential abusers targeting the hospitality industry, which has seen an extremely high percentage of malicious logins and what can be done

      · How some DDoS attacks are employing unusual tactics to increase effectiveness, including the emergence of intelligent, adaptive enemies who change tactics to overcome the defenses in their way

      · How to explore the different options of moving into Zero Trust security, look at best practices for implementation and share Akamai’s recommendations of what optimal Zero Trust architecture should be

      Join Akamai and (ISC)² on Aug 8, 2018 (Wed) at 13:00 (Singapore time) to learn more about web attacks and zero trust best practices.

      Presenter: Nick Hawkins, Senior Director, Product Management, Enterprise, Akamai Technologies;
      Aseem Ahmed, Senior Product Manager, Cloud Security, Akamai Technologies
      Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²

      Read more >
    • Defending Against Today's Sophisticated Attacks on Healthcare Organisations
      Defending Against Today's Sophisticated Attacks on Healthcare Organisations Axel Wirth, Distinguished Healthcare Architect Recorded: Dec 12 2018 3:00 am UTC 67 mins
    • In the eyes of cyber criminals, there are few targets more lucrative than healthcare organisations due to the comprehensive nature of the information held by them, and the high value of health data on the black market. And, it is not just about protecting information – cybersecurity incidents in healthcare can also impact hospitals' ability to deliver care, or could result in harm to patients should critical systems get taken down by a malicious actor.

      Join us in our upcoming 'Defending Against Today's Sophisticated Attacks on Healthcare Organisations' webinar as we discuss the specific cybersecurity challenges pertaining to the healthcare industry, including:

      • The latest threat trends and incidents
      • The challenges of securing healthcare ecosystems
      • Effective cybersecurity strategies

      Read more >
    • Comodo Cybersecurity: Render Attacks Useless
      Comodo Cybersecurity: Render Attacks Useless Comodo Cybersecurity Recorded: Jun 26 2018 7:05 pm UTC 2 mins
    • Trojans, and other malicious “wares” generate approximately one million new specimens of hostile software every day. Although many cybersecurity vendors will promise full protection against threats —the truth is, they can’t, no one can. Businesses and people must accept that malware cannot be successfully blocked 100% of the time. As a leader in cybersecurity for over twenty years, Comodo Cybersecurity seeks to protect businesses by understanding the true nature of the digital environment and what malware needs to survive.

      Read more >
    • Defending Against Today's Sophisticated Attacks on Healthcare Organisations
      Defending Against Today's Sophisticated Attacks on Healthcare Organisations Axel Wirth, Distinguished Healthcare Architect Recorded: Aug 30 2018 5:00 am UTC 67 mins
    • In the eyes of cyber criminals, there are few targets more lucrative than healthcare organisations due to the comprehensive nature of the information held by them, and the high value of health data on the black market. And, it is not just about protecting information – cybersecurity incidents in healthcare can also impact hospitals' ability to deliver care, or could result in harm to patients should critical systems get taken down by a malicious actor.

      Join us in our upcoming 'Defending Against Today's Sophisticated Attacks on Healthcare Organisations' webinar as we discuss the specific cybersecurity challenges pertaining to the healthcare industry, including:

      • The latest threat trends and incidents
      • The challenges of securing healthcare ecosystems
      • Effective cybersecurity strategies

      Read more >
    • Threat Hunting, the Difference Between Safe and Sorry
      Threat Hunting, the Difference Between Safe and Sorry Dr. Jonny Milliken, Threat Intelligence Manager, Alert Logic; Holger Schulze, CEO, Cybersecurity Insiders Recorded: Aug 2 2018 3:00 pm UTC 46 mins
    • Think Threat Hunting is a nice-to-have, or just a buzz word? Think again. Threat hunting is critical for early detection of unknown threats and advanced attacks that turn into undetected breaches.

      In today’s complex cybersecurity landscape, threats are becoming more sophisticated, frequent, and elusive. It’s no longer enough to depend on traditional, reactive security to stay safe – incorporating threat hunting techniques in your cybersecurity strategy is a necessity.

      Threat hunting puts security on the offense. Rather than just waiting for an attack to trip an alarm, threat hunting takes a comprehensive, holistic approach to proactively monitor for and identify suspicious or potentially malicious activity, so you can take action earlier.

      Hear from experts on how and why threat hunting is critical for your cybersecurity strategy. In this webinar, we’ll cover:

      • How these advanced multi-step attacks work and go undetected
      • How to find evidence of emerging threats and preserve indicators of compromise
      • Logs, and why they are a threat hunter’s best friend
      • Using techniques like honey pots to draw out malicious insiders and would-be cyber attackers

      Read more >
    • Live Interview Panel: IoT Cyber Attacks and Proactive Security
      Live Interview Panel: IoT Cyber Attacks and Proactive Security tbc Upcoming: Jan 29 2019 11:30 am UTC 60 mins
    • The Internet of Things is set to reach 50 billion connected devices by 2020, according to a recent Cisco report, making them an attractive target for cyber criminals who can easily use them get inside networks of organizations worldwide. Once in, attackers can easily take over and control IP-enabled devices to extract data or implant malicious code.

      Join IoT and security experts to learn more about:
      - Unique challenges of securing IoT systems
      - IoT and AI: Threats, attack trends and recommendations for basic cyber hygiene
      - Proactive security strategies to stave off the threat of IoT cyber attacks IoT

      Read more >
    • When Bots Attack! Stopping OWASP’s New Top 20 Automated Threats
      When Bots Attack! Stopping OWASP’s New Top 20 Automated Threats Rami Essaid, Co-Founder Distil Networks Recorded: Aug 16 2016 3:00 pm UTC 38 mins
    • The OWASP Top 10 Vulnerabilities, last published in 2013, has been a valuable list of criteria by which any Web Application Firewall (WAF) is evaluated, but has a glaring flaw, it only focuses on vulnerabilities in the code, and ignores automated threats. In late 2015, this flaw was addressed and OWASP released the first Automated Threat Handbook specifically to help organizations better understand and respond to the notable worldwide increase of automated threats from bots. This presentation discusses these new bot threats, bot evolution, and how to fight back.
      Keypoints:

      - How malicious bots attack and cause problems

      - Why homegrown IT solutions have troubles keeping up with bots, threats

      - See Distil Networks in action finding, fighting bots

      Read more >
    • Malware in Disguise & How to Spot It [Ransomware, Phishing]
      Malware in Disguise & How to Spot It [Ransomware, Phishing] Alex Holden, CISO of Hold Security Recorded: May 24 2017 6:00 pm UTC 56 mins
    • On the surface, spotting malicious attacks can be difficult. Hackers are expanding their malware distribution networks by exploiting commonly used applications to carry and distribute their malicious software. In the wake of the three major attacks Wanna Cry, DocuSign, and Google Docs malware outbreak we will examine how malware is distributed and provide guidelines on how to secure infrastructures against the next attack.

      About the Presenter:
      Alex Holden is the founder and CISO of Hold Security. Holden is credited with the discovery of many high profile breaches including Adobe Systems, initial vendor breach that led to the discovery of the JPMorgan Chase breach, and the independent discovery of the Target and Yahoo breaches. Considered one of the leading security experts, he regularly voices his professional opinion in mainstream media.

      Read more >
    • Understanding your Attack Surface - Research into FT30 organisations
      Understanding your Attack Surface - Research into FT30 organisations Terry Bishop, EMEA Technical Director, RiskIQ Recorded: Nov 21 2017 2:00 pm UTC 37 mins
    • Businesses are accelerating their digital transformation, expanding their online presence to enrich products, deepen customer relationships, and boost their brand ecosystems. However, with this rapid growth comes security challenges as web assets get created outside of corporate controls and the overall Internet presence expands to unmanageable proportions. Cyber adversaries are taking advantage of this sprawling digital attack surface, looking forweaknesses to exploit. The attack surface has become the battle line between malicious actors and an organisation’s external threat defenders and its compromise is behind many of the breaches that get reported with alarming frequency.

      In an effort to highlight and quantify the risks which organisations have in their attack surface, we conducted research on the top 30 UK organisations (FT30) to highlight the issues we believe all companies face. We will present the various types of risk we uncovered and offer practical advice on ways to mitigate them and harden your attack surface.

      Read more >
    • How to Detect and Investigate Brute Force Attacks with AlienVault USM Anywhere
      How to Detect and Investigate Brute Force Attacks with AlienVault USM Anywhere Sacha Dawes, Principal Product Marketing Manager, AlienVault Recorded: Apr 18 2017 5:00 pm UTC 49 mins
    • A brute force attack is one of the more common types of attack that malicious actors use to try and gain access to your IT servers, applications and data. In theory, a brute-force attack can be used to attempt to decrypt any encrypted data (except for data encrypted in an information-theoretically secure manner). These attacks are relatively simple for attackers to implement and they can wreak havoc on your organization when successful. However, many IT security teams may not be aware that they are at risk from these attacks, or what to do about them.

      Join us for a live demo where we'll demonstrate how the AlienVault Unified Security Management (USM) approach, delivered as a SaaS solution with our USM Anywhere offering, can help you detect and investigate these types of attacks.

      You'll learn:

      - How attackers can use brute force attacks to gain access to your network
      - Steps you can take BEFORE an attack to identify systems or applications that may be at greater risk
      - How USM Anywhere can alert you immediately of brute force attacks targeting your cloud, hybrid cloud and on-premises environments
      - How to use USM Anywhere to investigate brute force attacks and identify compromised assets

      About the Presenter:
      Sacha Dawes is responsible for the technical marketing of the AlienVault Unified Security Management (USM) family of solutions. He brings multiple years of experience from product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he has delivered both SaaS-delivered and boxed-product solutions that address the IT security, identity and management space.

      Read more >