Hi [[ session.user.profile.firstName ]]
Sort by:
    • State of the Internet / Security 2018: Web Attacks and Zero Trust Best Practices
      State of the Internet / Security 2018: Web Attacks and Zero Trust Best Practices Nick Hawkins, Senior Director, Product Management, Enterprise; Aseem Ahmed, Senior Product Manager, Cloud Security, Akamai Recorded: Aug 8 2018 5:00 am UTC 57 mins
    • Get the latest information on real-world incidents, security best practices and trends from Akamai’s Summer 2018 State of the Internet / Security Report: Web Attacks as well as more information on our Zero Trust security best practices in our upcoming live webinar.

      You’ll learn:

      · A deep dive into bots and credential abusers targeting the hospitality industry, which has seen an extremely high percentage of malicious logins and what can be done

      · How some DDoS attacks are employing unusual tactics to increase effectiveness, including the emergence of intelligent, adaptive enemies who change tactics to overcome the defenses in their way

      · How to explore the different options of moving into Zero Trust security, look at best practices for implementation and share Akamai’s recommendations of what optimal Zero Trust architecture should be

      Join Akamai and (ISC)² on Aug 8, 2018 (Wed) at 13:00 (Singapore time) to learn more about web attacks and zero trust best practices.

      Presenter: Nick Hawkins, Senior Director, Product Management, Enterprise, Akamai Technologies;
      Aseem Ahmed, Senior Product Manager, Cloud Security, Akamai Technologies
      Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²

      Read more >
    • Comodo Cybersecurity: Render Attacks Useless
      Comodo Cybersecurity: Render Attacks Useless Comodo Cybersecurity Recorded: Jun 26 2018 7:05 pm UTC 2 mins
    • Trojans, and other malicious “wares” generate approximately one million new specimens of hostile software every day. Although many cybersecurity vendors will promise full protection against threats —the truth is, they can’t, no one can. Businesses and people must accept that malware cannot be successfully blocked 100% of the time. As a leader in cybersecurity for over twenty years, Comodo Cybersecurity seeks to protect businesses by understanding the true nature of the digital environment and what malware needs to survive.

      Read more >
    • Defending Against Today's Sophisticated Attacks on Healthcare Organisations
      Defending Against Today's Sophisticated Attacks on Healthcare Organisations Axel Wirth, Distinguished Healthcare Architect Recorded: Aug 30 2018 5:00 am UTC 67 mins
    • In the eyes of cyber criminals, there are few targets more lucrative than healthcare organisations due to the comprehensive nature of the information held by them, and the high value of health data on the black market. And, it is not just about protecting information – cybersecurity incidents in healthcare can also impact hospitals' ability to deliver care, or could result in harm to patients should critical systems get taken down by a malicious actor.

      Join us in our upcoming 'Defending Against Today's Sophisticated Attacks on Healthcare Organisations' webinar as we discuss the specific cybersecurity challenges pertaining to the healthcare industry, including:

      • The latest threat trends and incidents
      • The challenges of securing healthcare ecosystems
      • Effective cybersecurity strategies

      Read more >
    • Threat Hunting, the Difference Between Safe and Sorry
      Threat Hunting, the Difference Between Safe and Sorry Dr. Jonny Milliken, Threat Intelligence Manager, Alert Logic; Holger Schulze, CEO, Cybersecurity Insiders Recorded: Aug 2 2018 3:00 pm UTC 46 mins
    • Think Threat Hunting is a nice-to-have, or just a buzz word? Think again. Threat hunting is critical for early detection of unknown threats and advanced attacks that turn into undetected breaches.

      In today’s complex cybersecurity landscape, threats are becoming more sophisticated, frequent, and elusive. It’s no longer enough to depend on traditional, reactive security to stay safe – incorporating threat hunting techniques in your cybersecurity strategy is a necessity.

      Threat hunting puts security on the offense. Rather than just waiting for an attack to trip an alarm, threat hunting takes a comprehensive, holistic approach to proactively monitor for and identify suspicious or potentially malicious activity, so you can take action earlier.

      Hear from experts on how and why threat hunting is critical for your cybersecurity strategy. In this webinar, we’ll cover:

      • How these advanced multi-step attacks work and go undetected
      • How to find evidence of emerging threats and preserve indicators of compromise
      • Logs, and why they are a threat hunter’s best friend
      • Using techniques like honey pots to draw out malicious insiders and would-be cyber attackers

      Read more >
    • When Bots Attack! Stopping OWASP’s New Top 20 Automated Threats
      When Bots Attack! Stopping OWASP’s New Top 20 Automated Threats Rami Essaid, Co-Founder Distil Networks Recorded: Aug 16 2016 3:00 pm UTC 38 mins
    • The OWASP Top 10 Vulnerabilities, last published in 2013, has been a valuable list of criteria by which any Web Application Firewall (WAF) is evaluated, but has a glaring flaw, it only focuses on vulnerabilities in the code, and ignores automated threats. In late 2015, this flaw was addressed and OWASP released the first Automated Threat Handbook specifically to help organizations better understand and respond to the notable worldwide increase of automated threats from bots. This presentation discusses these new bot threats, bot evolution, and how to fight back.
      Keypoints:

      - How malicious bots attack and cause problems

      - Why homegrown IT solutions have troubles keeping up with bots, threats

      - See Distil Networks in action finding, fighting bots

      Read more >
    • Understanding your Attack Surface - Research into FT30 organisations
      Understanding your Attack Surface - Research into FT30 organisations Terry Bishop, EMEA Technical Director, RiskIQ Recorded: Nov 21 2017 2:00 pm UTC 37 mins
    • Businesses are accelerating their digital transformation, expanding their online presence to enrich products, deepen customer relationships, and boost their brand ecosystems. However, with this rapid growth comes security challenges as web assets get created outside of corporate controls and the overall Internet presence expands to unmanageable proportions. Cyber adversaries are taking advantage of this sprawling digital attack surface, looking forweaknesses to exploit. The attack surface has become the battle line between malicious actors and an organisation’s external threat defenders and its compromise is behind many of the breaches that get reported with alarming frequency.

      In an effort to highlight and quantify the risks which organisations have in their attack surface, we conducted research on the top 30 UK organisations (FT30) to highlight the issues we believe all companies face. We will present the various types of risk we uncovered and offer practical advice on ways to mitigate them and harden your attack surface.

      Read more >
    • Malware in Disguise & How to Spot It [Ransomware, Phishing]
      Malware in Disguise & How to Spot It [Ransomware, Phishing] Alex Holden, CISO of Hold Security Recorded: May 24 2017 6:00 pm UTC 56 mins
    • On the surface, spotting malicious attacks can be difficult. Hackers are expanding their malware distribution networks by exploiting commonly used applications to carry and distribute their malicious software. In the wake of the three major attacks Wanna Cry, DocuSign, and Google Docs malware outbreak we will examine how malware is distributed and provide guidelines on how to secure infrastructures against the next attack.

      About the Presenter:
      Alex Holden is the founder and CISO of Hold Security. Holden is credited with the discovery of many high profile breaches including Adobe Systems, initial vendor breach that led to the discovery of the JPMorgan Chase breach, and the independent discovery of the Target and Yahoo breaches. Considered one of the leading security experts, he regularly voices his professional opinion in mainstream media.

      Read more >
    • How to Detect and Investigate Brute Force Attacks with AlienVault USM Anywhere
      How to Detect and Investigate Brute Force Attacks with AlienVault USM Anywhere Sacha Dawes, Principal Product Marketing Manager, AlienVault Recorded: Apr 18 2017 5:00 pm UTC 49 mins
    • A brute force attack is one of the more common types of attack that malicious actors use to try and gain access to your IT servers, applications and data. In theory, a brute-force attack can be used to attempt to decrypt any encrypted data (except for data encrypted in an information-theoretically secure manner). These attacks are relatively simple for attackers to implement and they can wreak havoc on your organization when successful. However, many IT security teams may not be aware that they are at risk from these attacks, or what to do about them.

      Join us for a live demo where we'll demonstrate how the AlienVault Unified Security Management (USM) approach, delivered as a SaaS solution with our USM Anywhere offering, can help you detect and investigate these types of attacks.

      You'll learn:

      - How attackers can use brute force attacks to gain access to your network
      - Steps you can take BEFORE an attack to identify systems or applications that may be at greater risk
      - How USM Anywhere can alert you immediately of brute force attacks targeting your cloud, hybrid cloud and on-premises environments
      - How to use USM Anywhere to investigate brute force attacks and identify compromised assets

      About the Presenter:
      Sacha Dawes is responsible for the technical marketing of the AlienVault Unified Security Management (USM) family of solutions. He brings multiple years of experience from product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he has delivered both SaaS-delivered and boxed-product solutions that address the IT security, identity and management space.

      Read more >
    • Inside The New Generation of Phishing Attacks
      Inside The New Generation of Phishing Attacks Michael Landewe, Researcher, Avanan Cofounder Recorded: May 23 2017 5:00 pm UTC 37 mins
    • What we know and have trained users about phishing attacks has changed. Old methods no longer apply.

      IT teams have deployed filters and taught our users to detect phishing attacks by scanning for suspicious URLs, spoofed login pages, and unrecognized senders. We've told people to change passwords, turn on two factor authentication and watch for suspicious logins.

      None of these methods can defend against the next generation of automated, malicious API-based phishing attacks that are invisible to users and unmonitored by SaaS.

      Once exclusive to advanced state-sponsored actors, the recent Google Docs worm pushed this sophisticated method into the headlines.

      In this webinar we will dig deep into the next generation of phishing attack and describe the new methods every IT team must deploy to defend against them. Because the vulnerability is not unique to Google, we will also discuss Office 365, Box, Salesforce and other popular business apps.

      Read more >
    • Making Sense of Fileless Malware
      Making Sense of Fileless Malware Guy Propper, Security researcher at Deep Instinct Recorded: Apr 25 2018 6:00 pm UTC 20 mins
    • Threat actors are constantly searching for new and sophisticated ways in which to avoid detection in order to successfully perform malicious attacks.
      During the past year there has been an extreme increase in the amount of fileless malware attacks. Fileless malware attacks pose a threat to organizations and a challenge for security vendors, due to the use of various nonexecutable file formats for infection, and the ability to execute parts of the malicious logic of the attack in-memory only.

      This phenomenon has encouraged cyber criminals to more extensively adopt fileless attack techniques, which were once mostly used by nation-states, leading to a rise in the amount of fileless attacks.

      This webinar will present a comprehensive overview of fileless malware, enabling individuals and organizations to better understand and deal with the threat posed by fileless malware.

      Read more >
    • A New and Resilient Approach to Securing Critical Infrastructure and IIoT
      A New and Resilient Approach to Securing Critical Infrastructure and IIoT Michael Murray, Robert Lentz, Josh Corman, Chris Rezendes Recorded: Aug 16 2018 7:00 pm UTC 47 mins
    • Find out how top leaders from Government and IT/OT companies are securing our critical infrastructure from cyber threats from Nation State level attacks and individual malicious actors.

      In this discussion you will learn about a new and resilient approach to cybersecurity to defend against threats to our Water, Energy and Transportation Grids. By using identity and authentication, you can block zero-day attacks from unidentified and unauthorized traffic, enable defense automation, and enable analytics integration for a closed loop system, addressing insider threats.

      Michael Murray of BlackRidge will host a panel of industry experts, including:
      - Josh Corman, Chief Security Officer and SVP of PTC
      - Robert Lentz, the first DoD CISO, and CEO Cyber Security Strategies
      - Chris Rezendes, Chief Business Officer at Context Labs

      Read more >