Hi [[ session.user.profile.firstName ]]
Sort by:
    • Hunting Attackers with Network Audit Trails Hunting Attackers with Network Audit Trails Tom Cross, Director of Security Research, Lancope Recorded: Sep 16 2014 5:00 pm UTC 47 mins
    • Sophisticated, targeted attacks have become increasing difficult to detect and analyze. Attackers can employ 0-day vulnerabilities and exploit obfuscation techniques to evade detection systems and “fly under the radar” for long periods of time.

      Gartner estimates 85% of breaches go completely undetected and 92% of the detected breaches are reported by third parties. New strategies for identifying network attack activity are necessary.

      Learn how network logging technologies such as NetFlow and IPFIX can be applied to the problem of detecting sophisticated, targeted attacks and used to create an audit trail of network activity that can be analyzed, both automatically and by skilled investigators, to uncover anomalous traffic.

      Lancope will demonstrate how these records can be used to:
      Discover active attacks in each phase of the attacker’s “kill chain.”
      Determine the scope of successful breaches and document the timeline of the attacks

      Read more >
    • Building an Integrated Security Platform Building an Integrated Security Platform Robert Craig, McAfee Senior Product Marketing Manager Recorded: Mar 27 2014 5:00 pm UTC 37 mins
    • Over the past decade, the web has become an increasingly dangerous place, as attackers launch ever more sophisticated attacks. Enterprises of all sizes, from small to global, need to protect their internal systems against both inbound and outbound attack vectors.

      External attacks can take many forms. A user’s email address may be exposed to hackers who send a phishing message with links to a web site that downloads malicious software onto the user’s PC without them being aware of it. Or, an advanced malware attack may use sophisticated obfuscation techniques to hide its true identity, enabling it to slip past a signature-based malware detection tool.

      Data leakage can come from internal users who, inadvertently or deliberately, transfer sensitive or confidential information outside the network perimeter, or a botnet client transmitting a password file to a master server located overseas.

      To counter these threats, security professionals need to deploy interlocking, coordinated security systems designed to work together. In this session, McAfee will discuss how its security platforms work together to comprehensively address the multiple security threats that customer’s encounter.

      •Overview: current malware trends and frequently encountered attack types
      •Interlocking lines of defense:
      oFirewall, Intrusion Prevention Service
      oWeb Gateway
      oEmail Gateway
      oAdvanced Threat Defense
      oData Loss Prevention
      oMcafee Content Security Suite

      Read more >