Hi [[ session.user.profile.firstName ]]
Sort by:
    • Threat Actors Follow The Money | 2018 Human Factor Report
      Threat Actors Follow The Money | 2018 Human Factor Report Patrick Wheeler, Director of Threat Intelligence, Proofpoint Recorded: May 9 2018 5:00 pm UTC 59 mins
    • The human factor—the instincts of curiosity and trust that lead well-meaning people to click, download, install, move funds, and more—is simply more reliable and lucrative than exploits with increasingly short shelf lives.

      Here are the key findings from Proofpoint’s 2018 Human Factor Report, exploring the ways in which threat actors continue to refine their approaches to social engineering with well-crafted lures and schemes that regularly trick even savvy users.

      Join Proofpoint Director of Threat Intelligence as we discuss:

      -- Trends in volume and type of attack providing useful insights for both defenders and organizations.
      -- Ransomware and Email Fraud - how effective have they become and who is being targeted the
      most.
      -- How bad actors are using cloud services

      Read more >
    • Under the Hood with AlienVault Labs: Leveraging Threat Intelligence
      Under the Hood with AlienVault Labs: Leveraging Threat Intelligence Sacha Dawes, Principal Product Marketing Manager, AlienVault & Chris Doman, Threat Engineer, OTX, AlienVault Recorded: Jun 14 2018 4:00 pm UTC 56 mins
    • Threat intelligence offers the ability to improve threat detection and response using information on attack methods previously reported by others, but only if it can be effectively integrated into security controls and processes. So, how do you go from threat data to actionable insights?

      Join AlienVault for this webcast to get a look under the hood at how the AlienVault Labs threat research team turns threat data and indicators of compromise (IoC’s) into comprehensive, actionable threat intelligence.

      We'll cover:

      - What threat intelligence is, and how it speeds threat detection and incident response
      - Key questions to help you evaluate threat intelligence sources
      - How the AlienVault Labs team analyzes threat data, and turns it into actionable information
      - How AlienVault USM Anywhere integrates threat intelligence with multiple security capabilities to accelerate threat detection and response

      Hosted By
      Sacha Dawes
      Principal Product Marketing Manager
      Sacha has over 15 years of experience in technology and information security across product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he delivered solutions to address the IT security, identity and management space. Before joining AlienVault, he worked in the office of the EVP for Cloud and Enterprise business at Microsoft. Originally from the UK, Sacha is based in Austin TX and holds a Masters in Computer Science from Vanderbilt University.

      Chris Doman
      Threat Engineer, OTX
      Chris works on Alienvault OTX as a Threat Engineer. He’s had a long interest in security, but joined the industry after winning the civilian section of the Department of Defense's forensics competition. Chris runs a popular threat intelligence portal (ThreatCrowd.org) in his spare time, and holds a CCHIA (Certified Host Intrusion Analyst) from CREST and a degree in Computer Science from the University of Cambridge.

      Read more >
    • Understanding Ransomware: Insights from Threat Research
      Understanding Ransomware: Insights from Threat Research Erika Noerenberg | Senior Malware Analyst | LogRhythm Recorded: Mar 20 2018 8:00 pm UTC 44 mins
    • Ransomware has dominated recent cybersecurity news and made mainstream headlines throughout 2017. While there are ways to protect organizations against ransomware, cybercriminals are constantly evolving their tactics to stay ahead of security teams.

      In this webcast, Erika Noerenberg, senior malware analyst, will discuss the ransomware threat and the biggest ransomware events to date, including WanaCry and NotPetya. She’ll also provide valuable threat intelligence and key defensive strategies to help you protect your organization from ransomware.

      You’ll learn:
      • An introduction to ransomware
      • Notable ransomware threats
      • Ransomware threat research
      • Key mitigation and defensive strategies

      Register now to hear about the rise of ransomware and tips to defend your organization.

      Read more >
    • Going on the offensive: Incorporating threat hunting into your security
      Going on the offensive: Incorporating threat hunting into your security Andrew Costis, threat research engineer, LogRhythm Recorded: Mar 20 2018 10:00 am UTC 60 mins
    • Threat hunting is the latest strategy to keep networks secure. Put simply, it refers to the process of proactively searching for advanced threats that may have eluded security systems. In other words, going after the ones that slipped through the net.

      It’s important to know that threat hunting is more than industry hype. It provides security professionals with a powerful weapon with which to combat threat actors. So, is time to go on the offensive?

      •Learn why threat hunting should be on your security mandate for 2018
      •Discover some of the core requirements for getting started with threat hunting
      •Hear how you can you jump start your threat hunting mindset
      •Learn how a simple threat hunt can unravel a more sophisticated attack

      Join our webinar to hear Andrew Costis, threat research engineer at LogRhythm Labs, outline how a simple hunt uncovered a malicious insider attack by a privileged user.

      Read more >
    • How to Combat the 7 Common Emergent Threats
      How to Combat the 7 Common Emergent Threats Keiron Shepherd, Senior Systems Engineer - Security, F5 Networks Recorded: Mar 21 2018 3:00 pm UTC 64 mins
    • In today’s digital marketplace, your applications are the backbone of your business. However, cloud-based apps create a host of complex challenges and new risks. With automated tools and hackers for hire, threats are increasing and cybercrime has turned into a game for profit. The digital world has opened the door to unprecedented threats, putting your corporate data and reputation at risk.

      Join us for this webinar to learn about:
      • The 7 most common threats to your apps and data: Malicious bots, Credential stuffing, DDoS, Ransomware, Web fraud, Phishing, and Malware
      • How you can leverage threat intelligence to secure your apps and data
      • Where to spend your security budget to provide the strongest level of protection

      By watching this webinar, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://f5.com/about-us/policies/privacy-policy).

      Read more >
    • Going on the offensive: Incorporating threat hunting into your security
      Going on the offensive: Incorporating threat hunting into your security Andrew Costis, threat research engineer, LogRhythm Recorded: Jun 6 2018 12:00 am UTC 60 mins
    • Threat hunting is the latest strategy to keep networks secure. Put simply, it refers to the process of proactively searching for advanced threats that may have eluded security systems. In other words, going after the ones that slipped through the net.

      It’s important to know that threat hunting is more than industry hype. It provides security professionals with a powerful weapon with which to combat threat actors. So, is time to go on the offensive?

      •Learn why threat hunting should be on your security mandate for 2018
      •Discover some of the core requirements for getting started with threat hunting
      •Hear how you can you jump start your threat hunting mindset
      •Learn how a simple threat hunt can unravel a more sophisticated attack

      Join our webinar to hear Andrew Costis, threat research engineer at LogRhythm Labs, outline how a simple hunt uncovered a malicious insider attack by a privileged user.

      Read more >
    • Hunting Rogue Elements: Fighting the Insider Threat
      Hunting Rogue Elements: Fighting the Insider Threat Kevin Eley, LogRhythm & Jonathan Zulberg, LogRhythm Recorded: May 23 2018 12:00 am UTC 43 mins
    • Customer data falling into the hands of cybercriminals. It’s the stuff of nightmares for any organisation. Today the insider threat has the potential to pose a bigger risk to cybersecurity than external hackers.

      In this webinar, LogRhythm experts will take you through a real use case in which data worth millions of pounds was stolen. And they will explain how the incident could have been stopped with the right response and mitigation approach.

      Join the webinar to:

      • Learn how cybercrime has evolved so much that insider threats now rival external threats
      • See a live display of activity generated by an insider threat
      • Discover cybersecurity innovations that can detect and respond to insider threats in real time

      Join us to get a better understanding of the insider threat – and how to combat rogue elements in your organisation.

      Read more >
    • 3 Challenges of Using EDR for Threat Hunting [2/3 Threat Hunting Series]
      3 Challenges of Using EDR for Threat Hunting [2/3 Threat Hunting Series] Chris Gerritz, the Founder of Infocyte, Rohit Dhamankar is VP of Product at Infocyte Recorded: Mar 27 2018 6:00 pm UTC 57 mins
    • In part 2 of our myth busting webinar series, threat hunters from Infocyte will discuss how to scalably and proactively hunt for unknown threats across the entire enterprise network with an approach called Forensic State Analysis (FSA). We will compare FSA against three of the traditional methods of threat hunting that you may have been told are the “only” ways to perform threat hunting.

      We will look at the pitfalls of relying on Endpoint Detection (EDR) software as a substitute for proactive threat hunting, and examine some of the common misconceptions. We will also show how FSA arms security practitioners with an effective and efficient methodology to hunt without relying solely on sophisticated security infrastructure, big data or experts.

      In EDR vs FSA, you will learn about:

      - The use cases for traditional Endpoint Detection
      - The challenges of using real-time detection tools to find hidden threats
      - How to hunt at scale and simplify the threat hunting process using FSA

      About the presenters:
      Chris Gerritz, the Founder of Infocyte, is a pioneer in defensive cyberspace operations having built the U.S. Air Force's first interactive Defensive Counter Cyberspace (DCC) practice. Infocyte is the result of Chris’ experience hunting adversaries within some of the largest and most targeted defense networks in the world. His experience provides him with an unmatched level of operational expertise and equips him with a highly refined perspective on how to tackle today's security threats.

      Rohit Dhamankar is VP of Product at Infocyte, and is responsible for defining the company's product and strategy. Dhamankar brings more than 15 years of security industry experience across product management, threat research, technical sales and customer solutions.

      Read more >
    • Seeing the Unseen – Detecting the Advanced Persistent Threat
      Seeing the Unseen – Detecting the Advanced Persistent Threat Justin Turner, Director of the Targeted Threat Hunting & Response Team, SecureWorks Recorded: Sep 14 2016 6:00 pm UTC 63 mins
    • Learn how Threat Hunting delivers high certainty in detecting compromise

      Many organizations have information security protections in place that still fail to answer with high a level of certainty, "Have we already been compromised?" A cyber threat such as malware or even a large scale Advanced Persistent Threat could be hiding in areas of your network and go unnoticed by the untrained eye.

      That’s where Threat Hunting comes in.

      During this interactive webinar, Justin Turner, Director of the Targeted Threat Hunting & Response Team, will share what Hunting is, what it should tell you, and cut through industry noise. He will share experiences and insights from actual hunting engagements and will also provide recommendations for security leaders and practitioners on how to identify indicators of attacker presence leveraging threat intelligence for context to determine how to engage and resist the adversary.

      In addition, you will:
      - Learn what Targeted Threat Hunting must do for you
      - Hear real-world examples of previous incidents and how targeted threat hunting was used to remove entrenched adversaries
      - Get recommendations on strategies and tactics to aid you in your hunting

      Read more >
    • The Evolution of Mobile Threat Actors
      The Evolution of Mobile Threat Actors Michael Flossman, Head of Threat Intelligence, Lookout Upcoming: Jul 19 2018 3:00 pm UTC 60 mins
    • Cybercriminals and nation states are consistently using mobile threat tooling as part of their espionage or financially motivated attacks and campaigns. The Lookout Threat Intelligence team has noticed this increase as we research and protect against these adversaries. These actors are increasingly seeing value from having an offensive mobile capability in their toolkit and we have even seen low sophistication groups break into this space and successfully steal gigabytes of data from compromised devices. As BYOD and the prevalence of mobile devices in corporate environments continue to blur the traditional enterprise perimeter, the ability to understand the risks to mobile endpoints is critical.

      Join Michael Flossman, Head of Threat Intelligence at Lookout, for this informative webinar as he covers the evolution of threat actors on mobile, discusses several recent high-profile cases, and explains why gaining visibility into your mobile endpoints and proactively securing them is key for today’s organizations."

      Read more >
    • Dark Web Insights: Threat Research Trends and Current Events
      Dark Web Insights: Threat Research Trends and Current Events Allan Liska, Andrei Barysevich, and Juan Andrés Guerrero-Saade (JAGS) Recorded: May 14 2018 5:20 pm UTC 59 mins
    • Hear members of the Insikt Group, Recorded Future’s expert team of researchers, provide their insights on recent dark web trends, current events including threat actor activity, and more.

      This casual panel offers a unique look into the underground economy and allows you to ask your most pressing questions.

      Panelists:

      Allan Liska is a senior security architect at Recorded Future. With more than 15 years of experience in information security, Allan has helped countless organizations improve their security posture using more effective intelligence. He is the author of “Building an Intelligence-Led Security Program,” among other topics in cybersecurity.

      Andrei Barysevich is the director of advanced collection at Recorded Future. A native Russian speaker, he specializes in threat intelligence on highly restrictive criminal communities. Andrei was previously a private consultant for the FBI's New York Cybercrime field office and has been involved in multiple high-profile international cases resulting in successful convictions of members of crime syndicates.

      Juan Andrés Guerrero-Saade (JAGS) is principal security researcher at Recorded Future’s Insikt Group. Previously, he worked at Kaspersky’s GReAT and served as senior cybersecurity and national security advisor to the President of Ecuador. He is the author of “The Ethics and Perils of APT Research: An Unexpected Transition Into Intelligence Brokerage,” among other topics in cybersecurity.

      Read more >
    • Smarter by the Numbers. Smarter You. Webroot 2018 Threat Report
      Smarter by the Numbers. Smarter You. Webroot 2018 Threat Report Tyler Moffitt | Senior Threat Research Analyst Recorded: Apr 23 2018 8:20 pm UTC 54 mins
    • Get the facts you need to stay safe against today's threats.

      When it comes to cybersecurity, change is the only constant. Analysts, researchers, and security companies worked quickly to identify and block emerging threats throughout 2017, but attackers were just as quick in finding new ways to evade defenses.

      The Webroot Threat Report shares a glimpse into our discoveries and analysis of threat activity during the year to equip you with the knowledge you need to overcome modern cybercrime.

      The report covers:
      - Trends in malware and potentially unwanted applications (PUAs)
      - IP addresses and their impact on security
      - Latest trends in ransomware and cryptojacking
      - How URL reputations and classifications help combat attacks
      - The evolution of phishing attacks
      - Mobile application threats

      Read more >