Hi [[ session.user.profile.firstName ]]
Sort by:
    • Threat Predictions 2014 - Enterprise Edition Threat Predictions 2014 - Enterprise Edition Jon Clay/ Sr. Manager - Threat Research at Trend Micro Recorded: Jan 28 2014 7:00 pm UTC 41 mins
    • 2013 saw enterprise, government and F100 firms all face catastrophic insider threats and data breaches. What does 2014 hold for Enterprise organizations with widely dispersed devices, a shrinking sense of privacy, supply chain risks and ever-increasing compliance requirements? How can larger firms optimize security ROI ?
      Please join Jon Clay, Sr. Manager of Threat Research at Trend Micro, for this LIVE webcast. He will outline the 2014 security risk assessment from Trend Micro’s CTO Raimund Genes, along with the 1,500 global threat researchers staffing the frontlines. You will have an opportunity to ask questions of the experts and learn from peers.
      TOPICS INCLUDE: Lessons learned from 2013; threat assessment for 2014; data breach insights; risks of legacy exploits; viewpoint of law enforcement; and staying a step ahead of cyber criminals.
      AUDIENCE: IT decision makers, risk & compliance teams, network engineers, infrastructure professionals, security architects, and frontline managers who want increased visibility into the 2014 security environment.
      PRESENTER: Jon Clay, Sr. Manager, Trend Micro’s Threat Research Group. Jon Clay is responsible for managing threat communication and serving as a public speaker for the wide range of core technologies within Trend Micro. He has been with Trend Micro for over 17 years and has held previous roles in Sales Engineering and Training. Jon has a BS in Electrical Engineering with a Minor in Computer Engineering from Michigan State University.

      Read more >
    • Are Advanced Persistent Threats Hiding in Your Network? Are Advanced Persistent Threats Hiding in Your Network? Justin Turner, Delivery Team Manager, Targeted Threat Hunting & Response Recorded: Sep 14 2015 6:00 pm UTC 59 mins
    • How Targeted Threat Hunting Inspects Your Network for Cyber Attacker Presence.

      Many organizations have some form of information security protection in place but also wonder "Have I already been compromised?" A cyber threat such as malware or even a large scale Advanced Persistent Threat could be hiding in file systems and several other areas of your network that may go unnoticed by the untrained eye. A deep inspection of your networks is an excellent way to identify the presence of compromises and entrenched threat actors operating in your environment.

      During this interactive webinar, Justin Turner, Delivery Team Manager from the Targeted Threat Hunting & Response Team, will share why it is critical to identify targeted threat indicators of attacker presence and leverage threat intelligence to provide context to determine how to engage and resist the adversary.

      In addition you will:

      - Learn what Targeted Threat Hunting is and why it is important.
      - Hear real-world examples of previous incidents and how targeted threat hunting was used to remove entrenched adversaries.
      - Receive a standard list of questions that should be answered during an engagement.

      Read more >
    • Creating a Government Private Threat Intelligence Cloud Creating a Government Private Threat Intelligence Cloud Taylor Ettema, Product Manager, Threat Prevention Technologies Recorded: May 27 2015 6:00 pm UTC 57 mins
    • With the sophistication and highly targeted nature of attacks against governments, the adversary can use numerous approaches and actions to get in and move across the network. Palo Alto Networks Threat Intelligence—from the cloud or an on-premises government-run platform—constantly gathers intelligence on evasive applications and converts the intelligence back into all platform devices. This ensures that organizations maintain control of evasive applications to ensure authorized activity traverses the networks while unauthorized activity fails to route.

      Join this webinar to Learn:
      - How Government Agencies can develop and manage their own threat intelligence cloud on a closed, dedicated Palo Alto Networks WF-500 threat intelligence platform.

      - How to create effective threat intelligence private clouds for a singular agency or for a group of Agencies, Ministries or Departments who wish to share their threat intelligence.

      - How the threat intelligence cloud (public or private) analyzes and correlates intelligence from all platform security functions—URL Filtering, mobile security, IPS/threat prevention and the virtual execution engine or sandbox, WildFire™— and validated community input.

      - How WildFire immediately discovers previously unknown malware and communicates the results to the platform to automatically generate signatures.

      - How all threat intelligence is distributed to the network and endpoints to ensure they are protected.

      - How this is all done automatically, reducing operational burden and shortening an organization’s response time.

      - How this innovative architecture can be operated at a fraction of the cost it takes to deploy and manage an equivalent set of point products – APT, IDS/IPS, URL filtering and more – all correlating insights automatically in real-time for greatest network protection.

      Read more >
    • Outmaneuvering Evasive Threats  - The next generation of security defense Outmaneuvering Evasive Threats - The next generation of security defense Ben Feinstein, Director of Dell SecureWorks Counter Threat Unit Operations Recorded: Mar 5 2015 7:00 pm UTC 57 mins
    • A new category of threat is emerging – a threat designed to evade traditional signature-based technologies such as Anti-Virus and Intrusion Detection. Attempting to meet the challenge is a new class of technology, “Advanced Malware Protection” or “AMP,” which is an industry term for technology designed to continuously monitor for, offload and detonate files in a sandbox - safely away from the main environment - to observe and detect malicious objects.

      If a security device produces an alert in the forest, who’s there to hear it?

      The challenge is these next generation advanced malware detection solutions produce so much detail about the suspicious activity that most organizations do not have the resources to thoroughly investigate/analyze. The best technology means nothing if you don’t have the right expertise to react to the alert, quickly decipher complex reports, investigate the threat, and determine the right response. And meanwhile, the threat actors aren’t standing still – they’re developing measures to circumvent controls in some traditional sandbox environments.

      You will learn:
      1.How the threat is evolving and how actors are employing evasive practices to overcome traditional and even some more sophisticated security defenses
      2.Why next generation sandboxing and full-system emulation are the keys to combatting evasive malware threats
      3.The expertise needed to accurately identify and diagnose the threat once the alert is received
      4.How to ensure your organization has the ability to respond effectively to the incident and close all the backdoors a threat actor may have opened

      Read more >
    • Are Advanced Persistent Threats Hiding in Your Network? Are Advanced Persistent Threats Hiding in Your Network? Justin Turner, Delivery Team Manager, Targeted Threat Hunting & Response Recorded: Sep 14 2015 1:00 pm UTC 52 mins
    • How Targeted Threat Hunting Inspects Your Network for Cyber Attacker Presence.

      Many organisations have some form of information security protection in place but also wonder "Have I already been compromised?" A cyber threat such as malware or even a large scale Advanced Persistent Threat could be hiding in file systems and several other areas of your network that may go unnoticed by the untrained eye. A deep inspection of your networks is an excellent way to identify the presence of compromises and entrenched threat actors operating in your environment.

      During this interactive webinar, Justin Turner, Delivery Team Manager from the Targeted Threat Hunting & Response Team, will share why it is critical to identify targeted threat indicators of attacker presence and leverage threat intelligence to provide context to determine how to engage and resist the adversary.

      In addition you will:

      - Learn what Targeted Threat Hunting is and why it is important.
      - Hear real-world examples of previous incidents and how targeted threat hunting was used to remove entrenched adversaries.
      - Receive a standard list of questions that should be answered during an engagement.

      Read more >
    • Ransomware Security Threats: Defending Against CryptoLocker & CryptoWall Ransomware Security Threats: Defending Against CryptoLocker & CryptoWall Jon Clay, Sr. Manager of Global Threat Communications, Trend Micro Recorded: Jan 22 2015 3:30 am UTC 47 mins
    • Cyber criminals can hijack your business by encrypting your data and holding your systems hostage until you pay up. Hackers use ransomware like CryptoLocker and CryptoWall to target a wide range of organizations like yours, demanding thousands of dollars. Find out how you can protect your business from ransomware security threats. Join Jon Clay, Sr. Manager of Global Threat Communications at Trend Micro, as he outlines the latest criminal underground threats and best practices to protect your data and systems.

      This LIVE webinar will answer questions such as:
      • What industries and countries are being targeted?
      • Should firms pay criminals the ransom?
      • Should organizations notify the authorities?
      • How can ransomware be mitigated?

      Bring additional questions to this informative session and hear first-hand input from a threat defense expert.

      Read more >
    • Expose' of Threat Groups Expose' of Threat Groups Aaron Shelmire and Phil Burdette, Sr Researchers with the Counter Threat Unit Special Ops Team Recorded: Jul 16 2014 6:00 pm UTC 60 mins
    • Lessons Learned on How to Combat the Threat

      Join the Dell SecureWorks Counter Threat (CTU) Special Operations team to dig deeper into the threat groups responsible for recent, targeted intrusions. Their experience of engaging with the threat actors allows for a unique opportunity to gather intelligence from the front line. CTU Researchers will share observations on the actors and their tradecraft. Even more importantly, they will share practical guidance on specific steps your organization can take to combat similar threats.

      Key Takeaways from this Webcast Include:

      1 - Tradecraft used by some of the most notorious threat actor groups
      2 - How to use threat intelligence to aid in the mitigation of future incidents
      3 - Practical guidance on steps your organization can take to combat similar threats

      Read more >