Hi [[ session.user.profile.firstName ]]
Sort by:
    • Threat Predictions 2014 - Enterprise Edition Threat Predictions 2014 - Enterprise Edition Jon Clay/ Sr. Manager - Threat Research at Trend Micro Recorded: Jan 28 2014 7:00 pm UTC 41 mins
    • 2013 saw enterprise, government and F100 firms all face catastrophic insider threats and data breaches. What does 2014 hold for Enterprise organizations with widely dispersed devices, a shrinking sense of privacy, supply chain risks and ever-increasing compliance requirements? How can larger firms optimize security ROI ?
      Please join Jon Clay, Sr. Manager of Threat Research at Trend Micro, for this LIVE webcast. He will outline the 2014 security risk assessment from Trend Micro’s CTO Raimund Genes, along with the 1,500 global threat researchers staffing the frontlines. You will have an opportunity to ask questions of the experts and learn from peers.
      TOPICS INCLUDE: Lessons learned from 2013; threat assessment for 2014; data breach insights; risks of legacy exploits; viewpoint of law enforcement; and staying a step ahead of cyber criminals.
      AUDIENCE: IT decision makers, risk & compliance teams, network engineers, infrastructure professionals, security architects, and frontline managers who want increased visibility into the 2014 security environment.
      PRESENTER: Jon Clay, Sr. Manager, Trend Micro’s Threat Research Group. Jon Clay is responsible for managing threat communication and serving as a public speaker for the wide range of core technologies within Trend Micro. He has been with Trend Micro for over 17 years and has held previous roles in Sales Engineering and Training. Jon has a BS in Electrical Engineering with a Minor in Computer Engineering from Michigan State University.

      Read more >
    • Weaponize Your Threat Intelligence for Breach Prevention Weaponize Your Threat Intelligence for Breach Prevention Scott Simkin, Sr. Threat Intelligence Manager at Palo Alto Networks Recorded: Apr 21 2016 6:00 pm UTC 55 mins
    • Today the economics of cyber attacks favor the adversary. With the explosion of access to automated and highly effective attack techniques, now everyone has the ability to become an “advanced attacker,” a status once reserved for the most sophisticated advanced persistent actors. With this evolution, the cost of launching successful attacks has plummeted, putting more pressure on Cybersecurity professionals to manually defend against an increasing volume and sophistication of attacks.

      Organizations require new ways to “weaponize” the threat intelligence they have to prevent attacks before they can cause damage, without adding additional security resources.

      We will cover:
      •How to know your network better than an adversary.
      •The value of delivering real-time prevention for targeted attacks.
      •How to architect your defenses for prevention to save time and resources traditionally spent on remediation.

      Read more >
    • Are Advanced Persistent Threats Hiding in Your Network? Are Advanced Persistent Threats Hiding in Your Network? Justin Turner, Delivery Team Manager, Targeted Threat Hunting & Response Recorded: Sep 14 2015 6:00 pm UTC 59 mins
    • How Targeted Threat Hunting Inspects Your Network for Cyber Attacker Presence.

      Many organizations have some form of information security protection in place but also wonder "Have I already been compromised?" A cyber threat such as malware or even a large scale Advanced Persistent Threat could be hiding in file systems and several other areas of your network that may go unnoticed by the untrained eye. A deep inspection of your networks is an excellent way to identify the presence of compromises and entrenched threat actors operating in your environment.

      During this interactive webinar, Justin Turner, Delivery Team Manager from the Targeted Threat Hunting & Response Team, will share why it is critical to identify targeted threat indicators of attacker presence and leverage threat intelligence to provide context to determine how to engage and resist the adversary.

      In addition you will:

      - Learn what Targeted Threat Hunting is and why it is important.
      - Hear real-world examples of previous incidents and how targeted threat hunting was used to remove entrenched adversaries.
      - Receive a standard list of questions that should be answered during an engagement.

      Read more >
    • People Make the Best Exploits: How Threats Prey on the Human Factor People Make the Best Exploits: How Threats Prey on the Human Factor Patrick Wheeler Director,Threat Intelligence, Proofpoint Recorded: Mar 16 2016 10:15 pm UTC 59 mins
    • Cybersecurity vendors devote much of their attention to the technical aspects of their task: malware payloads, distribution methods, infection chains, stolen data, and so on. To be sure, these elements are important. But focusing on them too narrowly neglects a simple fact: in the end, people are the targets.

      That’s why attacks are still getting through, despite advances in detection and response technology. From email and web to social media and mobile apps, attackers are exploiting the human factor.

      Join Proofpoint Director of Threat Intelligence Patrick Wheeler as he discusses The Human Factor 2016 report.

      This Dark Reading webinar presents original field research from data gathered by Proofpoint products deployed in customer settings around the world. Patrick will cover threats in email attachments, social media posts, and URLs.

      In this webinar you will see not just who is clicking what—but when, where, and why they are clicking:

      Who is being targeted, and who is falling victim
      What attackers are sending, and which lures are working
      When threats arrive, and when people are most likely to click

      Read more >
    • Creating a Government Private Threat Intelligence Cloud Creating a Government Private Threat Intelligence Cloud Taylor Ettema, Product Manager, Threat Prevention Technologies Recorded: May 27 2015 6:00 pm UTC 57 mins
    • With the sophistication and highly targeted nature of attacks against governments, the adversary can use numerous approaches and actions to get in and move across the network. Palo Alto Networks Threat Intelligence—from the cloud or an on-premises government-run platform—constantly gathers intelligence on evasive applications and converts the intelligence back into all platform devices. This ensures that organizations maintain control of evasive applications to ensure authorized activity traverses the networks while unauthorized activity fails to route.

      Join this webinar to Learn:
      - How Government Agencies can develop and manage their own threat intelligence cloud on a closed, dedicated Palo Alto Networks WF-500 threat intelligence platform.

      - How to create effective threat intelligence private clouds for a singular agency or for a group of Agencies, Ministries or Departments who wish to share their threat intelligence.

      - How the threat intelligence cloud (public or private) analyzes and correlates intelligence from all platform security functions—URL Filtering, mobile security, IPS/threat prevention and the virtual execution engine or sandbox, WildFire™— and validated community input.

      - How WildFire immediately discovers previously unknown malware and communicates the results to the platform to automatically generate signatures.

      - How all threat intelligence is distributed to the network and endpoints to ensure they are protected.

      - How this is all done automatically, reducing operational burden and shortening an organization’s response time.

      - How this innovative architecture can be operated at a fraction of the cost it takes to deploy and manage an equivalent set of point products – APT, IDS/IPS, URL filtering and more – all correlating insights automatically in real-time for greatest network protection.

      Read more >
    • Outmaneuvering Evasive Threats  - The next generation of security defense Outmaneuvering Evasive Threats - The next generation of security defense Ben Feinstein, Director of Dell SecureWorks Counter Threat Unit Operations Recorded: Mar 5 2015 7:00 pm UTC 57 mins
    • A new category of threat is emerging – a threat designed to evade traditional signature-based technologies such as Anti-Virus and Intrusion Detection. Attempting to meet the challenge is a new class of technology, “Advanced Malware Protection” or “AMP,” which is an industry term for technology designed to continuously monitor for, offload and detonate files in a sandbox - safely away from the main environment - to observe and detect malicious objects.

      If a security device produces an alert in the forest, who’s there to hear it?

      The challenge is these next generation advanced malware detection solutions produce so much detail about the suspicious activity that most organizations do not have the resources to thoroughly investigate/analyze. The best technology means nothing if you don’t have the right expertise to react to the alert, quickly decipher complex reports, investigate the threat, and determine the right response. And meanwhile, the threat actors aren’t standing still – they’re developing measures to circumvent controls in some traditional sandbox environments.

      You will learn:
      1.How the threat is evolving and how actors are employing evasive practices to overcome traditional and even some more sophisticated security defenses
      2.Why next generation sandboxing and full-system emulation are the keys to combatting evasive malware threats
      3.The expertise needed to accurately identify and diagnose the threat once the alert is received
      4.How to ensure your organization has the ability to respond effectively to the incident and close all the backdoors a threat actor may have opened

      Read more >
    • Are Advanced Persistent Threats Hiding in Your Network? Are Advanced Persistent Threats Hiding in Your Network? Justin Turner, Delivery Team Manager, Targeted Threat Hunting & Response Recorded: Sep 14 2015 1:00 pm UTC 52 mins
    • How Targeted Threat Hunting Inspects Your Network for Cyber Attacker Presence.

      Many organisations have some form of information security protection in place but also wonder "Have I already been compromised?" A cyber threat such as malware or even a large scale Advanced Persistent Threat could be hiding in file systems and several other areas of your network that may go unnoticed by the untrained eye. A deep inspection of your networks is an excellent way to identify the presence of compromises and entrenched threat actors operating in your environment.

      During this interactive webinar, Justin Turner, Delivery Team Manager from the Targeted Threat Hunting & Response Team, will share why it is critical to identify targeted threat indicators of attacker presence and leverage threat intelligence to provide context to determine how to engage and resist the adversary.

      In addition you will:

      - Learn what Targeted Threat Hunting is and why it is important.
      - Hear real-world examples of previous incidents and how targeted threat hunting was used to remove entrenched adversaries.
      - Receive a standard list of questions that should be answered during an engagement.

      Read more >
    • Ransomware Security Threats: Defending Against CryptoLocker & CryptoWall Ransomware Security Threats: Defending Against CryptoLocker & CryptoWall Jon Clay, Sr. Manager of Global Threat Communications, Trend Micro Recorded: Jan 22 2015 3:30 am UTC 47 mins
    • Cyber criminals can hijack your business by encrypting your data and holding your systems hostage until you pay up. Hackers use ransomware like CryptoLocker and CryptoWall to target a wide range of organizations like yours, demanding thousands of dollars. Find out how you can protect your business from ransomware security threats. Join Jon Clay, Sr. Manager of Global Threat Communications at Trend Micro, as he outlines the latest criminal underground threats and best practices to protect your data and systems.

      This LIVE webinar will answer questions such as:
      • What industries and countries are being targeted?
      • Should firms pay criminals the ransom?
      • Should organizations notify the authorities?
      • How can ransomware be mitigated?

      Bring additional questions to this informative session and hear first-hand input from a threat defense expert.

      Read more >