Hi [[ session.user.profile.firstName ]]
Sort by:
    • Threat Predictions 2014 - Enterprise Edition Threat Predictions 2014 - Enterprise Edition Jon Clay/ Sr. Manager - Threat Research at Trend Micro Recorded: Jan 28 2014 7:00 pm UTC 41 mins
    • 2013 saw enterprise, government and F100 firms all face catastrophic insider threats and data breaches. What does 2014 hold for Enterprise organizations with widely dispersed devices, a shrinking sense of privacy, supply chain risks and ever-increasing compliance requirements? How can larger firms optimize security ROI ?
      Please join Jon Clay, Sr. Manager of Threat Research at Trend Micro, for this LIVE webcast. He will outline the 2014 security risk assessment from Trend Micro’s CTO Raimund Genes, along with the 1,500 global threat researchers staffing the frontlines. You will have an opportunity to ask questions of the experts and learn from peers.
      TOPICS INCLUDE: Lessons learned from 2013; threat assessment for 2014; data breach insights; risks of legacy exploits; viewpoint of law enforcement; and staying a step ahead of cyber criminals.
      AUDIENCE: IT decision makers, risk & compliance teams, network engineers, infrastructure professionals, security architects, and frontline managers who want increased visibility into the 2014 security environment.
      PRESENTER: Jon Clay, Sr. Manager, Trend Micro’s Threat Research Group. Jon Clay is responsible for managing threat communication and serving as a public speaker for the wide range of core technologies within Trend Micro. He has been with Trend Micro for over 17 years and has held previous roles in Sales Engineering and Training. Jon has a BS in Electrical Engineering with a Minor in Computer Engineering from Michigan State University.

      Read more >
    • How St. Jude Medical Uses Threat Intelligence in Its SOC How St. Jude Medical Uses Threat Intelligence in Its SOC Russ Staiger, Lead Analyst, Cyber Threat Action Center, St. Jude Medical Recorded: Jun 7 2016 6:00 pm UTC 54 mins
    • St. Jude Medical is a leading global medical device manufacturer and is dedicated to transforming the treatment of some of the world’s most expensive epidemic diseases.

      In this webinar, Russ Staiger, lead analyst of the Cyber Threat Action Center (CTAC) at St. Jude Medical, will explain how the company combines real-time threat intelligence from Recorded Future with its Splunk SIEM to more effectively fulfill CTAC’s mission to identify, protect against, respond to, and enhance resiliency against cyber security threats.

      Register now to learn:

      • How St. Jude Medical uses threat intelligence to monitor for emerging threats against the healthcare industry.
      • How St. Jude Medical makes informed verdicts on events in its SIEM using context gained from Recorded Future threat intelligence.
      • How Recorded Future helps St. Jude Medical detect more complex events and potential incidents that could have possibly been missed without enrichment.
      • How the team fosters secure collaboration between the SOC, other security teams, and the business.

      Featured Speaker Bio:

      Russ Staiger is the Cyber Threat Action Center lead for information security teams concerned with investigation of APT (advanced persistent threats), malware remediation, and SIEM-based security strategies. Russ’s expertise also includes defensive systems data analysis, operational metrics (ITSM), in-line IDS-IPS implementation and action planning, security training and education, incident response, and team operations SLA enforcement.

      Read more >
    • Europe: How St. Jude Medical Uses Threat Intelligence in Its SOC Europe: How St. Jude Medical Uses Threat Intelligence in Its SOC Russ Staiger, Lead Analyst, Cyber Threat Action Center, St. Jude Medical Recorded: Jun 7 2016 1:00 pm UTC 51 mins
    • St. Jude Medical is a leading global medical device manufacturer and is dedicated to transforming the treatment of some of the world’s most expensive epidemic diseases.

      In this webinar, Russ Staiger, lead analyst of the Cyber Threat Action Center (CTAC) at St. Jude Medical, will explain how the company combines real-time threat intelligence from Recorded Future with its Splunk SIEM to more effectively fulfill CTAC’s mission to identify, protect against, respond to, and enhance resiliency against cyber security threats.

      Register now to learn:

      • How St. Jude Medical uses threat intelligence to monitor for emerging threats against the healthcare industry.
      • How St. Jude Medical makes informed verdicts on events in its SIEM using context gained from Recorded Future threat intelligence.
      • How Recorded Future helps St. Jude Medical detect more complex events and potential incidents that could have possibly been missed without enrichment.
      • How the team fosters secure collaboration between the SOC, other security teams, and the business.

      Featured Speaker Bio:

      Russ Staiger is the Cyber Threat Action Center lead for information security teams concerned with investigation of APT (advanced persistent threats), malware remediation, and SIEM-based security strategies. Russ’s expertise also includes defensive systems data analysis, operational metrics (ITSM), in-line IDS-IPS implementation and action planning, security training and education, incident response, and team operations SLA enforcement.

      Read more >
    • Weaponize Your Threat Intelligence for Breach Prevention Weaponize Your Threat Intelligence for Breach Prevention Scott Simkin, Sr. Threat Intelligence Manager at Palo Alto Networks Recorded: Apr 21 2016 6:00 pm UTC 55 mins
    • Today the economics of cyber attacks favor the adversary. With the explosion of access to automated and highly effective attack techniques, now everyone has the ability to become an “advanced attacker,” a status once reserved for the most sophisticated advanced persistent actors. With this evolution, the cost of launching successful attacks has plummeted, putting more pressure on Cybersecurity professionals to manually defend against an increasing volume and sophistication of attacks.

      Organizations require new ways to “weaponize” the threat intelligence they have to prevent attacks before they can cause damage, without adding additional security resources.

      We will cover:
      •How to know your network better than an adversary.
      •The value of delivering real-time prevention for targeted attacks.
      •How to architect your defenses for prevention to save time and resources traditionally spent on remediation.

      Read more >
    • Are Advanced Persistent Threats Hiding in Your Network? Are Advanced Persistent Threats Hiding in Your Network? Justin Turner, Delivery Team Manager, Targeted Threat Hunting & Response Recorded: Sep 14 2015 6:00 pm UTC 59 mins
    • How Targeted Threat Hunting Inspects Your Network for Cyber Attacker Presence.

      Many organizations have some form of information security protection in place but also wonder "Have I already been compromised?" A cyber threat such as malware or even a large scale Advanced Persistent Threat could be hiding in file systems and several other areas of your network that may go unnoticed by the untrained eye. A deep inspection of your networks is an excellent way to identify the presence of compromises and entrenched threat actors operating in your environment.

      During this interactive webinar, Justin Turner, Delivery Team Manager from the Targeted Threat Hunting & Response Team, will share why it is critical to identify targeted threat indicators of attacker presence and leverage threat intelligence to provide context to determine how to engage and resist the adversary.

      In addition you will:

      - Learn what Targeted Threat Hunting is and why it is important.
      - Hear real-world examples of previous incidents and how targeted threat hunting was used to remove entrenched adversaries.
      - Receive a standard list of questions that should be answered during an engagement.

      Read more >
    • People Make the Best Exploits: How Threats Prey on the Human Factor People Make the Best Exploits: How Threats Prey on the Human Factor Patrick Wheeler Director,Threat Intelligence, Proofpoint Recorded: Mar 16 2016 10:15 pm UTC 59 mins
    • Cybersecurity vendors devote much of their attention to the technical aspects of their task: malware payloads, distribution methods, infection chains, stolen data, and so on. To be sure, these elements are important. But focusing on them too narrowly neglects a simple fact: in the end, people are the targets.

      That’s why attacks are still getting through, despite advances in detection and response technology. From email and web to social media and mobile apps, attackers are exploiting the human factor.

      Join Proofpoint Director of Threat Intelligence Patrick Wheeler as he discusses The Human Factor 2016 report.

      This Dark Reading webinar presents original field research from data gathered by Proofpoint products deployed in customer settings around the world. Patrick will cover threats in email attachments, social media posts, and URLs.

      In this webinar you will see not just who is clicking what—but when, where, and why they are clicking:

      Who is being targeted, and who is falling victim
      What attackers are sending, and which lures are working
      When threats arrive, and when people are most likely to click

      Read more >
    • Creating a Government Private Threat Intelligence Cloud Creating a Government Private Threat Intelligence Cloud Taylor Ettema, Product Manager, Threat Prevention Technologies Recorded: May 27 2015 6:00 pm UTC 57 mins
    • With the sophistication and highly targeted nature of attacks against governments, the adversary can use numerous approaches and actions to get in and move across the network. Palo Alto Networks Threat Intelligence—from the cloud or an on-premises government-run platform—constantly gathers intelligence on evasive applications and converts the intelligence back into all platform devices. This ensures that organizations maintain control of evasive applications to ensure authorized activity traverses the networks while unauthorized activity fails to route.

      Join this webinar to Learn:
      - How Government Agencies can develop and manage their own threat intelligence cloud on a closed, dedicated Palo Alto Networks WF-500 threat intelligence platform.

      - How to create effective threat intelligence private clouds for a singular agency or for a group of Agencies, Ministries or Departments who wish to share their threat intelligence.

      - How the threat intelligence cloud (public or private) analyzes and correlates intelligence from all platform security functions—URL Filtering, mobile security, IPS/threat prevention and the virtual execution engine or sandbox, WildFire™— and validated community input.

      - How WildFire immediately discovers previously unknown malware and communicates the results to the platform to automatically generate signatures.

      - How all threat intelligence is distributed to the network and endpoints to ensure they are protected.

      - How this is all done automatically, reducing operational burden and shortening an organization’s response time.

      - How this innovative architecture can be operated at a fraction of the cost it takes to deploy and manage an equivalent set of point products – APT, IDS/IPS, URL filtering and more – all correlating insights automatically in real-time for greatest network protection.

      Read more >
    • Intel & Threat Analysis – The Defensive Duo Intel & Threat Analysis – The Defensive Duo Jens Monrad, Global Threat Intelligence Liaison, FireEye Upcoming: Aug 10 2016 1:00 pm UTC 45 mins
    • The ongoing battle with cybercrime is asymmetric. You’ve invested millions in protection technology but unknown attackers still find a way in. So how do you stay ahead of the curve?

      "The core problem is that most cyber security tools do not make a distinction between everyday malware and advanced targeted attacks. If security tools cannot tell the difference, security teams have no way of prioritizing the alerts that matter the most."

      Join Jens Monrad, Global Threat Intelligence Liaison from FireEye in this webinar that will discuss:

      •How to ensure you are responding to the alert that matters

      •Benefits of Alerts with threat Intelligence

      •Using threat intelligence to think like your attacker

      •How to apply threat intelligence, expert rules and advanced security data analytics in order to shut down threats before they cause damage

      •How security teams can prioritize and optimize their response efforts.

      Read more >