Hi [[ session.user.profile.firstName ]]
Sort by:
    • How Bad Can Zero Days Get? How Bad Can Zero Days Get? Robert Hansen, VP of WhiteHat Security Labs Recorded: May 27 2015 5:00 pm UTC 38 mins
    • Are you giving the adversary unintended access through vulnerabilities in your system?

      By only having one method of finding vulnerabilities or one way of mitigating them, the chances of the adversary getting through are increasingly high. This webinar will walk you through the current threat landscape, how vulnerabilities can be found, and how to mitigate control.

      In this webinar you'll learn:

      - What types of assessments work at which points in the software development lifecycle.
      - What is the most popular way to deploy a WAF and why that's not a good idea as a single method of defense.
      - Why finding and fixing your vulnerability isn't actually good enough.

      Read more >
    • Zero Day, Zero Effect: Examining the Clandestine Wolf Zero-Day Zero Day, Zero Effect: Examining the Clandestine Wolf Zero-Day Ben Withnell, Incident Analyst, FireEye as a Service Recorded: Sep 22 2015 3:00 pm UTC 43 mins
    • Triage and remediation of attacks utilizing zero-day vulnerabilities requires technology, intelligence, and expertise that is often beyond the capabilities of most security teams today. With Clandestine Wolf, the name our security team gave to a recent zero-day campaign exploiting an Adobe Flash vulnerability, our analysts were able to validate the alert and begin response within minutes after first observing the attack.
      In this webinar Ben Withnell, a FireEye as a Service (FAAS) incident analyst, will discuss how the Clandestine Wolf campaign was discovered, triaged, and remediated across the FireEye as a Service customer base. Throughout the webinar he will also share his insights into how our analysts handle APT threats, the attacker lifecycle, and remediation tactics.

      Register today for this exclusive insight!

      Read more >
    • Stopping Zero-day Threats Stopping Zero-day Threats Dan Maier, Senior Director of Product Marketing, Zscaler Inc. Recorded: Jul 23 2015 3:00 pm UTC 56 mins
    • If Anthem, Sony, Home Depot, Target and Neiman Marcus can fall victim to security breaches, so can you. The bad news is - no company is immune, no matter how big or small you are. Without a proper understanding of zero-day threats, companies have no way of exposing the gaps of overhyped security solutions. These threats are very sophisticated and often leveraging previously unknown attack techniques and vulnerabilities.

      Join us for a compelling webcast that will highlight critical insights combating zero-day threats - including the ability to:

      • Track employee traffic at all times, in real time, irrespective of whether they are inside or outside the corporate network
      • Derive intelligent insights and meaningful data for fast corrective action
      • Avoid a strategy based on "alerting" you about infections - without any guarantees you will notice them
      • Implement a comprehensive approach to stopping zero-day threats - based on protection, (inspecting every byte of traffic and automatically blocking threats), detection and remediation

      Read more >
    • ISA 62443 Patch Management Overview and Methods for Zero-Day Threat Protection ISA 62443 Patch Management Overview and Methods for Zero-Day Threat Protection Joe Weiss, Managing Director for ISA99; William Cotter, Systems Engineering Specialist; Delfin Rodillas, Sr. Manager of SCADA Recorded: Apr 8 2015 4:00 pm UTC 67 mins
    • The growing presence of widely known and used Commercial Off-the-Shelf (COTS) systems in Industrial Control Systems (ICS) provides an increased opportunity for cyber attacks against ICS equipment. Such attacks, if successful, could have severe impact to not only process availability but also safety. Patch management is one particular area of cybersecurity which requires special attention when applied to ICS. It is part of a comprehensive cybersecurity strategy that increases cybersecurity through the installation of patches that resolve bugs, operability, reliability, and cyber security vulnerabilities. The ISA-TR62443‑2‑3 technical report, developed by the ISA 99 Working Group 6, addresses the patch management aspect of ICS cyber security. Also part of an effective strategy is the use of compensating cybersecurity controls to protect ICS systems from exploits and malware in between often long patching cycles. Novel network and host based technologies have recently become available to address even zero-day threats which bypass conventional signature-based approaches.

      Attendees of this webinar will leave with a better understanding of:
      -The unique aspects of ICS that entail a different and more rigorous approach to patch management than that used in business networks
      - An overview of the ISA 99 standards efforts with detail review of the main aspects of the ISA-TR62443-2-3 Technical Report on Patch Management in IACS
      - Advancements in compensating cybersecurity controls for protecting systems from zero-day threats

      Read more >
    • Preparing for Zero-Days and Emerging Threats - Where Effective Security Counts Preparing for Zero-Days and Emerging Threats - Where Effective Security Counts Joanna Burkey,HP TippingPoint DVLabs Manager Recorded: Jun 24 2014 9:00 pm UTC 35 mins
    • Staying ahead of the bad guys requires two things: a good plan and a good partner. Your security plan must be robust, flexible, and responsive. Your partner must do the heavy lifting, so your team can concentrate to what matters most to your business. HP Security Research Zero-Day Initiative has more than 3000 security researchers looking for vulnerabilities in the software you rely on. Once they are found, HP TippingPoint DVLabs pushes out weekly digital vaccine packages to proactively protect customers from emerging threats.
      But staying protected isn’t just a numbers game.

      Attend this webinar to learn:
      • How we develop “virtual patches” that block any attempt to exploit the vulnerability rather than simple filters to block individual exploits
      • How our approach reduces false positives
      • How the HP Security Research and DVLabs team keeps them out to let you rest easier

      Read more >