Hi [[ session.user.profile.firstName ]]

Learn How Hackers Evade Enterprise Security in 10 Minutes (or Less… )

Learn about common evasion techniques used by advanced threats, attacks that leverage those techniques, and SentinelOne security predictions for 2015.
Recorded Feb 18 2015 46 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Dal Gemmell, Director of Product Management and Steve LaBarbera, Director of Security Solutions, SentinelOne
Presentation preview: Learn How Hackers Evade Enterprise Security in 10 Minutes (or Less… )

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Beyond Files: The Full Spectrum of Attacks Mar 14 2017 7:00 pm UTC 45 mins
    Eran Ashkenazi, VP of Services & Field Operations, SentinelOne
    We’ve all seen the bake-offs - vendor against vendor, the ‘latest’ malware samples run raw and then packed, and who apparently wins the race against hackers. But there is one major flaw in these tests - they’re only covering a fraction of attacks that occur in the wild. What about exploits? What about script-based attacks, including powershell and VMI? What about attacks that leave no file indicators - how does your security stop them?

    Join SentinelOne’s Eran Ashkenazi, VP of Field Services and Support, as he discusses the full spectrum of attacks that are currently out in the wild and what you can do to protect against them.

    What you’ll learn:
    - The types of attacks, or attack vectors, you should include in your evaluation testing
    - Real-world attacks that utilize methods that leave no file-based indicators
    - How SentinelOne’s next generation endpoint protection protects against a file-less attack in a live demo
  • A Cyber Risk Survival Guide: Adding Cyber Insurance to Security Recorded: Dec 14 2016 55 mins
    Sean Roth, Head of Product Marketing and Charlie Bernier, Broker/Defense attorney at ECBM Insurance Brokers and Consultants
    It seems like every week we see a high profile cyber attacks aimed at stealing sensitive data and extorting money. And then tack on the aftermath to the organization who was hit - the cost of resulting lawsuits, penalties, and lost revenue due to reputation damage.

    But there is hope! Organizations around the world are implementing strategies to mitigate the looming cyber risk, and they involve both technology AND policy.

    In this webinar, you'll get expert advice from guest speaker Charlie Bernier, cyber insurance pioneer and Broker/Attorney at ECBM Insurance Brokers and Consultants and Sean Roth, SentinelOne Director of Product Marketing, including:
    The real costs involved when a breach occurs
    Key considerations in designing a cyber insurance policy that protects your organization
    Choosing cybersecurity solutions that ultimately meet your security goals
  • Defining Next Generation Endpoint Protection Recorded: Sep 8 2016 35 mins
    Neil MacDonald, Gartner VP and Fellow, and Scott Gainey, CMO SentinelOne
    VP and Gartner Fellow, Neil MacDonald, and SentinelOne CMO and SVP Marketing, Scott Gainey look at the top security challenges organizations face, the steps to take to secure your enterprise, and SentinelOne's next-generation approach to defending endpoints.
  • Ransomware is Here: Fundamentals Everyone Needs to Know Recorded: Aug 31 2016 34 mins
    Jeremiah Grossman, Chief of Security Strategy
    If you’re an IT professional, you probably know at least the basics of ransomware. Instead of using malware or an exploit to exfiltrate PII from an enterprise, bad actors instead find valuable data and encrypt it. Unless you happen to have an NSA-caliber data center at your disposal to break the encryption, you must pay your attacker in cold, hard bitcoins—or else wave goodbye to your PII.


    Those assumptions aren’t wrong, but they also don’t tell the whole picture. Hear from Jeremiah Grossman, SentinelOne’s Chief of Security Strategy and a 20-year cybersecurity veteran, in this on-demand webinar that will explore the foundations of ransomware, and why you truly need to worry.
  • The Rise of Ransomware & How to Prevent It Recorded: Mar 28 2016 39 mins
    Aarij Khan, Product Marketing, SentinelOne
    Hackers are turning over big profits by holding data hostage in return for a ransom payment. Learn how ransomware infects machines and what you can do to protect against it.
  • SentinelOne Overview: The Future of Endpoint Protection Recorded: Feb 12 2016 20 mins
    Tomer Weingarten, CEO
    SentinelOne CEO and Co-Founder, Tomer Weingarten, discusses the challenges organizations face when trying to protect their endpoints, and why today's common defense systems are not working. Learn how SentinelOne's approach protects against all types of attacks, including exploits, without hogging valuable system resources.
  • Your organization has been breached, now what? Recorded: Mar 31 2015 32 mins
    Dal Gemmell, Director of Product Management and Steve LaBarbera, Director of Security Solutions, SentinelOne
    Unfortunately, there is a high likelihood that organizations will suffer a breach by advanced malware. Learn how to minimize response time through real-time forensics to understand the scope of compromise including:

    - Identifying attacked endpoints
    - Finding indicators of compromise
    - Analyzing malicious activity
    - Tracing outbound communication, and more
  • Learn How Hackers Evade Enterprise Security in 10 Minutes (or Less… ) Recorded: Feb 18 2015 46 mins
    Dal Gemmell, Director of Product Management and Steve LaBarbera, Director of Security Solutions, SentinelOne
    Learn about common evasion techniques used by advanced threats, attacks that leverage those techniques, and SentinelOne security predictions for 2015.
SentinelOne
SentinelOne

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Learn How Hackers Evade Enterprise Security in 10 Minutes (or Less… )
  • Live at: Feb 18 2015 6:00 pm
  • Presented by: Dal Gemmell, Director of Product Management and Steve LaBarbera, Director of Security Solutions, SentinelOne
  • From:
Your email has been sent.
or close