Hi [[ session.user.profile.firstName ]]

Hunting for Sentient Adversaries

This webinar will talk through:
- Why enterprises need to hunt
- Who should hunt in the network
- How do you begin hunting for adversaries
Recorded Feb 5 2016 40 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Mike Nichols, Prinicipal Product manager
Presentation preview: Hunting for Sentient Adversaries

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Stealthy or Die: How to evade adversary detection Recorded: May 24 2016 35 mins
    Tony Meehan, VP of Engineering
    Sophisticated adversaries are tampering and disabling defensive security stack. They hide and adapt their behavior upon detection of any traditional security tools. Enterprises must be stealthy and hide their presence from these advanced and adaptive adversaries.

    Endgame VP of Engineering, Tony Meehan will talk about why it is essential for organizations to be stealthy to rapidly detect and stop adversaries in enterprise network. In this webinar you will learn:
    - Why stealth matters
    - What does being stealthy mean
    - How do you avoid detection from adversaries
  • Hunting for Malware with Machine Learning Recorded: Mar 24 2016 49 mins
    Hyrum Anderson
    Defense strategies have run their course. The traditional security stack no longer provides the mission assurance enterprises need. Endgame brings offense to the enterprise by automating the hunt for adversaries that bypass the traditional security stack.

    In this talk our expert will talk about how Endgame uses automated malware classification techniques to hunt for cyber adversaries within enterprise networks.
  • Hunting for Sentient Adversaries Recorded: Feb 5 2016 40 mins
    Mike Nichols, Prinicipal Product manager
    This webinar will talk through:
    - Why enterprises need to hunt
    - Who should hunt in the network
    - How do you begin hunting for adversaries
  • Detecting and Preventing Weaponized Exploitation Recorded: Nov 17 2015 43 mins
    Cody Pierce, Senior Director of Vulnerability Research at Endgame
    This webinar will go over:
    * Common strategies for exploiting software vulnerabilities
    * How mitigations disrupt and increase the cost of developing exploits
    * What is the current state-of-the-art
    * How Endgame is approaching the problem
    * Endgame research prototypes in practice
Endgame is a leading provider of software solutions to the U.S. Intelligence Community and Department of Defense that automate the pursuit, containment and mitigation of the most advanced cyber threats in the most hostile environments.

Now, we are leveraging our unique capabilities to AUTOMATE THE HUNT for cyber adversaries in enterprise networks.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Hunting for Sentient Adversaries
  • Live at: Feb 5 2016 6:00 pm
  • Presented by: Mike Nichols, Prinicipal Product manager
  • From:
Your email has been sent.
or close