The Varonis Incident Response team shares investigation best practices and lessons learned. Watch our IR team lead an investigation through the security ecosystem. Our analysts will respond to an attack using Varonis and Splunk, and show you how to leverage many key enterprise data sources such as Active Directory, DNS, vulnerability scans, and more!
Trick a user into entering creds into our fake O365 login page. Make Microsoft send a passcode to the user’s phone
User enters their passcode on OUR fake page. Hijack the user’s session token.Gain access to SharePoint Online environment
Exfiltrate data from O365. Pivot to on-prem and steal CEO’s emails
Office 365 is dominating the cloud, yet its native security lacks unified controls required to protect the billions of sensitive files that flow between internal storage and the cloud.In this CPE webinar you’ll learn why cloud-centric security is not enough, where built-in Office 365 security features fall short and how to enhance Office 365 security with Varonis.
From the California Consumer Privacy Act (CCPA) to HIPAA to the GLBA, data privacy and protection has become one of the foremost issues for any organization that collects personal data. Varonis wants to help you stay ahead of the curve.
Let's ride with Black Hills security analysts Beau Bullock, Brian Fehrman, and Derek Banks, and learn how to spot the tricks of lowdown data rustlers. This virtual keynote is perfect for city slickers -- higher-level IT executives -- interested in experiencing the pen tester way of life. Beau, Brian,and Derek will show how simple hacking techniques are still very effective, but can be defended against if you follow their advice.
Join for a play-by-play of a live attack simulation and investigation of a rogue insider threat using DatAlert’s new DFIR capabilities.
During this training session, our security analysts will execute a new attack scenario in our lab.
Here’s the scenario:
An insider was paid to exfiltrate sensitive organizational data
To remain uncovered, he takes control on a service account
Using the service account, he scans company filers for documents with indicating keywords
Copies matching documents to his PC
Creates an encrypted ZIP file
To remain uncovered, he uses the service account to upload the ZIP file to an external Gmail account
Learn how to spot & fix Active Directory misconfigurations, proactively reduce risk, and investigate advanced AD attacks. Learn why attackers commonly target AD, how to proactively reduce risk and measure AD health and much more!
This exclusive on demand webinar will feature all the latest from Varonis version 7.0, including:
•New dashboards: Active Directory dashboards; GDPR dashboards; and Office 365 dashboards
•Box security events: get security insights on your Box data all in one place
•Threat intelligence: monitor and track malicious (or suspicious) connections
•Integrated playbooks: incident response plans from our cybersecurity research lab built into your dashboard
•How to leverage Solr for responsive investigations
Identity and Access Management (IAM) is a key factor in managing security: it helps manage access to applications and systems, but falls short when applying that same solution to enterprise data. How can you address the shortfalls – and get the most out of your IAM?
Online security can be a world of uncertainty: we’re facing a new wave of sophisticated threats, while still dealing with the same fundamental threats from decades ago (SQL injection, ransomware from the 80’s).
Join Varonis experts for a virtual keynote that explores how security threats are evolving - and what we need to be especially conscious of in the modern era.
Attend this session and you’ll learn 4 tried-and-true steps you can take to secure your Active Directory and learn how to spot & fix AD misconfigurations, identify, prevent, and investigate advanced AD attacks.
From the hack of SONY Entertainment, to Russian interference in the 2016 election, John Carlin led investigations into these breaches and was responsible for protecting the nation against terrorism, espionage, and cyber and other national security threats.
John's days of chasing cyber-terrorists for the DOJ as Assistant Attorney General for National Security might be over, but he’s joining us to share an insider’s perspective on cyber threats in the public and private sector.
Where cybersecurity preparedness falls short (public and private sector)
Practical takeaways to meet the cybersecurity needs of C-Suite executives
How to manage the evolving threat landscape - and what you can do to stay secure