Hi [[ session.user.profile.firstName ]]

The Advantages of Filtering Applications

Traditional methods of filtering traffic have relied upon a knowledge of the network and transport behaviours of the applications running across the network. Whilst most applications being run across the network use standard ports, many threat actors will use methods to obfuscate their communications by abusing these standards, with port spoofing being one such example. This represents a challenge when gathering traffic to ensure that this simple evasion method does not create a blind spot to your security countermeasures.

Join us for this webinar to learn more about how you can:

•Ensure that the Application traffic regardless of port spoofing gets to the right tool
•Improve tool efficiency by discarding irrelevant Application traffic
•Filter the traffic based on the application rather than the IP & Port
Recorded Mar 19 2019 55 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ollie Sheridan, Principal Engineer Security, Gigamon, Brandon Dunlap, Moderator, (ISC)²
Presentation preview: The Advantages of Filtering Applications

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • How Attackers Exploit Office 365 Vulnerabilities Jun 11 2019 12:00 pm UTC 60 mins
    Liam Cleary, CEO, SharePlicity, Brandon Dunlap, Moderator, (ISC)²
    Office 365 has become the platform of choice for document collaboration and sharing. If you’re using Microsoft Office 365 or planning to migrate there, understanding the types of security attacks you can expect is imperative.

    Discover how to:

    - Simulate common Office 365 attacks
    - Test and educate your end users
    - Spot attacks in their early stages
  • Fight the Good Fight Against the Bad Bots Jun 4 2019 12:00 pm UTC 60 mins
    David Warburton, Senior Threat Research Evangelist, F5 Labs, Brandon Dunlap, Moderator, (ISC)²
    Distinguishing between good bots, bad bots, and humans is a major challenge. Today, over 50% of online traffic is generated by bots and they are involved in nearly every attack. Identifying malicious bots and safeguarding against them is now a top priority for organisations developing a sustainable security strategy.

    Join us for this webinar to learn:

    • How bots infect, propagate, and attack applications
    • What types of application attacks are commonly performed by bots
    • How you can defend against bad bots without disrupting the good ones
  • Real Phish Remain the Real Problem May 28 2019 12:00 pm UTC 60 mins
    Mollie MacDougall, Threat Intelligence Manager, David Mount, Product Marketing, Cofense, Brandon Dunlap, Moderator, (ISC)²
    Despite investment in next-gen technologies and employee awareness training, phishing threats continue to become more sophisticated and more effective. It’s time for organisations to accept that REAL phish are the REAL problem. Join the Cofense Phishing Threat Landscape review to discover the trends defining phishing in 2019 and priorities for defending your organisation going forward.
    Attend this webinar to learn how attackers are:
    •Using major malware types and their innovative tactics, techniques, and procedures
    •Intensifying credential theft as organizations move infrastructure and applications to the cloud
    •Evolving Emotet and the threat actors behind the botnet
    •Increasing proliferation of sextortion phishing emails

    We’ll examine the obvious changes in the phishing threat landscape, plus look ahead at trends shaping 2019.
  • DNS as a Foundation Security Architecture for Digital Transformation May 21 2019 12:00 pm UTC 60 mins
    Lee Clark, System Engineer, Infoblox, Brandon Dunlap, Moderator, (ISC)²
    Today, your users directly access cloud applications from everywhere. Transformative technologies such as SD-WAN, IoT and the cloud are borderless and complicate security. Non-standard IoT devices using non-standard protocols are rapidly proliferating. And yet, securing your digital transformation doesn’t require a new tool.

    Instead, it takes a simple, scalable and integrated security solution that makes your existing security infrastructure smarter and more efficient. DNS is foundational to the Internet and IP-based communication. It is also the perfect foundation for security: simple to deploy, ubiquitous in networks, essential for connectivity and scalable to Internet size.

    Join this webinar to learn how using DNS as a foundational security architecture can:
    • Protect your brand by securing traditional networks and digital transformations
    • Reduce time and cost of defending your enterprise against threats
    • Detect and remediate problems automatically and provide data to the entire ecosystem
  • The Next Paradigm Shift – AI-Driven Cyber-Attacks Recorded: May 14 2019 60 mins
    Max Heinemeyer, Director of Threat Hunting, Darktrace, Brandon Dunlap, Moderator, (ISC)²
    Every day, security professionals around the globe face advanced cyber-threats, ranging from opportunistic malware to targeted, human-driven attacks. As we enter a new era of AI attacks that are hyper-stealthy and self-masking, how can organizations adapt their defenses? Join Darktrace’s Director of Threat Hunting, Max Heinemeyer, as he shares expert insights on the future of AI-driven cyber-attacks and the need for AI that fights back.

    In this webinar, Max will:
    · Present three scenarios of advanced cyber-attacks
    · Illustrate how these sophisticated attacks can be supercharged with AI
    · Explore the critical importance of deploying AI to prepare for this paradigm shift in the threat landscape
  • CASB Fundamentals: How Leading Organisations Protect Sensitive Cloud Data Recorded: May 7 2019 59 mins
    Rich Campagna, Bitglass, Steve Armstrong, Bitglass, Brandon Dunlap, Moderator, (ISC)²
    As more organisations deploy cloud apps like Office 365, AWS, and Slack securing corporate data becomes a challenge. Cloud Access Security Brokers (CASBs) have emerged as the go-to solution for organisations that need end-to-end data security, from cloud to device. In fact, Gartner believes that by 2022, 60% of large enterprises will use a CASB to govern some cloud services.

    In this webinar, we'll explore:
    •Critical gaps in cloud applications that must be filled
    •The 4 pillars of CASB
    •What makes CASBs different from security solutions built natively into cloud apps like Office 365.
    •Case studies on how leading enterprises leverage CASB to secure their cloud footprint.

    Join us to learn how a CASB can help you meet your security and compliance requirements.
  • CISO Says with Abeer Khedr, Information Security Dir. at National Bank of Egypt Recorded: May 2 2019 56 mins
    Abeer Khedr, InfoSec. Dir. at National Bank of Egypt, Brandon Dunlap, Moderator, (ISC)²
    In the CISO Says Series, information security leaders share their experiences of what it means to be responsible for establishing and maintaining an enterprise's security vision and strategy in an interview format.

    In this session Abeer Khedr, Information Security Director at the National Bank of Egypt will provide insight into the path she took to become a Cybersecurity Leader and how she is reinventing the role in the face of accelerating industry change.
  • Top Tips on Combatting Today’s Active Attacker Recorded: Apr 23 2019 59 mins
    John Titmus, Director, EMEA Cyber Security Expert, CrowdStrike, Brandon Dunlap, Moderator, (ISC)²
    Key Trends, Predictions and the Need for Speed.

    This year’s CrowdStrike global threat report – Adversary Tradecraft and The Importance of Speed – is one of the industry’s most comprehensive reports on today’s leading cyber threats. It combines CrowdStrike’s comprehensive global observations with real-world case studies, delivering deep insights on modern adversaries and their tactics, techniques and procedures (TTPs).

    Join us for a webcast featuring CrowdStrike’s John Titmus as he explores the global trends and observations the report reveals.

    -Learn from real-world examples of how cybercriminals combine advanced, targeted attack techniques with ransomware to cause massive financial loss
    -Gain insight into global ‘breakout time’ metrics and achieving the “1-10-60” rule to defeat adversaries and prevent a mega-breach
    -Prepare for the now: discover the favourite TTPs seen over the last 12 months to predict what you should expect to see in 2019
  • Understanding Security Performance with Peer Analytics Recorded: Apr 9 2019 47 mins
    Miguel Pinto, Senior Product Manager at BitSight, Brandon Dunlap, Moderator, (ISC)² EMEA
    BitSight’s Peer Analytics allows organisations to understand their security programme performance at a more granular level, providing visibility to develop achievable improvement plans, allocate resources appropriately & consistently measure outcomes.

    In this session you will learn how to:
    • Determine the level of security performance that your company should attain to be ‘best-in-class’
    • Profile organisations for communication and benchmarking purposes.
    • Understand how specific risk vectors drive security performance.
    • Determine the initial conditions for BitSight Forecasting
  • Your Guide to (ISC)² Membership in EMEA: Benefits, Maintenance and Opportunities Recorded: Apr 2 2019 60 mins
    (ISC)² Membership Team
    Join the Guide to Your (ISC)² Membership in EMEA webinar to learn more about these topics and others including:

    - CPE opportunities, member benefits and getting involved
    - Updates on (ISC)² news, developments and changes in your region
    - Your membership requirements summarized
    - Who are the (ISC)² EMEA team and how we can help you
    - Focus discussions
    - Q&A session
  • Active EDR - Automated Investigation with Artificial Intelligence Recorded: Mar 26 2019 58 mins
    Jared Phipps, VP Worldwide Sales Engineering, SentinelOne, Brandon Dunlap, Moderator, (ISC)²
    If you ask Gartner about the problems with today’s EDR technologies, they will say most solutions don’t deliver EDR capabilities in an operationally feasible or complete manner.

    The purpose of an EDR solution is to provide advanced detection & response capabilities to complement an EPP solution. At SentinelOne, we deliver the very best of EDR & EPP in a highly differentiated manner and in one single lightweight agent.

    Join us and learn about a new EDR- Active EDR - a new world of EDR capabilities and user experience. Explore how to:

    - Eradicate benign alert noise, focus on what’s important.
    - Optimise threat hunting time with curated and focused story lines.
    - Maximise staff efficiency and let staff become expert threat hunters.
  • The Advantages of Filtering Applications Recorded: Mar 19 2019 55 mins
    Ollie Sheridan, Principal Engineer Security, Gigamon, Brandon Dunlap, Moderator, (ISC)²
    Traditional methods of filtering traffic have relied upon a knowledge of the network and transport behaviours of the applications running across the network. Whilst most applications being run across the network use standard ports, many threat actors will use methods to obfuscate their communications by abusing these standards, with port spoofing being one such example. This represents a challenge when gathering traffic to ensure that this simple evasion method does not create a blind spot to your security countermeasures.

    Join us for this webinar to learn more about how you can:

    •Ensure that the Application traffic regardless of port spoofing gets to the right tool
    •Improve tool efficiency by discarding irrelevant Application traffic
    •Filter the traffic based on the application rather than the IP & Port
  • From Liability to Asset: The Role of DNS in Your Security Architecture and Ops Recorded: Mar 12 2019 50 mins
    Steven Tee, Senior Systems Engineer, Infoblox, Brandon Dunlap, Moderator, (ISC)²
    DNS is a ubiquitous network service which has a front row seat when it comes to malware activities. Most organizations neglect to consider the scale and simplicity of using DNS as a visibility and control point. DNS servers are also home to a wealth of essential operational data that can accelerate incident investigation.
    This session will discuss the role that DNS could and should play in security architecture and operations as well as identify how DNS itself is increasingly used as an attack vector by malicious actors.
  • How to Gain Visibility into Encrypted Threats Recorded: Feb 26 2019 58 mins
    Brandon Dunlop, Moderator, (ISC)², David Warburton, Senior Threat Research Evangelist, F5 Labs
    Encrypting data-in-transit with SSL/TLS is standard practice among organisations today. Important security initiatives, such as built-in web browser warnings and stronger legislative GDPR changes, have significantly improved privacy awareness and helped to prevent data breaches. However, cybercriminals commonly hide threats within encrypted payloads and use encrypted channels to propagate malware and exfiltrate data, knowing they can bypass traditional security inspection solutions.

    Join us for this webinar to learn more about:

    • Challenges with encrypted traffic and risks to your business
    • How to efficiently decrypt and orchestrate traffic to reduce latency
    • How to intelligently manage decryption and re-encryption across your entire security inspection solutions (IPS, NGFW, DLP, WAF, Anti-Malware, etc.)
  • New Year, New Phishing Threats: 10 Resolutions To Keep You Safe & Secure Recorded: Feb 19 2019 62 mins
    Brandon Dunlap, Moderator, (ISC)², David Mount, Cofense, Mollie MacDougall, Cofense
    New year. New resolutions. Every year we make the pledge to eat healthier and exercise more. What is good for the waistline is also good for your phishing defense posture. With more than 90% of breaches attributed to successful phishing campaigns – now is the time to think about how to prepare and prevent attacks. In this session you’ll hear about 10 resolutions for your phishing defense programs that will make your organisation more secure.
    Some of the topics covered include:
    - How to empower humans to be part of the solution
    - Best practices to balance automation with human intuition
    - How the latest features and technologies can make your life easier
  • 20 SIEM Use Cases in 40 Minutes: Which Ones Have You Mastered? Recorded: Feb 12 2019 62 mins
    Brandon Dunlop, Moderator, (ISC)², Matthias Maier, EMEA, Director of Product, Splunk
    Every organisation can, and at some point will be breached. Gone are the days where investing only in preventive security technologies such as firewalls, endpoint protection and proxy servers were considered ‘state-of-the-art’. Instead, security best practices have evolved to build capabilities that detect attacks early, and to respond if all detection and prevention measures have failed. Today’s modernised approach is essential in helping the business recover quickly after a major attack - and helping the CISO keep their job.

    So, your technologies have evolved, but has your approach to data collection? Do you have the right data for detection and response - or do you need to adapt for the future?

    Join this webinar with Splunker, Matthias Maier to walk through 20 security use cases already used by leading organisations. You’ll hear the most relevant questions for each use case, and discover which device or application within your infrastructure can be used to find the answers. Forty minutes later, you’ll be set to take away your learnings, validate them in your own environment, and identify the most relevant gaps that need to be addressed for your business.
  • How Malware Affects Your Security Rating And What To Do About It Recorded: Feb 5 2019 56 mins
    Brandon Dunlap, Moderator, (ISC)², Tiago Pereira, Team Lead, BitSight Technologies
    Security incidents such as malware infections can cause damage and disruption that propagates far beyond the organisation, affecting its reputation, brand value and customer loyalty.

    Security ratings are impacted by these, giving an independent view into potential areas where security resources could be focused.

    In this webinar, Tiago Pereira from BitSight will explain how and why botnet infections are a key metric of the effectiveness of your security posture, discuss their impact on external security ratings and how to effectively deal with infections affecting your organisation's rating.
  • Guide to your (ISC)² Membership in EMEA: Benefits, Maintenance & Opportunities Recorded: Jan 31 2019 61 mins
    (ISC)² EMEA Membership Team
    Join the Guide to Your (ISC)² Membership in EMEA webinar to learn more about these topics and others including:
    - CPE opportunities, member benefits and getting involved
    - Updates on (ISC)² news, developments and changes in your region
    - Your membership requirements summarized
    - Who are the (ISC)² EMEA team and how we can help you
    - Focus discussions
    - Q&A session
  • Wide Open: How Firms Are Failing To Protect Their Digital 'Crown Jewels' Recorded: Jan 29 2019 60 mins
    Moderator: Brandon Dunlap, (ISC)², Speakers: Martin Veitch, IDG Connect, David Higgins, CyberArk
    Organisations today rely on their business-critical applications and literally cannot function without these systems. They are the heartbeats and nerve centres of the modern enterprise, the fulcrums on which supply chains, operations, accounting, HR, payroll and e-commerce depend. No wonder then that these tools and the data they generate are also being targeted by attackers keen to bring their targets to a standstill. But most of time companies are failing to protect these ‘crown jewels’ assets and they rely instead on a paradigm from the last century: focusing on perimeter security and generic defences that don’t prioritise or protect the most important tools and services.

    Tune in to this webcast to hear about exclusive new research data on the state of modern security defences and get expert advice on how to protect your most important systems.
  • Infoblox Part 1: Remediating Threats by Bridging Islands of Security Recorded: Jan 22 2019 57 mins
    Brandon Dunlap, Moderator, (ISC)². Chris Marrison, System Engineer, Infoblox
    Most organisations have multiple products and services, from multiple vendors and suppliers to address their cybersecurity needs. The lack of integration and inability to share critical information results in silos of technology that cause inefficiency, lack of agility, limited visibility and a poor security posture. How can an organisation solve and streamline this improve their cybersecurity operations? Join Infoblox and (ISC)² for an examination of how Infoblox and Fortinet have joined together to assist organisations in improving their security operations and reducing time to containment.
(ISC)² Secure Webinars - EMEA
Forming part of the (ISC)² commitment to Inspiring a Safe and Secure Cyber World, we welcome you to the (ISC)² Secure Webinars - EMEA Channel. Sign up to join us for educational Security Briefings, Roundtables and eSummits aimed at all those vested in the world of information security. We welcome members and non members alike.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Advantages of Filtering Applications
  • Live at: Mar 19 2019 1:00 pm
  • Presented by: Ollie Sheridan, Principal Engineer Security, Gigamon, Brandon Dunlap, Moderator, (ISC)²
  • From:
Your email has been sent.
or close