The Impact of Artificial Intelligence on Endpoint Protection
Learn how next-generation endpoint technologies can prevent up to 99.4% of all attacks. In addition, you’ll receive information about how to build a better, more advanced threat prevention program with the fundamentally different approach of artificial intelligence and machine learning solutions.
RecordedFeb 22 201757 mins
Your place is confirmed, we'll send you email reminders
As the frequency and sophistication of cyber attacks intensify, ensuring the effectiveness of your security protocol is a critical corporate pursuit. To help you distinguish whether your solution is up to the task, download the Ten Signs It’s Time to Review Your Endpoint Protection infographic Filled with clearly defined criteria that distinguish up-to-date from simply dated, it’s a comprehensive reference that will help you ensure your security protocol is offering true protection for you, your business, and your employees.
Anthony Paimany, BlackBerry Attack Simulation Practice Director
Threat actors are continually improving their attacks, introducing tactics, techniques, and procedures (TTPs) that are explicitly designed to evade defenses and compromise your critical system and data assets. To protect yourself, it’s essential to test your defenses under realistic conditions to identify critical gaps in your prevention, detection, and response capabilities.
Join us for the launch of our new Attack Simulation Service and learn how BlackBerry Red Team experts can help you prevent real-world threat actors from achieving their attack objectives and impacting your organization.
As a former CISO, Roger has borne witness to a multitude of changes within our industry many of which have significantly transformed the way that we work. During this 30-minute webinar we will guide you through the acquisitions of Cylance and Good Technologies by BlackBerry and share our journey from leading mobile manufacturer to visionary technology provider, allowing businesses to transform and empower a secure, connected environment.
Leman Logistics Information Security Officer Claus Hansen, BlackBerry Daniel Nielsen and Henrik Akerstrand
We reviewed the findings of the commissioned Total Economic Impact™ study that analyzed the benefits, costs, and risks of adopting BlackBerry Cylance cybersecurity solutions. We are joined by Claus Hansen, Information Security Officer with the Danish Logistics company, LEMAN, who shared his own experience introducing and maintaining a NextGen Endpoint Security Solution.
Understanding the security events of 2019 is critical for successfully implementing cybersecurity strategies in 2020. Join the threat researchers and analysts at BlackBerry Cylance for an in-depth overview of the current state of cybersecurity.
Rich Thompson, VP Sales Engineering and Marc Doniger, VP SLED
This past year, more than 100 state and local governments and educational (SLED) institutions across the United States learned how defenseless traditional endpoint protection solutions are against ransomware attacks. Despite the overwhelming trend, prevention of successful cyber attacks in the growing attack surface of connected schools and entities is possible.
Join us to learn how SLED organizations can prevent ransomware from breaching their defenses with artificial-intelligence-based security solutions from BlackBerry Cylance.
Dave DeWalt, Founder & CEO NightDragon Security and Robert Slocum, Senior Product Marketing Manager BlackBerry
Join BlackBerry for an in-depth look at the topics and events that dominated RSA 2020. The Reflecting on RSA 2020 on-demand webinar is now available. Special guest NightDragon Security Founder and CEO Dave DeWalt and BlackBerry Senior Product Marketing Manager Robert Slocum cover several important industry-related topics including:
• How the Novel Coronavirus (COVID-19) impacted RSA vendors and attendees
• Where current market opportunities exist in cybersecurity
• Endpoint security in a world where endpoints move beyond network perimeters
• The danger of vulnerabilities in communications satellites
• How supply chains, limited technical resources, and government intervention contribute to an insecure IoT
• Why the most successful attack vector relies on predicting human behavior
• The future and longevity of cybersecurity jobs
The Reflecting on RSA 2020 on-demand webinar is packed with valuable information you don’t want to miss.
BlackBerry Cylance Senior Product Marketing Manager Bob Slocum
As the frequency and sophistication of cyber attacks intensify, ensuring the effectiveness of your security protocol is a critical corporate pursuit. To help you distinguish whether your solution is up to the task, download our infographic, Ten Signs It’s Time To Review Your Endpoint Protection. Filled with clearly defined criteria that distinguish up-to-date from simply dated, it’s a comprehensive reference that will help you ensure your security protocol is offering true protection for you, your business, and your employees.
John McClurg, CISO; Greg Silberman, VP & Deputy General Counsel; Eric Milam, VP Research Ops; Sig Murphy, Sr Dir Prof Srvcs
What challenges will 2020 hold for cybersecurity? Our BlackBerry Cylance experts shared their insights on the future threat landscape and what organizations can do to better protect themselves.
Our panel discussed a wide range of security challenges facing organizations in 2020. The conversations included:
- The evolution of spear phishing, ransomware, and crimeware-as-a-service
- Privacy and security concepts, including AI, facial recognition, and mobile threats
- The role of regulators and their impact on your organization
- Priority targets for threat actors in 2020, including MSP attacks
BlackBerry Cylance Staff Data Scientist Michael Slawinski and Security Engineer Josh Fu
In the near future, threat actors will begin utilizing artificial intelligence (AI) to craft malware that’s been expressly designed to evade your next-gen cyber defense.In this session, BlackBerry Cylance Staff Data Scientist Michael Slawinski and Security Engineer Josh Fu reviewed the current state of AI, assessed AI’s future, and considered the central role cyber resilience will play in the arms race between attackers and defenders.
Brian Robison, BlackBerry Cylance Chief Evangelist
Take a closer look on how to protect your organization from the various types of fileless attacks. These threats require a stronger response than traditional, file-based, antivirus countermeasures can provide. BlackBerry Cylance has engineered several tools and techniques capable of preventing fileless threats from executing.
Are you concerned about security incidents in your business, their impact, and having the appropriate resources required to respond when they happen? Do you want actionable intelligence to prevent threats quickly, while minimizing alert fatigue and not requiring additional resources?
Learn about CylanceGUARD™, a new subscription-based managed detection and response solution that leverages our award-winning native AI platform and the 24x7 support of a world-class team of incident response and prevention experts.
Brian Winkler, Sr. Federal Solutions Engineer and John Wood, Director Incident Response
Preventing attacks against government agency networks can be a costly and resource-intensive endeavor, but the cost of a successful breach can be far worse by impacting critical infrastructure and undermining public trust. See how BlackBerry Cylance can prevent advanced threats that traditional AV cannot. We are certified to deploy CylancePROTECT's revolutionary AI-based agent through cloud-managed architecture for the U.S. government.
Find out how BlackBerry Cylance IR consultants can minimize your organization’s time-to-respond and post-incident risk exposure. Join BlackBerry Cylance as we share findings from The Forrester Wave™: Cybersecurity and Incident Response, Q1 2019 report.
- How Forrester Research rates BlackBerry Cylance as a provider of cybersecurity and IR services.
- Why next-gen IR solutions must incorporate sophisticated AI and automated response capabilities to be effective
- IR best practice approaches and methodologies.
- How BlackBerry Cylance IR consultants leverage our native AI platform to rapidly contain, remediate, and prevent incidents.
Aditya Kapoor, Sr Dir Research & Intelligence / Tom Bonner, Dir Threat Research, EMEA / Jim Walter, Sr. Security Researcher
The BlackBerry Cylance 2019 Threat Report Highlights webinar features an examination our conclusions with the researchers and analysts who authored the report. It is an in-depth look at the cybersecurity trends, topics, and innovations that dominated the past year. Our panel of experts offer additional insight into the discoveries drawn from our internal data, customer communications, threat research, and intelligence efforts.
Malcolm Harkins, Chief Security and Trust Officer; Corey White, Sr. VP, Global Consulting Services, ThreatZERO and Education
Learn how Cylance can help your organization meet the challenges posed by today’s increasingly virulent threat environment. Our Virtual Chief Information Security Officer (vCISO) service augments your team with seasoned security experts to who can help plan, prioritize, and implement security best practices, comply with state and federal cybersecurity laws, as well as continually manage risk efficiently to reduce impact to the business using prevention-first methodologies.
Brian Robison, BlackBerry Cylance Chief Evangelist
How easily can adversaries bypass your next-gen AV? Find out by attending BlackBerry Cylance’s special two-part Hacking Exposed webinar series.
Part 1: Hacking Exposed; Bypassing Next-Gen. Chief Evangelist Brian Robison will provide a live demonstration of the hacking tools and techniques adversaries are now using to evade Next-Gen AV. He’ll examine a variety of file-based and fileless methods, including memory exploits, living-off-the-land attacks, script- and application-based attacks, and more.
Part 2 – BlackBerry Cylance vs. Hacking Exposed. Brian will return to demonstrate how our AI-based EDR platform stops these same attacks cold, before they can execute and compromise your systems.
President Stuart McClure and Chief Evangelist Brian Robison
View the recording of this live Cylance vs. Hacking Exposed: Obfuscation and Weaponization webinar to learn how Cylance’s technology prevents sophisticated threats, no matter how well they’re obfuscated, initiated by routine system services, or concealed within weaponized documents. See for yourself why a prevention-first security posture is not only practical, but also the most effective way to minimize your organization’s risks of being breached or compromised.
Corey White, SVP of Global Consulting and Sig Murphy, Consulting Director, Western North America
Traditional incident response relies on antiquated methods like manually searching for threats using signatures and indicators of compromise. These legacy processes focus on responding and monitoring existing attacks, but do little to immunize systems against future attacks. Corey and Sig demonstrate a better way to conduct your incident response using AI-based methodologies aimed at containment and prevention.
Cylance® is revolutionizing cybersecurity with products and services that proactively prevent execution of advanced persistent threats and malware, enabling a level of security that far exceeds the effectiveness of solutions deployed throughout enterprises, government and institutions worldwide. Cylance’s award-winning product, CylancePROTECT® stops what others don’t, without requiring a cloud connection or frequent updates, all while using a fraction of the system resources associated with legacy antivirus software. Visit www.cylance.com for more information.
The Impact of Artificial Intelligence on Endpoint ProtectionChris Sherman, Senior Analyst at Forrester Research & Malcom Harkins, Chief Security and Trust Officers at Cylance[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]56 mins