Hi [[ session.user.profile.firstName ]]

Endpoint Security: The Final Frontier

Whether it is a new ransomware campaign or stealthy targeted attack, your endpoints are being attacked and are often the last line of defense in your fight against the cybercriminals. In this webinar, you will understand how endpoints are the final frontier for security and how you must be resilient in using the latest prevention and protection technologies.

Learn how the power of machine learning and artificial intelligence are changing the endpoint protection landscape. Gone are the days of daily signature updates, maxed out performance impact, and the lack of security effectiveness against both known and unknown threats. It is time explore the new world of endpoint security.
Recorded Nov 16 2017 46 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ed Metcalf, Senior Director Product Marketing, Cylance
Presentation preview: Endpoint Security: The Final Frontier

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Top Cybersecurity Predictions for 2019 Recorded: Jan 17 2019 63 mins
    Brian Robison, moderator with expert panelists: Ryan Permeh, Greg Silberman, Steve Mancini and Scott Scheferman
    Cylance® Chief Evangelist Brian Robison hosts a panel of seasoned Cylance leaders in discussion about what your organization should expect in the year ahead. They cover a wide range of topics, including predictions about the future threat landscape, new and emerging business and technology investment priorities, and what organizations can do to better protect themselves in 2019.
  • Hacking Exposed: Testing Defenses Recorded: Nov 15 2018 56 mins
    Brian Robison, Chief Evangelist at Cylance
    The previous Hacking Exposed episodes introduced you to many of the tools and techniques real-world adversaries use to evade endpoint security products. We will put these concepts into practice and conduct full-scale, multi-phased, endpoint compromises. The techniques and tactics you will learn in this Hacking Exposed session will provide valuable tools for testing the effectiveness of your current defenses.

  • The Evolution of Endpoint Detection and Response Recorded: Oct 4 2018 52 mins
    Fernando Montenegro, 451 Research and Ed Metcalf of Cylance
    Endpoint Detection and Response products were introduced to the market in the early 2010’s and have focused on detecting signs of a compromised system by recording behaviors then alerting humans. Unfortunately, the scale and pace of attacks often overwhelm even the best security analysts and teams.

    As technology improves, new approaches to performing endpoint detection and response emerge. Artificial Intelligence and Machine Learning are new technologies that have been succesfuly applied to the traditional anti-virus problem of detecting “infected” or malicious files without the need for manually created signatures. It is now possible to extend this technology to the problem of detecting, and preventing attacks based on the new techniques that do not rely on infected files, but rather on the malicious behavior of systems regaurdless of the technique used for the attack.

    Join Fernando Montenegro of 451 Research and Ed Metcalf of Cylance for this webinar about how endpoint detection and response can evolve by incorporating newer capabilities, and better support defenses in the modern threat environment.
  • Cylance and Amar Singh at Infosecurity Europe 2018 Recorded: Jun 19 2018 9 mins
    Amar Singh (Cyber Management Alliance) | Matt Stephenson (Cylance)
    Join Matt Stephenson, Cylance and Amar Singh, Cyber Management Alliance live from Infosecurity Europe 2018
  • [Webcam Panel] Trends Discussed at Infosecurity Europe 2018 Recorded: Jun 13 2018 57 mins
    Amar Singh (Cyber Management Alliance) | Matt Stephenson (Cylance) | Danny Eastman (Cyber Fortified) | Paul Simmonds (CSA)
    Join this post-conference panel for an in-depth look into the biggest trends and cyber threats covered during the Infosecurity Europe 2018 conference in London.

    Tune in for an interactive Q&A panel with industry experts as they discuss:
    - What are the biggest threats to security in 2018?
    - Key steps to take today to better secure your critical data assets
    - Top technological advancements powering security
    - CISO strategy in the age of breaches
  • Red Team Exercises: How to Defend Against Cyber Attacks Recorded: Apr 19 2018 41 mins
    Anthony Paimany, Principle Red Team Consultant at Cylance®
    Defending from increasingly advanced and targeted cyberattacks is a constant challenge. Organizations need to gain a true understanding of their network security gaps and vulnerabilities from the perspective of an attacker in order to better address the risk these gaps and vulnerabilities can place on their operations.

    Join Anthony Paimany, Principle Red Team Consultant at Cylance®, as he demonstrates how cyberattacks are executed to test assumptions at every level of detection and response and discusses:

    - Cyberattackers’ primary tools, techniques, and procedures
    - How to determine gaps in defensive controls
    - How to identify and prioritize these risks through penetration tests, assessments, and social engineering
  • The Role of Machine Learning In Improving Endpoint Security Recorded: Nov 17 2017 4 mins
    Doug Cahill, ESG Senior Analyst
    Listen to the new survey findings from Enterprise Strategy Group (ESG) to gain insights on the threat landscape and what your IT peers deem as the top cybersecurity concerns. Bad actors focus their energy on developing sophisticated attacks. In fact, 46% of organizations have been the victim of ransomware in the last year.

    Learn more about their top concerns and how they’re turning to machine learning as a strategic technology to prevent future infections.

    The video was commissioned by Cylance and is being distributed under license from ESG.
  • Endpoint Security: The Final Frontier Recorded: Nov 16 2017 46 mins
    Ed Metcalf, Senior Director Product Marketing, Cylance
    Whether it is a new ransomware campaign or stealthy targeted attack, your endpoints are being attacked and are often the last line of defense in your fight against the cybercriminals. In this webinar, you will understand how endpoints are the final frontier for security and how you must be resilient in using the latest prevention and protection technologies.

    Learn how the power of machine learning and artificial intelligence are changing the endpoint protection landscape. Gone are the days of daily signature updates, maxed out performance impact, and the lack of security effectiveness against both known and unknown threats. It is time explore the new world of endpoint security.
  • Protecting Against Fileless Malware Recorded: Sep 21 2017 60 mins
    Chad Skipper, VP Industry Relations & Product Testing & Brian Robison, Sr. Dir., Security Technology
    How do you defend your enterprise against cyberattacks that don’t use disk-based files but, instead, execute their payloads using machine memory? This attack vector, fileless malware, requires an innovative solution that goes beyond signature-based antivirus tools.

    In this webinar, you will learn about the dangers of fileless malware and how CylancePROTECT® uses memory protection and script control to prevent advanced threats from executing on your organization’s endpoints in real time.

    Watch this webinar to:

    •Educate yourself on this attack technique and how it is impacting businesses worldwide
    •Watch a live demo of CylancePROTECT preventing fileless malware attacks
    •Understand how CylancePROTECT uses multiple protection elements to defend endpoints from advanced exploitation and evasion techniques.
  • Lessons from the Equifax Data Breach for Improving Cybersecurity Recorded: Sep 19 2017 54 mins
    Brian Robison (Cylance), Michael Davis (CounterTack), Stephan Chenette (AttackIQ), Kevin Flynn (Skybox Security)
    Join this interactive Q&A panel to discover the biggest lessons of the recent Equifax breach and how to apply them toward improving your and your organizations cyber security.

    Viewers will learn:
    - The magnitude of the impact of this breach across consumers and industries
    - The true costs of a breach
    - How to discover if your personal information has been exposed and what you can do about it
    - What to expect in terms of cyber threats in the future
    - How can to protect your data and secure your organization
    - Expert recommendations on improving breach protection, detection and response

    Speakers:
    - Brian Robison, Sr. Director of Security Technology, Cylance
    - Stephan Chenette, CEO, AttackIQ
    - Michael Davis, CTO, CounterTack
    - Kevin Flynn, Global Director of Products, Skybox Security
  • The CISO Speaks: How a Big Hospital Beat Ransomware Recorded: Jul 18 2017 53 mins
    Malcolm Harkins, Chief Security and Trust Officer at Cylance®, and Daniel Shuler, CISO at Phoenix Children’s Hospital
    This webinar discussion is a discussion with Malcolm Harkins, Chief Security and Trust Officer at Cylance®, and Daniel Shuler, CISO at Phoenix Children’s Hospital.

    Cylance customer Daniel Shuler is responsible for securing 5,000 endpoints across 20 sites for the Phoenix Children’s Hospital. Hear Daniel and Malcolm discuss the deployment of a real-world security strategy that enabled the hospital to reach the state of prevention and successfully deflect a ransomware attack.

    “CylancePROTECT® outperformed others we’ve seen and experienced,” – Daniel Shuler.

    During the webinar, Malcolm and Daniel discuss:
    1. The Security Concerns for a Large Hospital
    2. How To Get Started with a Prevention Strategy
    3. What To Expect from Artificial Intelligence Driven Endpoint Security
    4. Inside a Ransomware Attack

    Register now to listen to this discussion with security experts.
  • NotPetya Attack - Cybercrime or Cyberwar? Recorded: Jul 12 2017 64 mins
    Malcolm Harkins (Cylance), Erika Noerenberg (LogRhythm Labs), Nadir Izrael (Armis), Michael Landewe (Avanan)
    The NotPetya pandemic that started in late June and disrupted the operations across companies, utilities, government agencies across France, Russia, Spain, Ukraine and the United States, happened just weeks after the WannaCry ransomware attack. Was NotPetya a financially motivated ransomware attack or an act of cyberwar?

    Join this interactive Q&A session with industry experts and find out the answers to your Petya/NotPetya questions. The topics up for discussion will include:
    - Difference between cybercrime and cyberwar
    - Industries targeted in the NotPetya attack
    - Short-term and long-term impact of this attack
    - Requirements and recommendations for strengthening cyber defense

    Speakers:
    - Malcolm Harkins, CSO of Cylance
    - Erika Noerenberg, Threat Research Engineer, LogRhythm Labs
    - Nadir Izrael, CTO of Armis

    Moderator:
    - Michael Landewe, Co- Founder of Avanan Cloud Security
  • Dissecting the OPM Breach: How AI and Threat Hunting Removed the APT Recorded: Jun 15 2017 50 mins
    Thomas Pace, Director of Consulting Services at Cylance®
    The 2015 data breach at the U.S. Office of Personnel Management (OPM) was a defining moment for the federal government, as it continues to reel from the colossal theft of personnel information affecting 21.5 million individuals. Join us for an insightful discussion to understand more about this massive cyberattack in our webinar, “Dissecting the OPM Breach. How Artificial Intelligence and Threat Hunting Removed the APT.”

    During the webinar Thomas Pace, Director of Consulting Services at Cylance®, will walk you through the course of events that led up to the OPM breach, expose the motivation behind the attack, and project its probable long-term impacts on how the U.S. government evaluates its IT and security strategy.

    Thomas will review the role Cylance played in responding to the breach by explaining the tools and processes that Cylance utilized to quickly detect and remove the malware from over 10,000 machines. You’ll also get an inside look at how the lessons learned can help your organization to better prepare against and prevent security vulnerabilities.

    Register for the webinar to learn more about:

    •The evolution of the threat landscape during the past two years
    •The value of having incident response processes and products in place before an incident occurs
    •The inefficiencies of legacy antivirus solutions
    •The benefits of artificial intelligence-based malware detection
  • GDPR: Why Proactive Prevention Delivers More Than Compliance Recorded: May 25 2017 55 mins
    Duncan Brown, Associate Vice President at IDC and Dr. Anton Grashion, Senior Director Product Marketing EMEA at Cylance ®
    On 25th May, with just 12 months before the EU General Data Protection Regulation (GDPR) comes into force, it’s time to take the GDPR debate ‘Beyond Compliance’ to explore the true value of proactive prevention.

    With a data breach setting off a chain reaction of escalating costs, damaged reputations, and future business loss, join Duncan Brown, Associate Vice President at IDC and Dr. Anton Grashion, Senior Director Product Marketing EMEA at Cylance ®, to discuss the power of prevention.

    Taking you behind the headline-making fines, and rising above the process minutia, the webinar explores the fundamental point that being GDPR compliant doesn’t reduce your risk of a data breach.

    It will show that, by addressing the problem GDPR is designed to eliminate – the breach itself – organisations can maximise the value of their compliance investments.

    How can you rebalance GDPR planning in the next 365 days to fulfill remediation requirements and bolster breach prevention strategies?
  • Securing O365 Using AI-based Advanced Threat Protection Recorded: May 24 2017 40 mins
    Mike Bruchanski, Director of Product Management - Platform, Cylance & Karthik Venna, Product Manager, Bitglass
    Office 365 has garnered widespread adoption from enterprises due to its advantages such as ease of deployment, lower TCO, and high scalability. Additionally, it enables end-users to work and collaborate from anywhere and on any device. Although Office 365 enables IT to shift the burden for app and infrastructure to the cloud vendor, data security remains the responsibility of the enterprise. Given the limitations of native malware protection on Office 365, should the enterprise rely on Office 365 to protect their data from malware and ransomware?

    Join Bitglass and Cylance for a discussion on malware protection solutions for Office 365. We will cover the limitations of native Office 365 malware protection as well as the benefits of AI and machine learning based approaches. We will wrap up the session by discussing how CASBs, with Advanced Threat Protection (ATP) capabilities, are uniquely positioned to protect cloud apps and end-points from malware attacks and proliferation.
  • WannaCry Is No Match for AI: Cylance Prevents Ransomware Recorded: May 19 2017 53 mins
    Tom Pace, Dir., Consulting Services, Brian Robison, Sr. Dir., Technical Marketing, Ed Metcalf, Sr. Dir., Product Marketing
    The WannaCry ransomware attack has taken the world by storm, hitting more than 150 countries at last count. The most widespread and fastest-moving cyberattack in history, it paralyzed businesses, hospitals, and other critical services worldwide within a matter of hours.

    In this webinar, our experts investigate how WannaCry became one of the most impactful malware campaigns in history, uncover the technical aspects of the malware, and show a demo of Cylance® in action, blocking a ransomware attack using artificial intelligence and machine learning based endpoint security.

    During this webinar, Ed, Brian and Tom discuss:
    • WannaCry: Origin and Impact
    • Anatomy of WannaCry: How It Works
    • Protection from WannaCry: What To Do Now
    • Cylance in Action: Preventing a WannaCry Attack
    • View the webinar replay to learn more about the impact of WannaCry.
  • How Cylance Prevents Ransomware Attacks Recorded: May 4 2017 56 mins
    Brian Robison, Senior Director, Technical Marketing at Cylance®
    Many of our customers sought out Cylance because it is highly effective in preventing ransomware attacks. We have learned firsthand how ransomware is affecting organizations of all sizes, and across all industries. In this live demonstration, Brian Robison, Senior Director, Technical Marketing at Cylance® will show how ransomware works. He will launch several attacks on unprotected machines to deliver a real-world view into how ransomware compromises systems, and how Cylance prevents ransomware attacks.

    Brian will provide a live demonstration of CylancePROTECT® blocking attacks, and will discuss:

    •Different ransomware types
    •Delivery methods, including drive-by downloads and fileless malware
    •Why launching attacks is cheap and easy with ransomware-as-a service
    •How Cylance prevents both file-level and disk-level encryption
  • Top Reasons Why Your Antivirus Isn’t Working Anymore Recorded: Mar 23 2017 68 mins
    Ed Metcalf, Director of Product Marketing and Brian Robison, Senior Director of Field Technical Marketing at Cylance
    Are you weary from fighting malware, ransomware, and other threats that your ineffective and tired antivirus software can’t stop?

    If so, join us for our webinar, “Top Reasons Why Your Antivirus Isn’t Working Anymore” to hear why it’s time to rise up and overthrow traditional, reactive antivirus solutions in favor of proactive endpoint protection powered by artificial intelligence (AI).

    During this webinar, you will see a live demo of AI in action with CylancePROTECT®, and cover the key reasons why your current antivirus solution probably isn’t working anymore:

    - It’s Reactive: Legacy, signature-based antivirus products cannot prevent malware from executing. Cylance AI technology protects before the machine is infected.
    - It’s Ineffective: Legacy security tools perform at a 70 – 90% success rate. Cylance routinely performs with near perfect efficacy, at 99%+.
    - It’s Burdensome: On average, traditional endpoint security products use 50% to over 70% of CPU cycles during intensive scans. CylancePROTECT is outstandingly lightweight at just 1% – 3% CPU utilization.
    - It’s Costly: Signature-based antivirus solutions impact the bottom line with more layers of unproductive technology. Cylance protects with a single agent and a single cloud-based management tool, and that translates into big cost savings.
  • The Impact of Artificial Intelligence on Endpoint Protection Recorded: Feb 22 2017 57 mins
    Chris Sherman, Senior Analyst at Forrester Research & Malcom Harkins, Chief Security and Trust Officers at Cylance
    Learn how next-generation endpoint technologies can prevent up to 99.4% of all attacks. In addition, you’ll receive information about how to build a better, more advanced threat prevention program with the fundamentally different approach of artificial intelligence and machine learning solutions.
  • Think Like a CISO: Risk Management for Advanced Threats Recorded: Feb 8 2017 59 mins
    Malcolm Harkins, Chief Security & Trust Officer, Cylance & Steven Young, CISO, Blue Shield of CA
    Watch this webinar discussion with Malcolm Harkins, Chief Security and Trust Officer at Cylance® and Steven Young, Chief Information Security Officer at Blue Shield of California, in which they discuss the fundamental first steps of developing a sound security foundation for your organization based on the first chapter of Harkins’ book, Managing Risk for Information Security: Protect to Enable.

    Webinar topics discussed:

    1. Issues that pervasiveness of technology causes in our business lives
    2. Building trust by ensuring data is secure and private
    3. Keeping the company legal: the regulatory flood, including privacy and financial regulations
    4. Rapid proliferation of information, devices, and things
    5. The changing threat landscape, including advanced persistent threats
    6. Nine irrefutable laws of information risk
    7. A new approach to managing risk and what should be Included in the approach
Cylance live and on-demand webcasts
Cylance® is revolutionizing cybersecurity with products and services that proactively prevent execution of advanced persistent threats and malware, enabling a level of security that far exceeds the effectiveness of solutions deployed throughout enterprises, government and institutions worldwide. Cylance’s award-winning product, CylancePROTECT® stops what others don’t, without requiring a cloud connection or frequent updates, all while using a fraction of the system resources associated with legacy antivirus software. Visit www.cylance.com for more information.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Endpoint Security: The Final Frontier
  • Live at: Nov 16 2017 7:00 pm
  • Presented by: Ed Metcalf, Senior Director Product Marketing, Cylance
  • From:
Your email has been sent.
or close