Hi [[ session.user.profile.firstName ]]

Cylance and Amar Singh at Infosecurity Europe 2018

Join Matt Stephenson, Cylance and Amar Singh, Cyber Management Alliance live from Infosecurity Europe 2018
Recorded Jun 19 2018 9 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Amar Singh (Cyber Management Alliance) | Matt Stephenson (Cylance)
Presentation preview: Cylance and Amar Singh at Infosecurity Europe 2018

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Stopping Fileless Attacks with BlackBerry Cylance Recorded: Aug 14 2019 57 mins
    Brian Robison, BlackBerry Cylance Chief Evangelist
    Take a closer look on how to protect your organization from the various types of fileless attacks. These threats require a stronger response than traditional, file-based, antivirus countermeasures can provide. BlackBerry Cylance has engineered several tools and techniques capable of preventing fileless threats from executing.
  • Introducing CylanceGUARD™: The 24x7 Managed Detection and Response Solution Recorded: Jul 31 2019 66 mins
    Dave Cundiff, Director
    Are you concerned about security incidents in your business, their impact, and having the appropriate resources required to respond when they happen? Do you want actionable intelligence to prevent threats quickly, while minimizing alert fatigue and not requiring additional resources?

    Learn about CylanceGUARD™, a new subscription-based managed detection and response solution that leverages our award-winning native AI platform and the 24x7 support of a world-class team of incident response and prevention experts.
  • Prevent Cyber Attacks At Government Agencies by BlackBerry Cylance Recorded: Jul 18 2019 41 mins
    Brian Winkler, Sr. Federal Solutions Engineer and John Wood, Director Incident Response
    Preventing attacks against government agency networks can be a costly and resource-intensive endeavor, but the cost of a successful breach can be far worse by impacting critical infrastructure and undermining public trust. See how BlackBerry Cylance can prevent advanced threats that traditional AV cannot. We are certified to deploy CylancePROTECT's revolutionary AI-based agent through cloud-managed architecture for the U.S. government.
  • The Role of AI in Incident Response Recorded: May 20 2019 48 mins
    Tom Pace, VP Global Enterprise Solutions
    Find out how BlackBerry Cylance IR consultants can minimize your organization’s time-to-respond and post-incident risk exposure. Join BlackBerry Cylance as we share findings from The Forrester Wave™: Cybersecurity and Incident Response, Q1 2019 report.
    - How Forrester Research rates BlackBerry Cylance as a provider of cybersecurity and IR services.
    - Why next-gen IR solutions must incorporate sophisticated AI and automated response capabilities to be effective
    - IR best practice approaches and methodologies.
    - How BlackBerry Cylance IR consultants leverage our native AI platform to rapidly contain, remediate, and prevent incidents.
  • BlackBerry Cylance 2019 Threat Report Highlights Recorded: Apr 18 2019 57 mins
    Aditya Kapoor, Sr Dir Research & Intelligence / Tom Bonner, Dir Threat Research, EMEA / Jim Walter, Sr. Security Researcher
    The BlackBerry Cylance 2019 Threat Report Highlights webinar features an examination our conclusions with the researchers and analysts who authored the report. It is an in-depth look at the cybersecurity trends, topics, and innovations that dominated the past year. Our panel of experts offer additional insight into the discoveries drawn from our internal data, customer communications, threat research, and intelligence efforts.
  • Narrowing the Cybersecurity Talent Gap with vCISO from Cylance Recorded: Apr 11 2019 47 mins
    Malcolm Harkins, Chief Security and Trust Officer; Corey White, Sr. VP, Global Consulting Services, ThreatZERO and Education
    Learn how Cylance can help your organization meet the challenges posed by today’s increasingly virulent threat environment. Our Virtual Chief Information Security Officer (vCISO) service augments your team with seasoned security experts to who can help plan, prioritize, and implement security best practices, comply with state and federal cybersecurity laws, as well as continually manage risk efficiently to reduce impact to the business using prevention-first methodologies.
  • Hacking Exposed Webinar Series (Part 1 of 2): Bypassing Next-Gen Recorded: Apr 10 2019 67 mins
    Brian Robison, BlackBerry Cylance Chief Evangelist
    How easily can adversaries bypass your next-gen AV? Find out by attending BlackBerry Cylance’s special two-part Hacking Exposed webinar series.

    Part 1: Hacking Exposed; Bypassing Next-Gen. Chief Evangelist Brian Robison will provide a live demonstration of the hacking tools and techniques adversaries are now using to evade Next-Gen AV. He’ll examine a variety of file-based and fileless methods, including memory exploits, living-off-the-land attacks, script- and application-based attacks, and more.

    Part 2 – BlackBerry Cylance vs. Hacking Exposed. Brian will return to demonstrate how our AI-based EDR platform stops these same attacks cold, before they can execute and compromise your systems.
  • CylanceOPTICS™ Winter 2019 Release – New Automation Features Recorded: Feb 14 2019
    Matthiew Morin, Senior Product Manager
    Learn how the new automation features in the Winter 2019 release of CylanceOPTICS™ enable security teams to minimize the time it takes to detect and respond to advanced threats.
  • Cylance vs. Hacking Exposed:Obfuscation and Weaponization Recorded: Feb 7 2019 56 mins
    President Stuart McClure and Chief Evangelist Brian Robison
    View the recording of this live Cylance vs. Hacking Exposed: Obfuscation and Weaponization webinar to learn how Cylance’s technology prevents sophisticated threats, no matter how well they’re obfuscated, initiated by routine system services, or concealed within weaponized documents. See for yourself why a prevention-first security posture is not only practical, but also the most effective way to minimize your organization’s risks of being breached or compromised.
  • Don't Respond to Threats, Contain Them Recorded: Jan 30 2019 58 mins
    Corey White, SVP of Global Consulting and Sig Murphy, Consulting Director, Western North America
    Traditional incident response relies on antiquated methods like manually searching for threats using signatures and indicators of compromise. These legacy processes focus on responding and monitoring existing attacks, but do little to immunize systems against future attacks. Corey and Sig demonstrate a better way to conduct your incident response using AI-based methodologies aimed at containment and prevention.
  • Top Cybersecurity Predictions for 2019 Recorded: Jan 29 2019 62 mins
    Brian Robison, moderator with expert panelists: Ryan Permeh, Greg Silberman, Steve Mancini and Scott Scheferman
    Cylance® Chief Evangelist Brian Robison hosts a panel of seasoned Cylance leaders in discussion about what your organization should expect in the year ahead. They cover a wide range of topics, including :
    -Predictions about the future threat landscape.
    -New and emerging business and technology investment priorities.
    -What organizations can do to better protect themselves in 2019.
  • Hacking Exposed: Testing Defenses Recorded: Nov 15 2018 56 mins
    Brian Robison, Chief Evangelist at Cylance
    The previous Hacking Exposed episodes introduced you to many of the tools and techniques real-world adversaries use to evade endpoint security products. We will put these concepts into practice and conduct full-scale, multi-phased, endpoint compromises. The techniques and tactics you will learn in this Hacking Exposed session will provide valuable tools for testing the effectiveness of your current defenses.

  • The Evolution of Endpoint Detection and Response Recorded: Oct 4 2018 52 mins
    Fernando Montenegro, 451 Research and Ed Metcalf of Cylance
    Endpoint Detection and Response products were introduced to the market in the early 2010’s and have focused on detecting signs of a compromised system by recording behaviors then alerting humans. Unfortunately, the scale and pace of attacks often overwhelm even the best security analysts and teams.

    As technology improves, new approaches to performing endpoint detection and response emerge. Artificial Intelligence and Machine Learning are new technologies that have been succesfuly applied to the traditional anti-virus problem of detecting “infected” or malicious files without the need for manually created signatures. It is now possible to extend this technology to the problem of detecting, and preventing attacks based on the new techniques that do not rely on infected files, but rather on the malicious behavior of systems regaurdless of the technique used for the attack.

    Join Fernando Montenegro of 451 Research and Ed Metcalf of Cylance for this webinar about how endpoint detection and response can evolve by incorporating newer capabilities, and better support defenses in the modern threat environment.
  • Cylance and Amar Singh at Infosecurity Europe 2018 Recorded: Jun 19 2018 9 mins
    Amar Singh (Cyber Management Alliance) | Matt Stephenson (Cylance)
    Join Matt Stephenson, Cylance and Amar Singh, Cyber Management Alliance live from Infosecurity Europe 2018
  • [Webcam Panel] Trends Discussed at Infosecurity Europe 2018 Recorded: Jun 13 2018 57 mins
    Amar Singh (Cyber Management Alliance) | Matt Stephenson (Cylance) | Danny Eastman (Cyber Fortified) | Paul Simmonds (CSA)
    Join this post-conference panel for an in-depth look into the biggest trends and cyber threats covered during the Infosecurity Europe 2018 conference in London.

    Tune in for an interactive Q&A panel with industry experts as they discuss:
    - What are the biggest threats to security in 2018?
    - Key steps to take today to better secure your critical data assets
    - Top technological advancements powering security
    - CISO strategy in the age of breaches
  • Red Team Exercises: How to Defend Against Cyber Attacks Recorded: Apr 19 2018 41 mins
    Anthony Paimany, Principle Red Team Consultant at Cylance®
    Defending from increasingly advanced and targeted cyberattacks is a constant challenge. Organizations need to gain a true understanding of their network security gaps and vulnerabilities from the perspective of an attacker in order to better address the risk these gaps and vulnerabilities can place on their operations.

    Join Anthony Paimany, Principle Red Team Consultant at Cylance®, as he demonstrates how cyberattacks are executed to test assumptions at every level of detection and response and discusses:

    - Cyberattackers’ primary tools, techniques, and procedures
    - How to determine gaps in defensive controls
    - How to identify and prioritize these risks through penetration tests, assessments, and social engineering
  • The Role of Machine Learning In Improving Endpoint Security Recorded: Nov 17 2017 4 mins
    Doug Cahill, ESG Senior Analyst
    Listen to the new survey findings from Enterprise Strategy Group (ESG) to gain insights on the threat landscape and what your IT peers deem as the top cybersecurity concerns. Bad actors focus their energy on developing sophisticated attacks. In fact, 46% of organizations have been the victim of ransomware in the last year.

    Learn more about their top concerns and how they’re turning to machine learning as a strategic technology to prevent future infections.

    The video was commissioned by Cylance and is being distributed under license from ESG.
  • Endpoint Security: The Final Frontier Recorded: Nov 16 2017 46 mins
    Ed Metcalf, Senior Director Product Marketing, Cylance
    Whether it is a new ransomware campaign or stealthy targeted attack, your endpoints are being attacked and are often the last line of defense in your fight against the cybercriminals. In this webinar, you will understand how endpoints are the final frontier for security and how you must be resilient in using the latest prevention and protection technologies.

    Learn how the power of machine learning and artificial intelligence are changing the endpoint protection landscape. Gone are the days of daily signature updates, maxed out performance impact, and the lack of security effectiveness against both known and unknown threats. It is time explore the new world of endpoint security.
  • Protecting Against Fileless Malware Recorded: Sep 21 2017 60 mins
    Chad Skipper, VP Industry Relations & Product Testing & Brian Robison, Sr. Dir., Security Technology
    How do you defend your enterprise against cyberattacks that don’t use disk-based files but, instead, execute their payloads using machine memory? This attack vector, fileless malware, requires an innovative solution that goes beyond signature-based antivirus tools.

    In this webinar, you will learn about the dangers of fileless malware and how CylancePROTECT® uses memory protection and script control to prevent advanced threats from executing on your organization’s endpoints in real time.

    Watch this webinar to:

    •Educate yourself on this attack technique and how it is impacting businesses worldwide
    •Watch a live demo of CylancePROTECT preventing fileless malware attacks
    •Understand how CylancePROTECT uses multiple protection elements to defend endpoints from advanced exploitation and evasion techniques.
  • Lessons from the Equifax Data Breach for Improving Cybersecurity Recorded: Sep 19 2017 54 mins
    Brian Robison (Cylance), Michael Davis (CounterTack), Stephan Chenette (AttackIQ), Kevin Flynn (Skybox Security)
    Join this interactive Q&A panel to discover the biggest lessons of the recent Equifax breach and how to apply them toward improving your and your organizations cyber security.

    Viewers will learn:
    - The magnitude of the impact of this breach across consumers and industries
    - The true costs of a breach
    - How to discover if your personal information has been exposed and what you can do about it
    - What to expect in terms of cyber threats in the future
    - How can to protect your data and secure your organization
    - Expert recommendations on improving breach protection, detection and response

    - Brian Robison, Sr. Director of Security Technology, Cylance
    - Stephan Chenette, CEO, AttackIQ
    - Michael Davis, CTO, CounterTack
    - Kevin Flynn, Global Director of Products, Skybox Security
Cylance live and on-demand webcasts
Cylance® is revolutionizing cybersecurity with products and services that proactively prevent execution of advanced persistent threats and malware, enabling a level of security that far exceeds the effectiveness of solutions deployed throughout enterprises, government and institutions worldwide. Cylance’s award-winning product, CylancePROTECT® stops what others don’t, without requiring a cloud connection or frequent updates, all while using a fraction of the system resources associated with legacy antivirus software. Visit www.cylance.com for more information.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Cylance and Amar Singh at Infosecurity Europe 2018
  • Live at: Jun 19 2018 9:05 am
  • Presented by: Amar Singh (Cyber Management Alliance) | Matt Stephenson (Cylance)
  • From:
Your email has been sent.
or close