For the past year, Symantec’s DeepSight Intelligence team has been monitoring the Dyre banking Trojan, in an effort to provide customers with predictive intelligence. This includes tracking updates to the Dyre configuration and management panel in order to identify new financial and private sector targets that are being systematically added by criminal threat actors on a regular basis.
In this session the DeepSight team will explain how the Dyre development and targeting process operates, and provide details on new Dyre targets outside of the financial arena that have been observed since September. The speakers will also detail activity on cybercrime forums related to Dyre threat actor activity, including examples relating to the tight control of access to the Dyre botnet. Further insights will be provided through a case study showing Dyre being used by a distinct criminal threat group. The case study will demonstrate how this threat group uses commodity malware interchangeably including Dyre, Dridex, Vawtrak, and POS malware variants and will provide details regarding their established TTPs for malware delivery, management, and infrastructure.
RecordedDec 17 201552 mins
Your place is confirmed, we'll send you email reminders
Threats are becoming more sophisticated with new attacks becoming commonplace. These unknown threats can be devastating for an organization making endpoint protection more critical than ever. The best weapon in your endpoint protection arsenal to combat unknown threats is Machine Learning. Join us to discover:
•How machine learning addresses unknown threats
•Why SEP 14 machine learning is unique
•Where it fits in a layered solution
In addition to a lively discussion we’ll also show you SEP 14 in action, with a demo that showcases how unknown threats don’t stand a chance.
Kevin Haley, Director of Product Management for Symantec Security Technology and Response
Ransomware has become extremely popular with cyber criminals because it’s easy and very profitable. Organizations can defend themselves and lower the risk of ransomware or other common threats costing them time and money.
Key Learning Objectives:
- A look at the current state of ransomware
- Simple and inexpensive steps that can advance state and local government security posture
- Better understanding of the cyber security landscape
- Best practices to take in cyber defense
Join us for a review on simple ways, state and local government can protect themselves against ransomware attacks.
The National Institute of Standards and Technology (NIST) recently released guidance for Small and Medium Sized Business can utilize the NIST Cybersecurity Framework (CSF) to improve their Cybersecurity posture.
Key Learning Objectives:
-Basic understanding of the Cybersecurity Framework
-Introduction to the NIST small business information security document (purpose and scope)
-A review of the alignment of Symantec solutions to Cybersecurity Framework
Join this webinar for a review of the new guidance and how to apply it to assess and manage the Cybersecurity Risks to your business
Stop Sophisticated Email Threats by Leveraging one of the World’s Largest Global Intelligence Networks
Email continues to be the #1 threat vector for targeted and advanced attacks. The ubiquity of email and the widespread adoption of traditional email security solutions has led attackers to move beyond basic spam and phishing emails to more targeted and sophisticated attacks to infiltrate an organization.
Join Symantec’s Jane Wong, Sr. Director, Product Management,Gateway Security Group and Nirav Shah, Email Security Product Marketing Manager to learn:
- How Symantec can help your organization uncover, stop and respond to sophisticated email attacks while providing the deepest level threat intelligence.
Once again it's been a bad year for computer security. But while we are focused on the increased threats of IoT devices as the year comes to an end, a lot of other significant security events and malware threats appeared all through the year. And they all have significance for next year.
This webcast will review the threat landscape of 2016 with a focus on what we need to remember as we move into 2017.
While attacks by nation-states and on-line extortion are grabbing the headlines the biggest threat to small and medium businesses remains banking trojans. These threats are flooding user’s mailboxes, trying to get a foothold on computers to empty out the victims banks accounts.
Small and medium sized businesses are a favorite target and can have devastating effects for a business that finds its bank account cleaned out.
James Griffin, Product Manager, Cyber Security Services, Symantec
Phishing continues to be one of the most prevalent and effective threats to organizations. Combating hackers that are determined to compromise your users requires a unique blend of tools, strategy and training.
Join our webinar to learn about:
•How to train your users to recognize these attacks more effectively and reduce your organization’s risk
•Using Phishing Readiness to simulate attacks such as Point and Click, Attachments and Data exposure at a level which would impact the employees directly
•See how to measure the effectiveness of your Phishing Readiness campaigns and show the changes in user behavior
Register now to ensure you have the right techniques, tools and procedures in place to deliver an effective Security Awareness Program.
Adrian Sanabria, Senior Security Analyst at 451 Research & Kevin Haley, Director Security Response at Symantec
In the world of endpoint security and antivirus there no less than 37 new endpoint security products that have emerged in the past five years, each claimed to address the changing landscape, but is it all just hype?
Attend this webcast to hear from 451 Research Security Analyst, Adrian Sanabria as he takes a closer look at the state of the market for Endpoint Protection. Symantec’s, Director of Security Response, Kevin Haley, joins Adrian, as he discusses the latest developments with Symantec Endpoint Protection 14 and it gives hope to customers trying to navigate this changing market.
Learn more about Machine Learning, what it is, how it works, and what else you need to protect yourself across all points of attack.
Key Learning Objectives:
•What is the state of the industry for Endpoint Protection technology
•Why machine learning is not enough
•Discover how to reduce the number of agents on your endpoint with the high-performance lightweight agent that includes advanced machine learning, exploit mitigation, antimalware, and more
Integrated cyber defense stops tomorrow’s advanced threats as well as today’s
Every endpoint is a launch pad for a cyber attack, no matter how it touches your network. Our multi-layered endpoint protection provides everything from file reputation and behavioral analysis to advanced machine learning AI. And Symantec Endpoint Protection 14 is our lightest and the strongest endpoint protection on the market.
Sunil Choudrie, Global Solutions Manager, Deena Thomchick, Sr. Director Cloud Security & Linda Park, Sr. Product Manager
The sad truth is that Invaders are trying to breach your defenses every day. With five out of every six large organizations being targeted by advanced attackers, protecting your data is a smart way to keep you from becoming tomorrow’s headline.
So what does data protection mean? A comprehensive approach allows the right people to access the right data, anywhere, by controlling access, monitoring its flow, and keeping it out of the wrong hands.
We will explain how Symantec technology addresses this approach and how you will benefit from:
•Grant and ensure access only for authorized users with strong, multi-factor authentication, on any device, including BYOD.
•Watching over data wherever it lives—in the cloud, on premise, in motion, and at rest.
•Preventing data loss with unified policy controls to encrypt or block vulnerable information before it leaves the gate.
Dennis York, Lead Incident Response Investigator, Symantec and Darian Lewis, Senior Principal Security Analyst, Symantec
Did you know that just opening a compromised web page could allow dangerous code to install on a PC or smartphone? You don’t have to click “accept” for a download or software update to install malware on your machines and trigger an infection and the consequences can be enormous.
Why you need to build 24 X 7 threat monitoring into your environment
Ransomware is an extremely profitable type of attack. It only takes one network-connected device to expand a malware infection and hold an entire organization hostage for profit. Last year, the use of encryption as a weapon to hold companies’ and individuals’ critical data hostage grew by 35 percent.
- Learn from our cyber security experts about what can happen in a ransomware attack, based on real-life events.
-Understand how the malware entered the IT infrastructure of two different companies, and find out how long it stayed and the impact to these businesses.
-Will show you how attacks are identified and remediated, as well as some best practices for handling ransomware attacks, should one occur in your company.
Improve your line of defense against ransomware and minimize the loss of key data, money and intellectual property from your organization.
Ken Durbin, Unified Security Strategist, Symantec, Adam Sedgewick, Senior Information Technology Policy Advisor, NIST
The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) was originally focused on the Critical Infrastructure Sectors but is quickly being adopted by organizations of all types and sectors. Should you consider adopting the CSF? This webinar will provide you with a solid understanding of the CSF to help you decide if it’s right for you. We’ve invited Adam Sedgewick, Senior Information Technology Policy Advisor, National Institute of Standards and Technology, to join us on this informative webinar.
Topics covered will include:
-A brief history of the CSF and its development
-The goals and outcomes it was designed to address
-The three main components of the CSF: Core, Profile & Tiers
-Its use in both Regulated and Non-Regulated
Kelley Bray, Employee Trust and CustomerONE at Symantec
Building a strong culture of security is the key to ensuring that your users care enough about the security of your company to protect it. Every day, in every interaction, we want our users to do the right thing when it comes to security.
In this webinar we will discuss:
- Symantec’s Employee Trust Program
- How we go beyond basic security awareness training to continuously cultivate our security culture.
Bob Shaker, Incident Response Product Management, Cyber Security Services, Symantec
We are no strangers to breaches and compromises but why has it gotten worse? What is happening in the adversary landscape that has changed the attack model from opportunity of convenience to campaign driven assault plans? We’ll highlight the professionalism of hackers and how they are operating as a business to take advantage of organizations of all sizes. The facts presented are from the findings that can be found in Symantec’s 2016 Internet Security Threat Report.
Sunil Choudrie, Global Solutions Marketing Manager
When it comes to your sensitive data, how can you be sure that it is protected and none of it is leaving your environment?
Organizations today face the following challenges:
•Identifying the type of data that needs to be protected
•Controlling access to data & ensuring identities aren’t exposed, especially in the face of significant regulatory fines
•Prevent sensitive data from leaving the organization, mega-breaches & data loss is increasing year on year. Over half a billion personal records were stolen or lost in 2015, spear phishing campaigns targeting company employees increased by 55% in 2015
Answer: Firstly allow the right people to access the right data, anywhere, by controlling access, monitoring its flow, and keeping it out of the wrong hands. Secondly Easily apply policies to control access and usage―in the cloud, on mobile devices, or on the network.
Join Symantec for a webinar on the lessons learned regarding data protection across the many applications in your environment.
It’s an unfortunate truth: cyber criminals are targeting small and medium sized business. This webcast will focus on the threats these businesses face. Using analysis of the 2016 cyber threats from the newly released Symantec Internet Security Threat Report, we will cover the latest trends in cyber-crime and what to do about it.
Get the latest research on cyber threats including:
•Why cyber criminals target small and medium business at a higher rate than larger businesses.
•How ransomware is expanding to new targets and how to protect yourself.
•Why 78% of all legitimate websites are putting your end users at risk.
Robert Westervelt is a Research Manager at IDC Security and Alejandro Borgia, VP Product Management at Symantec
Endpoint security is a critical component in an organization's security program and is needed to gain the visibility necessary to rapidly detect threats and contain them before criminals gain access to critical resources.
Join us for an interactive discussion and learn more about:
• How emerging security technologies are helping organizations defend against targeted attacks that use zero-days and evasion tactics to evade detection
• What technologies typically make up modern threat protection solutions and how they enable incident responders to quickly identify infected endpoints and determine the scope of an attack
• Why endpoint visibility must be combined with network, web, and messaging security solutions to create a security architecture that works cohesively to reduce the amount of time an attacker has on infected systems
• How risk assessment plays a role in strengthening your security to preempt future attacks
Join us for our next webcast on Wednesday, June 22 to learn about Bomgar Connect – a new cloud-based remote support solution and a replacement option for pcAnywhere.
Bomgar Connect provides secure remote support to employees and customers anytime, anywhere. With easy-to-use features such as screen sharing, remote control, file transfer, and chat, support representatives are armed with the tools necessary to quickly connect to and fix remote systems and devices without sacrificing security or reliability.
We will also discuss a special promotion for Bomgar Connect available to Symantec customers who currently own Deployment Solution, Client Management Suite and IT Management Suite.
Symantec is a global leader in providing security solutions to help our customers – from consumers and small businesses to the largest global organizations – secure their information against more risks at more points, more completely and efficiently than any other company. Our company’s unique focus is to eliminate risks to information, technology and processes independent of the device, platform, interaction or location.