Hi [[ session.user.profile.firstName ]]

CYBER WAR: Lessons learned and a framework for defense

We learn from our mistakes but when it comes to the cyber battlefield, there is no room for error.  Poor planning and poor execution could result in a catastrophic event exposing valuable digital assets to attackers.  As former Director of Operations at U.S. Cyber Command, Major General Brett Williams was responsible for the global operations and defense of DOD networks and knows firsthand how to build a defense framework ​​to counter the most advanced attacks.  The hackers are moving much faster than the defenders and the cost of a breach makes cybersecurity a strategic business issue.  Just because your network has been penetrated, does not mean you have to suffer a breach. Join us as he shares insights and experiences from the front lines, and walk away with an innovative post-penetration framework and strategy.
Recorded Jun 23 2016 41 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Major General Brett Williams and Chad Gasaway
Presentation preview: CYBER WAR: Lessons learned and a framework for defense

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • THE FUTURE OF RANSOMWARE Recorded: Aug 11 2016 31 mins
    Bob Bragdon - VP and Publisher of CSO, Ofer Israeli - Founder, VP of R&D illusive networks
    Advanced Ransomware Threats (ART) have emerged as the newest significant cyber concern. Our expert panel – including CSO’s Bob Bragdon and the founders of illusive networks—will explore what the threat looks like today, where it’s headed and what you need to shore up your network.
  • A JOURNEY THROUGH THE DARK MATTER OF YOUR NETWORK Recorded: Jun 30 2016 31 mins
    Hanan Levin - illusive networks VP Product
    The threat landscape is evolving beyond traditional defense measures at an alarming rate. By 2020, Gartner predicts that 60% of enterprise IT Security budgets will shift towards rapid detection and response approaches. But identifying the weaknesses in your network and detecting the threat before sensitive data is compromised is a challenge. Join Hanan Levin, illusive networks VP of Product for a private tour of the places on your network you've never seen before: the hidden cyber attack paths used by Advanced Attackers, cyber criminals, and malicious insiders. You will learn:
    - How Fortune 500 enterprises used Attacker View to map their network and identify hidden threats they didn't know were there
    - Post-breach remediation strategies and tactics used
  • CYBER WAR: Lessons learned and a framework for defense Recorded: Jun 23 2016 41 mins
    Major General Brett Williams and Chad Gasaway
    We learn from our mistakes but when it comes to the cyber battlefield, there is no room for error.  Poor planning and poor execution could result in a catastrophic event exposing valuable digital assets to attackers.  As former Director of Operations at U.S. Cyber Command, Major General Brett Williams was responsible for the global operations and defense of DOD networks and knows firsthand how to build a defense framework ​​to counter the most advanced attacks.  The hackers are moving much faster than the defenders and the cost of a breach makes cybersecurity a strategic business issue.  Just because your network has been penetrated, does not mean you have to suffer a breach. Join us as he shares insights and experiences from the front lines, and walk away with an innovative post-penetration framework and strategy.
Advanced Attacker Deception
illusive networks is pioneering deception based cybersecurity. Its patent pending Deceptions Everywhere® technology neutralizes targeted attacks and Advanced Persistent Threats (APT). By creating a deceptive layer across the entire network — every endpoint, server, and network component ­ with an endless source of false information, illusive networks disrupts and detects breaches with real time forensics and without interrupting business.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: CYBER WAR: Lessons learned and a framework for defense
  • Live at: Jun 23 2016 3:00 pm
  • Presented by: Major General Brett Williams and Chad Gasaway
  • From:
Your email has been sent.
or close