CYBER WAR: Lessons learned and a framework for defense
We learn from our mistakes but when it comes to the cyber battlefield, there is no room for error. Poor planning and poor execution could result in a catastrophic event exposing valuable digital assets to attackers. As former Director of Operations at U.S. Cyber Command, Major General Brett Williams was responsible for the global operations and defense of DOD networks and knows firsthand how to build a defense framework to counter the most advanced attacks. The hackers are moving much faster than the defenders and the cost of a breach makes cybersecurity a strategic business issue. Just because your network has been penetrated, does not mean you have to suffer a breach. Join us as he shares insights and experiences from the front lines, and walk away with an innovative post-penetration framework and strategy.
RecordedJun 23 201641 mins
Your place is confirmed, we'll send you email reminders
Chad Gasaway, Director of Sales Engineers at Illusive Networks
Distributed deception technologies are purpose-built for early detection of APTs, but to be effective, they must be tailored to each environment to fool attackers, adjust as the business changes, and adapt to attacker behavior. So is it practical to deploy deception at scale? This 30-minute webinar assumes familiarity with basic deception concepts, and takes a deep dive into how Illusive Networks creates a scalable, dynamic deception environment using AI-driven automation to meet the needs of even the largest global financial services companies.
Chad Gasaway, Director of Sales Engineers at Illusive Networks
If you look at persistent threats through an attacker’s eyes, the most effective and nimble way to derail them is to detect their lateral movements across the environment—as early as possible in the attack process. Chad Gasaway is in the trenches every day helping Illusive customers conduct Red Teaming exercises and implementing deception technology to better guard highly sensitive assets from targeted attacks. In this webinar, Chad will provide an overview of how Illusive’s approach to deception helps organizations operate with greater agility to defend what matters most.
Dave DeWalt – Vice Chairman, illusive networks and Ofer Israeli – CEO, illusive networks
As businesses advance their use of emerging technologies, they also create new openings for cyber attackers. The key to protecting your organization from APTs and other sophisticated threats is to detect intrusions as early as possible in the attack cycle. But this is easier said than done. Using valid credentials to move around the network, attackers can often evade traditional controls and detection mechanisms. Dave DeWalt, from his broad perspective as a recognized leader in cybersecurity, will share his perspectives on why deception technology is essential in turning the tables on the attackers.
Despite the increasing effort that organizations put into keeping intruders out of their networks, once sophisticated attackers zero-in on a specific company or information source, there’s a good chance they’ll find a way in. We talked to hundreds of people during the RSA Conference and we noticed there was a lack of information and education on the difference between passive honeypot architecture and active defense deception technology. Register for this webinar as Chad Gasaway, Director of Sales Engineers at illusive networks, will explain the differences between the two architectures and help you understand what type of solution is best for your environment. Please join us March 15th for this live webinar event.
Bob Bragdon - VP and Publisher of CSO, Ofer Israeli - Founder, VP of R&D illusive networks
Advanced Ransomware Threats (ART) have emerged as the newest significant cyber concern. Our expert panel – including CSO’s Bob Bragdon and the founders of illusive networks—will explore what the threat looks like today, where it’s headed and what you need to shore up your network.
The threat landscape is evolving beyond traditional defense measures at an alarming rate. By 2020, Gartner predicts that 60% of enterprise IT Security budgets will shift towards rapid detection and response approaches. But identifying the weaknesses in your network and detecting the threat before sensitive data is compromised is a challenge. Join Hanan Levin, illusive networks VP of Product for a private tour of the places on your network you've never seen before: the hidden cyber attack paths used by Advanced Attackers, cyber criminals, and malicious insiders. You will learn:
- How Fortune 500 enterprises used Attacker View to map their network and identify hidden threats they didn't know were there
- Post-breach remediation strategies and tactics used
We learn from our mistakes but when it comes to the cyber battlefield, there is no room for error. Poor planning and poor execution could result in a catastrophic event exposing valuable digital assets to attackers. As former Director of Operations at U.S. Cyber Command, Major General Brett Williams was responsible for the global operations and defense of DOD networks and knows firsthand how to build a defense framework to counter the most advanced attacks. The hackers are moving much faster than the defenders and the cost of a breach makes cybersecurity a strategic business issue. Just because your network has been penetrated, does not mean you have to suffer a breach. Join us as he shares insights and experiences from the front lines, and walk away with an innovative post-penetration framework and strategy.
illusive networks is pioneering deception based cybersecurity. Its patent pending Deceptions Everywhere® technology neutralizes targeted attacks and Advanced Persistent Threats (APT). By creating a deceptive layer across the entire network — every endpoint, server, and network component with an endless source of false information, illusive networks disrupts and detects breaches with real time forensics and without interrupting business.
CYBER WAR: Lessons learned and a framework for defenseMajor General Brett Williams and Chad Gasaway[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]41 mins
Share with your team
(they'll receive one email invite and nothing else)
[[ email ]]
CYBER WAR: Lessons learned and a framework for defenseMajor General Brett Williams and Chad Gasaway[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]41 mins