Hi [[ session.user.profile.firstName ]]

Infosecurity Europe '16 Interview: Aftab Afzal, SVP/GM, NSFOCUS

NSFOCUS' Aftab Afzal shares his cyber security perspectives at Infosecurity Europe 2016.
Recorded Jun 20 2016 5 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Aftab Afzal
Presentation preview: Infosecurity Europe '16 Interview: Aftab Afzal, SVP/GM, NSFOCUS

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The Year of Cyber Extortion--Why Now and What's Next? Dec 6 2016 6:00 pm UTC 60 mins
    Stephen Gates, Chief Research Intelligence Analyst
    Cyber extortion can take many forms. From ransomware and sextortion, to DDoS shakedowns, and data-dump blackmail, organizations all over the globe have been directly impacted by these campaigns in 2016. What’s changed with hackers’ tactics, techniques, and procedures, and why the sudden surge of activity this past year? What can we expect to see in 2017?

    Join Stephen as he exposes the reasons why this attack vector has drawn so much attention, and how it’s gained so much success. Since the primary enabler for extortion is fear, Richard will demonstrate how organizations can measure their exposure, plan for what’s coming, and take proactive steps to eliminate their fears. If the countermeasures are done right, these blackmail attempts will soon fall on deaf ears.
  • SANS Briefing: Adventures in Threat Intelligence Recorded: Nov 15 2016 43 mins
    Guy Rosefelt
    After the Brexit of TI earlier this year, panic has subsided and cooler heads prevail. Now that we all agree Threat Intelligence can be a useful tool, you too can learn how to use TI like a pro. NSFOCUS shares real-world customer case studies and research to help their clients ensure a safer, more secure enterprise.
  • SANS Financial Services Security Vendor Briefing Recorded: Nov 15 2016 35 mins
    Steve Gates
    Financial institutions continue to be the target of the most advanced attacks by motivated threat actors. Unfriendly nation-states breach systems to seek intelligence or intellectual property. Hacktivists aim to make political statements through systems disruptions, while organized crime groups, cyber gangs, and other criminals breach systems for monetary gain.

    Join the SANS Institute as we bring the SANS Financial Services Security vendor briefing to the Financial Community in the New York City area. This 1/2 day event provides a unique opportunity to engage in dialogue around cybersecurity issues specific to the Finance Industry, and learn about key solution capabilities/customer success stories.

    Through the latest research efforts, in-depth technical knowledge and vendor solutions, attendees will walk away with strategic and tactical actions aimed to address key concerns for the Financial Industry such as:
    How can financial organizations manage these threats while maturing their prevention, detection and reaction capabilities?
    How can they operationalize threat intelligence in the most effective way?
    What are the strategies needed to elevate their cyber resilience while ensuring they keeping pace with regulatory requirements?
  • Understanding the Threat Intelligence Ecosystem Recorded: Nov 10 2016 14 mins
    Stephen Gates
    Everybody talks about threat intelligence today, but how well are they distinguishing raw data from actionable intelligence? Stephen Gates of NSFOCUS discusses cybersecurity and the new threat intelligence ecosystem.

    "The operative word is 'actionable,'" says Gates, Chief Research Intelligence Analyst at NSFOCUS. Threat intelligence means a lot of things to a lot of people, he adds. But what it comes down to is: "Do you want to gain further insight into the threat landscape that your organization faces on a daily basis? That's what threat intel is all about - gaining that insight with actionable intelligence and understanding the threats [you're] under."

    In an interview about the threat intelligence ecosystem, Gates discusses:

    How many organizations fail to distinguish actionable TI;
    Why the ecosystem is so critical to cybersecurity;
    How NSFOCUS distinguishes itself in a crowded marketplace.
  • Threat Intelligence: What It Is, and How to Use It Effectively Recorded: Nov 3 2016 61 mins
    Matt Bromiley and Stephen Gates
    Security practitioners are hearing more and more about threat intelligence (TI). But what exactly is it, and how can TI be effectively deployed as part of an organization's defenses against advanced malware and cyberattacks?

    In this webcast, you will learn just what constitutes threat intelligence, the different kinds of TI and why companies are implementing it. Attendees will also learn how and when to integrate intelligence into their security posture, the role of this intelligence in incident response and when to use it to identify critical security events.

    Join us to get a clearer understanding of this powerful tool and to learn how you can make the best use of it
  • NSA Hacking Tools Exposed... Who's Next? Recorded: Sep 7 2016 61 mins
    Cody Mercer, Sr. Threat Research Analyst, NSFOCUS
    Every day, the techniques, attack vectors, and tools used by ethical and non-ethical hackers grows exponentially. In lieu of the recent breach conducted by the ‘Shadow Brokers” on the NSA, a new hacking arsenal has been released into the wild. Unfortunately, for the majority who are unaware of this recent breach, they not only open themselves up to being compromised, but also do not possess the skill-set and proper security measures required to combat against these nefarious actors - and their advanced weaponry.

    Join us in this session where we’ll discuss:
    •Black-Hats and White-Hats and the intrinsic life-cycle of the hacking process
    •The real motivations and skills behind state-sponsored hackers, hacktivists, and script kiddies
    •How hackers will use the NSA tools for even more nefarious activities
    •How to combat these highly-sophisticated hacking tools with the right defenses
  • Threat Intel - All Hype or Big Help Recorded: Aug 11 2016 62 mins
    Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS
    Over the past few years, organizations of all sizes have been trying to gain more insight into the evolving cyber threat landscape by adding more people and more technologies. As the attack surface widens, threat actors continue to advance their tactics and techniques, and have proven that most organizations’ defensive postures are simply inadequate. At the same time, organizations are drowning in their own “big data”, and adding more data sounds like the pond just got deeper. Most are asking themselves, “will more data really make us more secure?”

    Join this session to gain a firm understanding of:
    • What threat intelligence actually is, where it comes from, and how to get it
    • How organizations use threat intel to gain more insight into the threats they face daily
    • How to make threat intel usable, actionable, interpretable, and distributable
    • How to build a case for the value of threat intel in your organization
  • NSFOCUS Overview Recorded: Jul 20 2016 3 mins
    Alex Cruz Farmer, VP Cloud Services, NSFOCUS
    An Overview of the NSFOCUS brand proposition, as well as an introduction to the company's new Cloud Platform
  • DDoS Defense-as-a-Service: The New Revenue Stream Recorded: Jul 20 2016 61 mins
    Stephen Gates, Chief Security Research Analyst
    For many service and hosting providers, protecting against DDoS attacks has become nothing more than a cost center. As such, every provider is looking to deploy the most cost-effective DDoS defense while reducing the operational costs associated with these attacks.

    Today, many forward thinking providers are turning their DDoS investments into a revenue opportunity. By offering DDoS Defense-as-a-Service to their customers, they can increase overall revenue and create competitive differentiation.

    Attend this webinar to learn how to:
    •Deploy DDoS defenses with the lowest TCO
    •Create an ROI with new service offerings
    •Improve or replace your current DDoS detection/mitigation strategy
    •Grow your scrubbing centers beyond your current mitigation capacity
  • NSFOCUS Overview Recorded: Jul 20 2016 3 mins
    Alex Cruz Farmer, VP Cloud Services, NSFOCUS
    An overview of the NSFocus brand proposition, as well as an introduction to the company's new Cloud Platform.
  • Infosecurity Europe '16 Interview: Aftab Afzal, SVP/GM, NSFOCUS Recorded: Jun 20 2016 5 mins
    Aftab Afzal
    NSFOCUS' Aftab Afzal shares his cyber security perspectives at Infosecurity Europe 2016.
  • The Dark Side of DDoS Recorded: Jun 15 2016 61 mins
    Stephen Gates, Chief Research Analyst, NSFOCUS
    For more than a decade, attackers have used DDoS to disrupt an organization’s operations. Today’s DDoS attacks are being used in combination with a much greater threat. Information breaches and malware planting are being hidden by so called “Dark DDoS” attacks. In order to hide their tracks, attackers overwhelm the security and logging tier with smaller, repetitive attacks.

    Nearly every enterprise is looking for a way to deploy the most effective DDoS defenses; while at the same time reducing operational expenses associated with these attacks. Organizations want to fully manage their risk; while preserving their security effectiveness. Today’s Dark DDoS attacks are easy to defeat with the proper defenses.

    In this educational webinar, Stephen Gates - Chief Research Analyst at NSFOCUS, will show you how:

    •Attackers use DDoS to hide Ransomware and other malicious attacks
    •DDoS extortion campaigns work, and how you can ignore their threats of downtime
    •To protect your security and logging tiers, while maintaining operational effectiveness
    •To eliminate the effects of the smaller, shorter attacks targeting your security layers
Advanced network & application layer security for global organizations
NSFOCUS is committed to providing customers with reliable, innovative network security solutions that provide comprehensive protection from advanced cyber threats. We develop, sell and support enterprise and carrier-grade network security solutions based on cutting edge research and world-class engineering. Our network security products have helped more than 12,000 customers worldwide to maintain high levels of business operations and ensure the availability of their online systems.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Infosecurity Europe '16 Interview: Aftab Afzal, SVP/GM, NSFOCUS
  • Live at: Jun 20 2016 1:55 pm
  • Presented by: Aftab Afzal
  • From:
Your email has been sent.
or close