Hi [[ session.user.profile.firstName ]]

MMW: Understanding Malware Lateral Spread Used in High Value Attacks

Understanding Malware Lateral Spread Used in High Value Attacks

APTs are known to use advanced Techniques, Tactics, and Procedures (TTP), including advanced malware design with protection layers, sandboxing evasion, and lateral movement inside penetrated networks to seek out high value targets.

In this webinar, Nick Bilogorskiy of Cyphort Labs will:

Review various lateral movement techniques and methods used by past advanced threats
Look at some APT samples like Shamoon, in detail to show the specific steps in the lateral movement by the malware
Provide an understanding of how lateral movement of APT should help security defenders to better select and implement protection solutions
Recorded Jul 14 2016 34 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Nick Bilogorskiy, Sr. Director, Threat Operations, Cyphort
Presentation preview: MMW: Understanding Malware Lateral Spread Used in High Value Attacks

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Cyphort Adaptive Detection Fabric Introduction Recorded: Dec 5 2016 4 mins
    Cyphort
    Check out this part 1 overview of Cyphort's Adaptive Detection Fabric (ADF) solution.
  • Building Toward Adaptive Response Recorded: Oct 24 2016 37 mins
    Franklyn Jones, VP of Marketing, Cyphort, Jeff Pollard, Principal Analyst, Forrester
    Security leaders understand that there's no catching up to the volume of attacks that threat actors can throw at them. They also know they can't solve problems with technology alone. In 2016 and onward they look to blend technology, people, and process together and create an Adaptive Response framework that allows them to integrate detect, protect, and respond so that each one augments the other. Join us for a webinar with guest Forrester Principal Analyst, Jeff Pollard, as we discuss the current barriers that exist before an organization can build Adaptive Response capabilities. Cyphort will discuss and demonstrate how their technology helps transforms enterprises by becoming an adaptive response fabric that enhances workflows across the domains of detect, protect, and respond.
  • Why is the Industry Still Failing to Stop Cyber Attacks? Recorded: Oct 12 2016 41 mins
    Larry Ponemon (Ponemon Institute), Franklyn Jones (Cyphort)
    According to 2016 research from the Ponemon Institute, companies are spending an average of $16M annually on cyber security tools and technologies, and yet they still struggle to detect and block advanced threats intent on doing damage to their organizations. Too many alerts, too many false positives, and too many days go by before a threat is finally discovered inside the network.

    Join us as Larry Ponemon, Chairman and President of the Ponemon Institute, takes a closer look at key findings from research data collected from nearly 600 organizations. From there, Franklyn Jones, Vice President at Cyphort will show you how the company’s innovative Adaptive Detection Fabric can help you extract more value from your existing investments, and gain visibility and control over advanced targeted attacks before they can do damage to your business.
  • Ransomware Resurgence: Locky and Other “New Cryptolockers” Recorded: Aug 25 2016 39 mins
    Nick Bilogorskiy, Sr. Director, Threat Operations, Cyphort
    Like many viruses, botnets and malware families that we’ve seen over the past decade, hackers continue to find new ways of reinventing old threats. And this is no different for Ransomware.

    Ransomware has come a long way from non-encrypting lockscreen FBI scare warnings like Reveton. In 2016 alone, there have been new ransomware families popping up and we expect that to only pick up steam over the summer.

    In this edition of MMW, Nick Bilogorskiy, Senior Director of Threat Operations at Cyphort, will discuss:

    Locky, the new “it” ransomware and how it works

    A deep dive into a new family of ransom locker discovered by Cyphort Labs in March, that uses TOR Hidden Service

    Other new ransomware families and why it’s becoming the preferred monetization method for attack
  • MMW: Understanding Malware Lateral Spread Used in High Value Attacks Recorded: Jul 14 2016 34 mins
    Nick Bilogorskiy, Sr. Director, Threat Operations, Cyphort
    Understanding Malware Lateral Spread Used in High Value Attacks

    APTs are known to use advanced Techniques, Tactics, and Procedures (TTP), including advanced malware design with protection layers, sandboxing evasion, and lateral movement inside penetrated networks to seek out high value targets.

    In this webinar, Nick Bilogorskiy of Cyphort Labs will:

    Review various lateral movement techniques and methods used by past advanced threats
    Look at some APT samples like Shamoon, in detail to show the specific steps in the lateral movement by the malware
    Provide an understanding of how lateral movement of APT should help security defenders to better select and implement protection solutions
A Lean-Forward Security Solution for Advanced Threat Defense
Cyphort delivers the Adaptive Detection Fabric, an innovative, distributed software security layer which stops threats that go undetected by in-line security tools. Cyphort’s open fabric integrates with existing security tools, delivering continuous insight and analysis of web and email traffic, prioritizing threat alerts for security teams, and providing auto-mitigation capabilities.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: MMW: Understanding Malware Lateral Spread Used in High Value Attacks
  • Live at: Jul 14 2016 6:00 pm
  • Presented by: Nick Bilogorskiy, Sr. Director, Threat Operations, Cyphort
  • From:
Your email has been sent.
or close