Hi [[ session.user.profile.firstName ]]

Evolving Cyber Threats: Targeting the Hidden Attack Surface of Automation

Every day, we hear about Artificial Intelligence (AI) invading more and more of everything around us. Within Information Security, we cannot get around new algorithms, new machine learning techniques, and a rush to automate everything. However, have these new technologies paradoxically ushered in a completely new world of vulnerabilities?

In this webinar for technical and non-technical business leaders, Carl Herberger, Radware’s Vice President of Global Security Solutions, explores a fascinating topic of how everything from APIs to people are being attacked in a new, hidden attack surface with a unique ability to cloak and anonymize its designers, and which has incredible speed and efficiency in its attack types. This presentation will highlight how each step towards deeper and total connectivity comes with consequences of needing to protect the very automation designed to make our world easy. In this session, you will learn how everything from humans to bots have weak undersides to automation and even AI interfaces can be duped into attacks.

A frequent guest of Fox Business News, CNN, CBS Evening News, CNBC and Bloomberg Broadcast News, along with numerous NYT, WSJ and Washington Post citations, Herberger will share his insights and answer your questions about this important topic.

About the speaker:
Mr. Herberger is considered a foremost expert on the problems and solutions surrounding cyber attacks. In his role at Radware, he is responsible for developing, managing, and increasing the company's security practice, and serves as the primary corporate spokesperson in the Americas for security-related topics.

Previously, Herberger held senior security leadership positions at Evolve IP, Barclaycard, and a top-five IT security consulting organization; he co-founded Allied InfoSecurity, Inc.—an international provider of best-in-class security consulting and technical compliance services; and served at the Pentagon.
Recorded Dec 7 2017 50 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Carl Herberger - Radware, Vice President, Global Security Solutions; host: Paul Mazzucco, TierPoint Chief Security Officer
Presentation preview: Evolving Cyber Threats: Targeting the Hidden Attack Surface of Automation

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Evolving Cyber Threats: Targeting the Hidden Attack Surface of Automation Recorded: Dec 7 2017 50 mins
    Carl Herberger - Radware, Vice President, Global Security Solutions; host: Paul Mazzucco, TierPoint Chief Security Officer
    Every day, we hear about Artificial Intelligence (AI) invading more and more of everything around us. Within Information Security, we cannot get around new algorithms, new machine learning techniques, and a rush to automate everything. However, have these new technologies paradoxically ushered in a completely new world of vulnerabilities?

    In this webinar for technical and non-technical business leaders, Carl Herberger, Radware’s Vice President of Global Security Solutions, explores a fascinating topic of how everything from APIs to people are being attacked in a new, hidden attack surface with a unique ability to cloak and anonymize its designers, and which has incredible speed and efficiency in its attack types. This presentation will highlight how each step towards deeper and total connectivity comes with consequences of needing to protect the very automation designed to make our world easy. In this session, you will learn how everything from humans to bots have weak undersides to automation and even AI interfaces can be duped into attacks.

    A frequent guest of Fox Business News, CNN, CBS Evening News, CNBC and Bloomberg Broadcast News, along with numerous NYT, WSJ and Washington Post citations, Herberger will share his insights and answer your questions about this important topic.

    About the speaker:
    Mr. Herberger is considered a foremost expert on the problems and solutions surrounding cyber attacks. In his role at Radware, he is responsible for developing, managing, and increasing the company's security practice, and serves as the primary corporate spokesperson in the Americas for security-related topics.

    Previously, Herberger held senior security leadership positions at Evolve IP, Barclaycard, and a top-five IT security consulting organization; he co-founded Allied InfoSecurity, Inc.—an international provider of best-in-class security consulting and technical compliance services; and served at the Pentagon.
  • The Frontline Is Everywhere: New Perspectives on Defense in Depth Recorded: Nov 8 2017 60 mins
    Brian Anderson, Director of Security Product Management
    As today’s businesses come under attack from increasingly malicious cyber threats, a traditional “defense in depth” strategy may become insufficient to effectively fend off attackers and prevent business disruptions and downtime. As mobility, IoT, and BYOD open new attack vectors and attacks become more sophisticated, the situation only worsens. While 100% prevention is impossible, rapid identification and containment is not.

    
In this live webinar, TierPoint Director of Security Product Management, Brian Anderson will discuss why we need to redefine defense in depth approaches to safeguard data from emerging threats.

    
Join Brian as he shares insight into the following key considerations when developing a better, more comprehensive security strategy:

    • The implications of the disappearing network edge.
    • Why a traditional “defense in depth” approach, while still a good start, is no longer sufficient
    • Keys to rapid identification and containment
    • How visibility, detection, escalation, and automated response help close the loop
  • Utilizing Azure Site Recovery in your Disaster Recovery Plan Recorded: Oct 26 2017 61 mins
    Dale Levesque, TierPoint; Justin Jakowski, Microsoft
    Business disruptions and downtime can cause serious damage to a company's bottom line. And today, with multiple potential sources of disruption — from equipment failure to natural disasters and cyber-attacks — IT leaders are seeking even faster and more resilient disaster recovery (DR) strategies.

    As the tools to implement DR plans become more sophisticated, the options for leveraging public cloud infrastructure for backup, replication, and recovery have increased. Microsoft Azure Site Recovery helps ensure business continuity by enabling replication for Azure VMs and on-premises virtual machines and physical servers.

    Join us for a discussion around the latest trends in DRaaS, and how organizations are leveraging Microsoft Azure Site Recovery (ASR) to ensure data is safe and available.

    About the Speakers:
    Justin Jakowski is an Azure Cloud Infrastructure Solutions Professional on Microsoft’s Global Blackbelt team. He analyzes customer technical requirements and provides options and recommendations around Azure Cloud Infrastructure workloads such as Site Recovery, Backup, Open Source, ExpressRoute and Networking. He has more than 15 years of experience in the IT industry with various roles in management, engineering, pre-sales and consulting.

    Dale Levesque is responsible for the development of various cloud and managed services, including storage, backup, and DRaaS, for TierPoint. Prior to TierPoint, Dale served in a number of strategic technology roles, including the deployment of international fixed broadband wireless infrastructure and management of global software development teams in the enterprise virtualization space. Mr. Levesque also served in the United States Navy, supporting Operation Desert Storm.
  • 2017 Cloud Market Overview: An Exclusive Briefing with 451 Research Recorded: Sep 28 2017 63 mins
    Melanie Posey - 451 Research
    Companies are re-thinking their cloud adoption strategy. How does your organization compare? In a dynamic cloud marketplace, having access to the very latest data and expert insights not only can save considerable time and effort in planning cloud migrations, but also create the opportunity for competitive advantage.

    TierPoint is pleased to present an exclusive briefing with 451 Research. Melanie Posey, Research Vice President will share the results of newly commissioned research, providing valuable perspective for organizations planning and designing workload migrations to the cloud. Available only to webinar attendees, this vendor agnostic presentation will answer the following key questions:
    •What are your peers spending on cloud services?
    •What workloads are your peers porting, when, and how?
    •What are some of the challenges and inhibitors for various cloud strategies?
    •What ROI are your peers are seeing?

    About Melanie:
    Melanie Posey is the Research Vice President for 451 Research’s Voice of the Enterprise: Cloud Transformation offering. She focuses on tracking, analyzing and anticipating the pace and nature of enterprise cloud adoption.

    Prior to joining 451 Research, Melanie spent more than 15 years at IDC in a variety of roles, providing analysis, forecasting and insight for the cloud, hosting, datacenter, managed services and telecommunications markets. At IDC, Melanie received numerous awards for research, collaboration, sales support and client service, including being named runner-up for the prestigious James Peacock Memorial Award.

    During her more than 20-year career in the technology research and consulting arena, Melanie has been quoted extensively in the business and technology trade press, and is a frequent speaker at industry and client events.
  • Better Protect Your Web Apps by Knowing How They Will Be Attacked Recorded: Sep 7 2017 64 mins
    Paul Fletcher, Alert Logic Cybersecurity Evangelist; Brian Anderson, TierPoint Director, Security Product Management
    Join our “Web App Security” presentation, which provides the audience with a global perspective of the current state of web application vulnerabilities. Attendees will:
    • gain a better understanding of how reconnaissance is used by attackers to discover and pinpoint systems to compromise,
    • learn about attack methodologies and how vulnerable web apps can be leveraged for attackers to gain privileged access, and
    • hear remediation strategies to help protect their web apps from being attacked.

    Speaker Information:
    Paul Fletcher has over 20 years of experience in information technology and security. Prior to joining Alert Logic, Fletcher advised executive level leadership in the energy, retail, and financial sectors regarding emerging security threats and mitigation strategies. Additionally, he has worked with Fortune 50 organizations, the Department of Defense, and critical infrastructure organizations to implement risk management plans and security solution designs. His other specialties include network security, customer data integrity, application security, forensics investigation, threat intelligence, and incident response. Fletcher holds a Master of Arts and Bachelor of Science degree and is a Certified Information Systems Security Professional (CISSP).
  • The Unique Challenges of Disaster Recovery in a Hybrid IT World Recorded: Aug 9 2017 64 mins
    Harry Smith, Zerto Technology Evangelist; Dale Levesque, TierPoint Manager of Product Development
    Business disruptions and downtime can cause serious damage to a company's bottom line. And today, with multiple potential sources of disruption — from equipment failure to natural disasters and cyber-attacks — IT leaders are seeking even faster and more resilient disaster recovery (DR) strategies. Identifying risks and developing a DR plan are essential, but just as important is selecting the right vendor for your Disaster Recovery needs, which can be challenging.

    In this live webinar, TierPoint Manager of Product Development, Dale Levesque and Zerto Technology Evangelist, Harry Smith will discuss the keys to effective DR planning and address the added challenges presented by increasingly complex hybrid IT environments.

    Join Dale and Harry as they share use cases and answer key questions about creating an effective DR plan and selecting the best provider for your needs, including:

    • What are the major causes of downtime?
    • How has DR evolved from backup computer centers to cloud computing and advanced data replication technologies?
    • What are the latest DRaaS trends?
    • What are the key considerations when selecting a DR solutions provider?
  • Creating a Multi-Cloud Roadmap: Cloud Migration Best Practices Recorded: Jun 27 2017 58 mins
    Peter Molnar, Dell EMC Director of Data Mobility; Matt Brickey, TierPoint VP Professional Services
    Migrating to the cloud can transform an organization. But is your organization ready? It can be a struggle to translate buzz words into a successful paradigm shift from a legacy server/data center model to purchasing in a cloud broker model. And, if your move is not properly planned and effectively executed, your cloud initiative may result in unexpected cost overruns, or worse. A successful roadmap is not just about planning and migration, it’s also about aligning your organization to most effectively use the cloud.

    In this live webinar, TierPoint Vice President of Professional Services, Matt Brickey and Dell EMC’s Director of Data Mobility, Peter Molnar, will share their combined expertise, including client use cases, derived in helping hundreds of clients “cloudify” their applications and data, and leverage the cloud to full advantage.

    Join Matt and Peter as they answer key questions about creating a successful cloud roadmap, including:
    - How to assess your organization’s cloud readiness
    - How to evaluate which workloads are the best candidates for the cloud
    - In a multi-cloud world, which cloud(s) are right for your organization?
    - Crucial migration planning considerations and milestones
  • In Our Customers' Words - Kevin Staley, Integrated Health Systems Recorded: Jun 19 2017 4 mins
    TierPoint
    TierPoint client Integrated Health Systems (IHS) is a leading national provider of IT support services for the senior living industry, including independent and assisted living facilities, home health and hospice. IHS President & CEO Kevin Staley discusses the unique nature and scope of his company’s operations; why IHS turned to TierPoint for private cloud and other solutions; and the benefits they’ve realized from working with TierPoint.
  • It’s a Hybrid IT World: Key Insights for the Journey to Multi-Cloud Environments Recorded: Jun 14 2017 33 mins
    Andy Stewart, TierPoint Chief Strategy Officer
    IT leaders and their teams are increasingly under pressure to keep pace with escalating business demands. As traditional solutions are replaced by more agile but also more complex models, determining the right mix of workloads and environments can be challenging. This session will review the shifting IT landscape and address key questions for organizations to consider as they migrate to and manage hybrid/multi-cloud systems
  • In Our Customers' Words - Joe Cincotta, DoubleCheck Recorded: May 29 2017 3 mins
    TierPoint
    TierPoint client DoubleCheck LLC is an enterprise software company, focused on building the best software solutions for companies to plan, manage, automate and improve their GRC (government, risk, and compliance) tasks.

    DoubleCheck President & CEO Joe Cincotta comments on DoubleCheck’s business, how TierPoint supports that business, what he looks for in vendors, and how TierPoint has made him a “raving fan.”
  • In Our Customers' Words - Peter Garlock, Port of Seattle Recorded: May 22 2017 4 mins
    TierPoint
    The Port of Seattle, a TierPoint client, owns and operates Seattle-Tacoma International Airport, two cruise ship terminals, Fishermen’s Terminal, a grain terminal, public cargo terminal, four public marinas – and manages a number of real estate assets. Port CIO Peter Garlock discusses the mission-critical role of IT in the Port’s operations, how and why the Port selected TierPoint’s Spokane facility for back-up and recovery, and his overall impressions of working with TierPoint.
  • The Hybrid IT Balancing Act: Is Your Cloud Provider Tipping the Scale? Recorded: Mar 29 2017 33 mins
    Bob Hicks, SVP and General Manager, TierPoint
    Are you employing a balanced approach to Hybrid IT in the changing multi-cloud landscape? In this webinar, Bob Hicks, Senior Vice President, Operations discusses four cornerstones to consider to reduce risk. Through his 30-year career in IT and data center operations management, Bob has accumulated a deep understanding of the forces affecting hybrid infrastructures and has helped demystify the complexities surrounding Hybrid IT and cloud environments for organizations of all sizes.
  • SQL Server: Understanding Your Options for Disaster Recovery & High Availability Recorded: Mar 29 2017 42 mins
    Matt Aslett, 451 Research; Midd Carmack and Mike Donaghey, TierPoint
    Join Midd Carmack, Product Manager and Mike Donaghey, Manager of Database Administration at TierPoint along with Matt Aslett, Research Director for Data Platforms and Analytics at 451 Research, as they discuss the latest high availability capabilities in SQL Server 2016, how to architect to take full advantage of those features, and implications for a robust disaster recovery plan.

    Midd brings over 20 years of IT Infrastructure, Operating System and Database administration and product management experience to the discussion and will provide an overview of TierPoint as a Managed Services Provider and the company’s Hybrid IT strategy.

    Matt will explore the latest high availability capabilities in SQL Server 2016, including database mirroring, log shipping, availability groups, and failover clustering. In addition to reviewing the capabilities of each of these approaches, this session will also include a perspective on their relative merits and use-cases. Matt will also explore the drivers for managed database services, versus hands-on database administration, in delivering the goals of a database high availability strategy.

    Mike’s experience spans 15 years working with managed database clients to design and manage SQL implementations for a variety of industries, including healthcare, financial and manufacturing. Mike will offer technical perspective on implementing SQL capabilities to optimize disaster recovery protection and budget considerations. He will use case study examples describing the challenges and business requirements for a variety of SQL installs, along with strategies for solving those problems using the DR/HA features available with SQL Server today.
  • Get More with TierPoint Recorded: Mar 22 2017 2 mins
    TierPoint
    TierPoint is a leading national provider of hybrid IT solutions that help organizations drive performance and manage risk. No other U.S. provider comes even close to matching our unique combination of 5,000-plus clients of all shapes and sizes, 40 data centers and 8 multi-tenant cloud pods.
  • Security in Microsoft Azure: Understanding the Shared Responsibility Paradigm Recorded: Nov 17 2016 59 mins
    Dave McKenney, TierPoint; Mike Hartmann, Microsoft
    The webinar will address when and how to leverage Azure's built-in security features, when and how to supplement with third-party solutions, and how to ensure your Azure deployment meets your security and compliance requirements.
  • Multi-layered online attacks: IT security strategies to protect your company Recorded: Oct 5 2016 49 mins
    Paul Mazzucco, TierPoint- Chief Security Officer; Deepak Patel, Imperva - Director, Security Strategy
    The latest hacking strategies include attacking targets from multiple fronts using DDoS attempts, malware and other techniques at the same time. Automation, including widespread use of compromised systems, hired botnets and IoT (Internet of Things) devices, is on the rise.

    Join us to learn more about multi-layered attacks and how intelligence and automation are making them significantly more powerful. You will also learn tips to help your organization mitigate the risks.

    Key Learnings:
    · How bots are simplifying automation creating an even bigger volumetric attack force.
    · How DDoS attacks are often a smoke screen to other malware attacks happening.
    · Strategies for protecting your organization against multi-layer attacks.
  • Multi-Vector DDoS Attacks: Detection and Mitigation Recorded: Jan 13 2016 63 mins
    Paul Mazzucco, TierPoint - Chief Security Officer
    Nearly half of those businesses who suffered a DDoS attack in 2014 saw their organization taken completely offline. Why? Because over 80% of DDoS attacks are now multi-vector, striking the application layer and the network layer simultaneously, and often dragging on for days. During this webinar, Paul Mazzucco will feature a live demonstration, showing you how these multi-vector DDoS attacks are being perpetrated and what you can do to mitigate against these complex intrusions.
  • Cloud, Colocation or Hybrid – Top 4 Considerations Recorded: Nov 11 2015 43 mins
    Bob Hicks, SVP and General Manager, TierPointb
    Colocation and cloud should not be either/or choices. The two services solve different problems, and sometimes both in tandem make the most sense. But how do you determine which – or what combination – is the right solution and in what context? This webinar looks at the pros and cons of each option, outlines scenarios where a hybrid solution makes sense, and offers four important considerations to help you think through your unique needs.
  • 7 Smart Metrics to Calculate Cloud ROI Recorded: Nov 4 2015 29 mins
    Joe Conlin, TierPoint Solutions Engineer
    Sure the cloud can be highly beneficial to businesses, but how do you measure those benefits? The changes the cloud brings are transformative because they change the equation at its root. So how do you measure the ROI of something that changes everything? Attend this webinar to learn how to calculate cloud ROI using seven metrics you may not have considered.
  • Mitigate Risk with Hybrid DR in the Cloud Recorded: Oct 28 2015 50 mins
    Joe Conlin, TierPoint Solutions Engineer
    Blast and flood zones, terrorism and DDoS attacks. These are the new elements of a comprehensive DR plan that today must account for contingencies beyond backup. Attend this webinar to learn how to build a better plan by examining geography, cyberattack trends and potential targets; and the role hybrid cloud can play in mitigating threats while still offering users flexibility, manageability and availability.
Helping IT leaders get more from their IT investments
Live and on-demand webinars for IT professionals focused on hybrid IT solutions encompassing cloud, colocation, managed services, DRaaS, IT security, and more.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Evolving Cyber Threats: Targeting the Hidden Attack Surface of Automation
  • Live at: Dec 7 2017 7:00 pm
  • Presented by: Carl Herberger - Radware, Vice President, Global Security Solutions; host: Paul Mazzucco, TierPoint Chief Security Officer
  • From:
Your email has been sent.
or close