Hi [[ session.user.profile.firstName ]]

Teaching Computers to Lie to Defend Themselves

This presentation will cover some Practical Applications of Deception and use cases with examples from professor Mohammed Almeshekah, PhD from Purdue and MSc from RHUL. He is currently an assistant professor at KSU and actively consulting. He has worked with Google's Chrome security team, Firefox, and published dozens of papers and chapters in security, as well as built a number of tools.
Recorded Jul 19 2017 54 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Professor Mohammed Almeshekah
Presentation preview: Teaching Computers to Lie to Defend Themselves

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Agentless Defense Against Ransomware Aug 10 2017 5:00 pm UTC 60 mins
    Xiuefeng Bai, Acalvio and Vijay Chuahan, Splunk
    Agentless Defense Against Ransomware
  • Teaching Computers to Lie to Defend Themselves Recorded: Jul 19 2017 54 mins
    Professor Mohammed Almeshekah
    This presentation will cover some Practical Applications of Deception and use cases with examples from professor Mohammed Almeshekah, PhD from Purdue and MSc from RHUL. He is currently an assistant professor at KSU and actively consulting. He has worked with Google's Chrome security team, Firefox, and published dozens of papers and chapters in security, as well as built a number of tools.
  • NotPetya: Wiper or Ransomware & How to Protect Yourself Recorded: Jul 7 2017 60 mins
    Chris Roberts (Acalvio), John Bambenek (Fidelis), Jay Beale (Inguardians), Vince in the Bay
    Join this interactive Q&A session and learn the facts about the recent NotPetya attack on the Ukraine and the collateral damage it caused by crippling large businesses and organizations worldwide.

    Topics that will be discussed during this live Q&A panel will include:
    - How is NotPetya different from Petya and Wannacry?
    - Timeline of the attack
    - Impact and aftermath
    - What's next? How can companies better protect their data against similar attacks in the future?

    Moderator:
    - Vincent Tocce of the Vince in the Bay Podcast

    Speakers:
    - Chris Roberts, Chief Security Architect at Acalvio
    - Jay Beale, COO & CTO of Inguardians
    - John Bambenek, Threat Systems Manager at Fidelis Cybersecurity
  • Cyber Deception Intro Recorded: Jun 28 2017 1 min
    RIck Moy
    1 minute video overview of deception
  • Trends in Fintech Security - Mobile Payment Apps, Risks & Cybersecurity Recorded: May 18 2017 75 mins
    Ted Eull (NowSecure), JP Bourget (Syncurity), RJ Gazarek (Thycotic), Jason Kent (AsTech)
    Fintech may still be in its early stages, but it's seen tremendous growth and is expected to see global investments exceed $150 billion in 2017. With the proliferation of mobile apps, cybersecurity is extremely important. Trust is a key difference maker for customers, so fintech companies need to ensure that their sensitive client information stays secure.

    Join this panel roundtable of cyber security experts as they discuss:
    - The top cyber threats financial institutions are facing
    - Ransomware, data loss & BCDR
    - Mobile banking apps and security vulnerabilities
    - Recommendations on improving security and establishing consumer trust

    Speakers:
    - JP Bourget, CSO of Syncurity
    - Ted Eull, VP Privacy and Risk at NowSecure
    - RJ Gazarek, Product Manager at Thycotic
    - Jason Kent, CTO of AsTech Consulting
  • Securing FinTech through Deception 2.0 Technologies Recorded: May 17 2017 58 mins
    Chris Roberts, Chief Security Architect, Acalvio
    Why the same old things don’t work, and how to build in a strategic advantage that will provide early warning to security teams, while also deceiving and delaying attackers who have already penetrated existing defenses.

    About the Presenter:
    Regarded as one of the world’s foremost experts on counter threat intelligence within the cyber security industry, Chris Roberts is the chief security architect for Acalvio Technologies, helping to drive technology innovation and product leadership. Roberts directs a portfolio of services within Acalvio designed to improve the physical and digital security posture of both enterprise, industrial and government clients. In addition, Roberts works to shape the next generation of deception platforms and helps companies with their maturity modeling and overall security solutions.
  • BrightTALK at RSA - Chris Roberts: Cyber Lessons for Trump's Administration Recorded: Mar 16 2017 17 mins
    Chris Roberts, Chief Security Architect at Acalvio Technologies and Josh Downs, Community Manager at BrightTALK
    BrightTALK caught up with Acalvio Technologies security expert Chris Roberts for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The Yahoo breach and steps to take to avoid it happening to other companies
    - Communication between the techies and senior management
    - Cyber security lessons that the Trump administration could learn
    - The Russian hack of the US election
    - AI & Machine learning in Cyber Security
    - The need for regulation in the growing world of the IoT
    - Improving equality in the cyber security industry

    About the Speaker:
    Regarded as one of the world’s foremost experts on counter threat intelligence within the cyber security industry, Chris Roberts is the chief security architect for Acalvio Technologies, helping to drive technology innovation and product leadership. Roberts directs a portfolio of services within Acalvio designed to improve the physical and digital security posture of both enterprise, industrial and government clients. In addition, Roberts works to shape the next generation of deception platforms and helps companies with their maturity modeling and overall security solutions.
  • Deception 2.0 Intro Recorded: Feb 28 2017 1 min
    Acalvio
    Throughout history, deception has been a standard part of warfare. The same is true in cyberwarfare. With the introduction of Deception 2.0, vast new capabilities of detection are available to organizations in an automated, scalable, authentic fashion.
  • Who’s in your network and how DO you know they are there? Recorded: Jan 27 2017 60 mins
    Chris Roberts, Chief Security Architect, Acalvio
    With the increasing focus on MTTD (Mean Time To Discovery) now north of 200 days in many cases, there is a renewed effort to curb the ever increasing advantage the attacker has in the very networks we are meant to be protecting. The efforts we pour into static defense have not worked for years, so we have to focus on more capable solutions that blend active and preventative/proactive technologies in one cohesive solution….it is to that breed of solutions that we turn our attention and dissect the options out there, point out the good, the bad and the downright ugly….Let’s see if we can actually make a dent in the 200 days.
  • How the Heck Did They Miss It? Lessons to Learn from the Yahoo Breach Recorded: Jan 13 2017 49 mins
    Chris Roberts, Chief Security Architect at Acalvio Technologies
    With 2016 behind us, is this the last Yahoo breach we’ll hear about? Join Chris Roberts, Chief Security Architect at Acalvio Technologies as he discusses the lessons to be learned from the recently disclosed Yahoo breaches, and the nagging questions infosecurity professionals will try to answer in 2017.
  • Honeypots are dead. Long live honeypots! Recorded: Nov 15 2016 64 mins
    Chris Roberts, Chief Security Architect, Acalvio
    Advanced attacks continue to be increasingly difficult to detect, with an average mean time to detection still hovering over 200 days. We will discuss modern techniques used by attackers to penetrate defenses and move laterally through your organization undetected. Honeypots have historically offered some detection benefits, yet have been challenging to effectively and efficiently scale within the enterprise. Find out how modern Deception 2.0 technology changes this.
  • Acalvio Deception 2.0 Advanced Threat Defense Overview Recorded: Oct 24 2016 5 mins
    Acalvio
    Acalvio provides Advanced Threat Defense (ATD) solutions to detect, engage and respond to malicious activity inside the perimeter. The solutions are anchored on patented innovations in Deception and Data Science. This enables a DevOps approach to ATD, enabling ease of deployment, monitoring and management. Acalvio enriches its threat intelligence by data obtained from internal and partner eco-systems, enabling customers to benefit from defense in depth, reduce false positives, and derive actionable intelligence for remediation.
Acalvio
Acalvio provides Advanced Threat Defense (ATD) solutions to detect, engage and respond to malicious activity inside the perimeter. The solutions are anchored on patented innovations in Deception and Data Science.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Teaching Computers to Lie to Defend Themselves
  • Live at: Jul 19 2017 5:00 pm
  • Presented by: Professor Mohammed Almeshekah
  • From:
Your email has been sent.
or close