Hi [[ session.user.profile.firstName ]]

Detecting Attackers Within Your Networks Using Autonomous Deception

This session will discuss the ongoing problem of identifying attackers who have successfully evaded prevention technologies such as firewalls, IPS and antivirus. It will focus on deception technology and its practical approaches to quickly detecting attackers already inside your network. Special attention will be given to working with SIEMs to validate alerts, as well as incident response and forensic procedures.
Recorded Jan 11 2018 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
John Bradshaw, Sr. Director, Solutions Engineering at Acalvio Technologies and Rick Moy, CMO, Acalvio Technologies
Presentation preview: Detecting Attackers Within Your Networks Using Autonomous Deception

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Decoding the Matrix: Deception-Borne Threat Intelligence Recorded: Jul 18 2018 44 mins
    John Bradshaw, Sr. Director, Solutions Engineering at Acalvio Technologies
    Deception-based solutions can provide a wealth of information about how adversaries behave as they attempt to complete their mission. Depending on the level of engagement organizations desire to setup in their deception solution, information gleaned can include basic network connection information or every keystroke, command and action taken when a system is accessed. Understanding where in the attack life-cycle your deception information is coming from is critical to knowing how to utilize that information to strengthen your SOC / IR Operational Workflows. This webinar will discuss the types of information that can be gathered by Deception Solutions based on different levels of engagement and how that information can be used in the most effective manner with your Threat Intelligence and Security Analytics platforms.

    About the Speaker:

    John Bradshaw, Sr. Director, Solutions Engineering at Acalvio Technologies, has more than 25 years of experience in the Cyber Security industry focusing on advanced, targeted threats. He held senior leadership roles at Mandiant, ArcSight, Internet Security Systems, Lastline, and UUNET.
  • TAG-Cyber's Ed Amoroso Interviews Acalvio Recorded: Jul 14 2018 22 mins
    Ed Amoroso and John Bradshaw
    TAG-Cyber's Ed Amoroso Interviews Acalvio's John Bradshaw about advanced threats, deception and more.
  • Three Minutes Until the Apocalypse Recorded: Mar 20 2018 47 mins
    John Bradshaw, Director, Solutions Engineering, Acalvio
    Three minutes. In general, front-line security operations analysts have three minutes to evaluate an alert on their front pane of glass and determine if it warrants further investigation or can be dismissed as "not impactful to the organization". Your analysts must be right every single time in order to prevent a breach that could cost millions of dollars, the adversary - they only need to be right one time.

    This session will illustrate:

    - How SOC / IR teams can utilize high-fidelity alerts such as those generated by Deception-based solutions.
    - Power of correlation and data analytics to reduce the time it takes to answer basic triage questions on an alert.
    - How to develop actionable visualizations that improve the hunt for adversaries in your network.
  • Will Artificial Intelligence Strengthen Your Security Stance? Recorded: Feb 15 2018 59 mins
    Chris Roberts, Acalvio | Chris Morales, Vectra | Vikram Kapoor, Lacework | Willy Leichter, Virsec
    The volume and frequency of cyber-attacks makes it impossible for security analysts to use manual threat analysis to keep up with a rapidly changing threat landscape.

    Innovations in artificial intelligence (AI) now make it possible to automate mundane security operations, and provide security analysts with access to large data sets. The benefits are significant: analyst time is freed-up, and they have access to better information enabling smarter, faster decisions about how to continually improve the security posture of their organization.

    Join this Q&A panel on how AI can help improve your organization's overall security.

    Speakers:
    - Chris Roberts, Chief Security Architect, Acalvio
    - Chris Morales, Head of Security Analytics, Vectra
    - Vikram Kapoor, Co-Founder and CTO, Lacework
    - Willy Leichter, Vice President of Marketing, Virsec
  • Fusion of Deception and AI for Active Defense Recorded: Jan 17 2018 44 mins
    Satnam Singh, PhD, Chief Data Scientist at Acalvio
    Recent cyber attacks and data breaches clearly show that traditional perimeter-based information security tools are ineffective against ransomware attacks, insider attacks, multi-stage attacks, and APTs.

    Cyber criminals have crafted tools and devised techniques that enable them to evade detection by traditional security tools. Also, even if real alerts are triggered, they can either get lost among a large number of false alerts or lost in a deluge of alerts, resulting in very low signal/noise ratio.

    Deception provides an alternative tool to traditional tools with nearly 0% false positive rate to detect, engage, trap and remediate inside-network attacks. Furthermore, by fusing deception with AI, one does not need to boil the ocean to detect anomalies in raw data. Instead anomalies are surfaced itself when an attacker bumps into the deceptions. Using AI, deception alerts are correlated with other data sources to provide actionable insights about the adversary profile, lateral movements and attack tactics. In this talk, we share our work on the fusion of deception and AI for active defense.
  • Detecting Attackers Within Your Networks Using Autonomous Deception Recorded: Jan 11 2018 60 mins
    John Bradshaw, Sr. Director, Solutions Engineering at Acalvio Technologies and Rick Moy, CMO, Acalvio Technologies
    This session will discuss the ongoing problem of identifying attackers who have successfully evaded prevention technologies such as firewalls, IPS and antivirus. It will focus on deception technology and its practical approaches to quickly detecting attackers already inside your network. Special attention will be given to working with SIEMs to validate alerts, as well as incident response and forensic procedures.
  • Agentless Defense Against Ransomware Recorded: Aug 22 2017 56 mins
    Raj Gopalakrishna, Acalvio and Vijay Chuahan, Splunk
    Agentless Defense Against Ransomware with Splunk and Acalvio
  • Power To The People - Knowledge Is Power Recorded: Jul 26 2017 50 mins
    Debra Farber, ITSPmagazine | Chris Roberts, Acalvio | Dr. Christopher Pierson, Viewpost | Arun Vishwanath, SUNY Buffalo
    - Broadcast LIVE from Las Vegas during Black Hat 2017 -
    As a society, we continue to focus on the capabilities that new technological products and services bring to bear, leaving the security - or rather, the safety - conversation for a later date and time… if at all.

    Why is this? Perhaps it’s because we don’t care. Or, perhaps it’s because we don’t understand how things work. Or, maybe it’s because we don’t know all the technical mumbo jumbo. Or, it could just be that we expect “someone else” to take care of it for us. For example, every car has a seat belt, right? We don’t have to ask for the car dealer to add seat belts for us and there really aren’t different types of seat belts available in the commercial car arena. Cars just come with seat belts - period. We expect them to be there - even if some people choose to not wear them.

    Regardless of the reason(s) behind the lack of conversation surrounding cybersecurity, we should all be able to agree on one simple fact: we use these new gadgets and services completely unfettered - with little to no regard to the risks we face for our privacy and even our safety.

    Attend this session to gain the initial knowledge necessary by:
    - Learning to ask is this thing secure?
    - Understanding how or why it is or isn’t safe to use.
    - Identifying your role in your own cyber safety and that of those around you.

    It’s time to open our eyes and become aware of our surroundings. Join us to become aware.

    Moderator:
    - Debra Farber, Host of The Privacy Pact, ITSPmagazine

    Panelists:
    - Chris Roberts, Chief Security Architect, Acalvio Technologies
    - Dr. Christopher Pierson, CSO and General Counsel, Viewpost
    - Arun Vishwanath, Associate Professor at SUNY Buffalo & Black Hat Presenter
  • Teaching Computers to Lie to Defend Themselves Recorded: Jul 19 2017 54 mins
    Professor Mohammed Almeshekah
    This presentation will cover some Practical Applications of Deception and use cases with examples from professor Mohammed Almeshekah, PhD from Purdue and MSc from RHUL. He is currently an assistant professor at KSU and actively consulting. He has worked with Google's Chrome security team, Firefox, and published dozens of papers and chapters in security, as well as built a number of tools.
  • NotPetya: Wiper or Ransomware & How to Protect Yourself Recorded: Jul 7 2017 60 mins
    Chris Roberts (Acalvio), John Bambenek (Fidelis), Jay Beale (Inguardians), Vince in the Bay
    Join this interactive Q&A session and learn the facts about the recent NotPetya attack on the Ukraine and the collateral damage it caused by crippling large businesses and organizations worldwide.

    Topics that will be discussed during this live Q&A panel will include:
    - How is NotPetya different from Petya and Wannacry?
    - Timeline of the attack
    - Impact and aftermath
    - What's next? How can companies better protect their data against similar attacks in the future?

    Moderator:
    - Vincent Tocce of the Vince in the Bay Podcast

    Speakers:
    - Chris Roberts, Chief Security Architect at Acalvio
    - Jay Beale, COO & CTO of Inguardians
    - John Bambenek, Threat Systems Manager at Fidelis Cybersecurity
  • Cyber Deception Intro Recorded: Jun 28 2017 1 min
    RIck Moy
    1 minute video overview of deception
  • Trends in Fintech Security - Mobile Payment Apps, Risks & Cybersecurity Recorded: May 18 2017 75 mins
    Ted Eull (NowSecure), JP Bourget (Syncurity), RJ Gazarek (Thycotic), Jason Kent (AsTech)
    Fintech may still be in its early stages, but it's seen tremendous growth and is expected to see global investments exceed $150 billion in 2017. With the proliferation of mobile apps, cybersecurity is extremely important. Trust is a key difference maker for customers, so fintech companies need to ensure that their sensitive client information stays secure.

    Join this panel roundtable of cyber security experts as they discuss:
    - The top cyber threats financial institutions are facing
    - Ransomware, data loss & BCDR
    - Mobile banking apps and security vulnerabilities
    - Recommendations on improving security and establishing consumer trust

    Speakers:
    - JP Bourget, CSO of Syncurity
    - Ted Eull, VP Privacy and Risk at NowSecure
    - RJ Gazarek, Product Manager at Thycotic
    - Jason Kent, CTO of AsTech Consulting
  • Securing FinTech through Deception 2.0 Technologies Recorded: May 17 2017 58 mins
    Chris Roberts, Chief Security Architect, Acalvio
    Why the same old things don’t work, and how to build in a strategic advantage that will provide early warning to security teams, while also deceiving and delaying attackers who have already penetrated existing defenses.

    About the Presenter:
    Regarded as one of the world’s foremost experts on counter threat intelligence within the cyber security industry, Chris Roberts is the chief security architect for Acalvio Technologies, helping to drive technology innovation and product leadership. Roberts directs a portfolio of services within Acalvio designed to improve the physical and digital security posture of both enterprise, industrial and government clients. In addition, Roberts works to shape the next generation of deception platforms and helps companies with their maturity modeling and overall security solutions.
  • BrightTALK at RSA - Chris Roberts: Cyber Lessons for Trump's Administration Recorded: Mar 16 2017 17 mins
    Chris Roberts, Chief Security Architect at Acalvio Technologies and Josh Downs, Community Manager at BrightTALK
    BrightTALK caught up with Acalvio Technologies security expert Chris Roberts for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The Yahoo breach and steps to take to avoid it happening to other companies
    - Communication between the techies and senior management
    - Cyber security lessons that the Trump administration could learn
    - The Russian hack of the US election
    - AI & Machine learning in Cyber Security
    - The need for regulation in the growing world of the IoT
    - Improving equality in the cyber security industry

    About the Speaker:
    Regarded as one of the world’s foremost experts on counter threat intelligence within the cyber security industry, Chris Roberts is the chief security architect for Acalvio Technologies, helping to drive technology innovation and product leadership. Roberts directs a portfolio of services within Acalvio designed to improve the physical and digital security posture of both enterprise, industrial and government clients. In addition, Roberts works to shape the next generation of deception platforms and helps companies with their maturity modeling and overall security solutions.
  • Deception 2.0 Intro Recorded: Feb 28 2017 1 min
    Acalvio
    Throughout history, deception has been a standard part of warfare. The same is true in cyberwarfare. With the introduction of Deception 2.0, vast new capabilities of detection are available to organizations in an automated, scalable, authentic fashion.
  • Who’s in your network and how DO you know they are there? Recorded: Jan 27 2017 60 mins
    Chris Roberts, Chief Security Architect, Acalvio
    With the increasing focus on MTTD (Mean Time To Discovery) now north of 200 days in many cases, there is a renewed effort to curb the ever increasing advantage the attacker has in the very networks we are meant to be protecting. The efforts we pour into static defense have not worked for years, so we have to focus on more capable solutions that blend active and preventative/proactive technologies in one cohesive solution….it is to that breed of solutions that we turn our attention and dissect the options out there, point out the good, the bad and the downright ugly….Let’s see if we can actually make a dent in the 200 days.
  • How the Heck Did They Miss It? Lessons to Learn from the Yahoo Breach Recorded: Jan 13 2017 49 mins
    Chris Roberts, Chief Security Architect at Acalvio Technologies
    With 2016 behind us, is this the last Yahoo breach we’ll hear about? Join Chris Roberts, Chief Security Architect at Acalvio Technologies as he discusses the lessons to be learned from the recently disclosed Yahoo breaches, and the nagging questions infosecurity professionals will try to answer in 2017.
  • Honeypots are dead. Long live honeypots! Recorded: Nov 15 2016 64 mins
    Chris Roberts, Chief Security Architect, Acalvio
    Advanced attacks continue to be increasingly difficult to detect, with an average mean time to detection still hovering over 200 days. We will discuss modern techniques used by attackers to penetrate defenses and move laterally through your organization undetected. Honeypots have historically offered some detection benefits, yet have been challenging to effectively and efficiently scale within the enterprise. Find out how modern Deception 2.0 technology changes this.
  • Acalvio Deception 2.0 Advanced Threat Defense Overview Recorded: Oct 24 2016 5 mins
    Acalvio
    Acalvio provides Advanced Threat Defense (ATD) solutions to detect, engage and respond to malicious activity inside the perimeter. The solutions are anchored on patented innovations in Deception and Data Science. This enables a DevOps approach to ATD, enabling ease of deployment, monitoring and management. Acalvio enriches its threat intelligence by data obtained from internal and partner eco-systems, enabling customers to benefit from defense in depth, reduce false positives, and derive actionable intelligence for remediation.
Acalvio
Acalvio provides Advanced Threat Defense (ATD) solutions to detect, engage and respond to malicious activity inside the perimeter. The solutions are anchored on patented innovations in Deception and Data Science.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Detecting Attackers Within Your Networks Using Autonomous Deception
  • Live at: Jan 11 2018 6:00 pm
  • Presented by: John Bradshaw, Sr. Director, Solutions Engineering at Acalvio Technologies and Rick Moy, CMO, Acalvio Technologies
  • From:
Your email has been sent.
or close