Hi [[ session.user.profile.firstName ]]

Cybersecurity Showcase Ep. III: Verizon's Threat and Vulnerability Portfolio

The number of security threats and vulnerabilities has exploded in recent years. Businesses must identify potential vulnerabilities and be proactive in assessing cyber threats and addressing any security gaps. Traditionally, these security vulnerabilities were detected using a computer program known as a vulnerability scanner, which scans networks, assets and applications for known weaknesses. But, in many cases, organizations may have complex vulnerabilities in their applications and business infrastructure that scanning tools alone can’t discover and more comprehensive assessment services are needed.

Additionally, many organizations want to identify what TTPs (Tactics, Techniques, and Procedures) are used by sophisticated threat actors to compromise networks in various ways after the initial foothold has been obtained. Many times the traditional exploitation of a vulnerability via a missing security patch isn’t the only or primary means to gain the initial foothold, but leveraging misconfigurations or abusing protocols and other means can be used.

This webinar will focus on how to position and sell three of Verizon’s Threat & Vulnerability assessment services:
• Penetration Testing: Uses manual testing and advanced exploitation techniques to assess a customer's environment for various types of vulnerabilities and attempts various types of post-exploitation activities to measure the danger those weaknesses may cause, so they can prepare before an attack occurs.
• Red Team Operations: Implements simulated sophisticated covert attacks to gauge the effectiveness of the customer’s defensive capabilities in terms of threat detection, response, and containment. It also serves as training exercises for defensive teams.
• Ransomware Attack Simulation: Tests the current state of processes and technical aspects of company defenses and identifies measures they can take to prepare for a Ransomware attack.
Live online Sep 16 6:00 pm UTC
or after on demand 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Kevin Horvath, Verizon
  • Channel
  • Channel profile
  • Verizon Threat Research Advisory Center MIB: All Star Panel Dec 15 2021 3:00 pm UTC 90 mins
    Chris Novak, John Grim, Dave Kennedy
    The end of 2021 is nearly here. Tune in to our All Star Panel of cybersecurity experts for a discussion summarizing where we've been and projections for where we're headed in cybersecurity, investigative response, and threat intelligence. Takeaways:

    • The biggest security challenges of 2021
    • Lessons learned from 2021
    • The way forward for 2022

    And then we'll turn things over to David Kennedy, Managing Principal, Open Source Intelligence to cover:
    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities
  • Verizon Threat Research Advisory Center MIB: PCI Attacks Nov 17 2021 3:00 pm UTC 90 mins
    John Grim, Neal Maguire, Dave Kennedy
    The Verizon Payment Security Report (PSR), first published in 2010, is the only report of its kind. The PSR provides an in-depth perspective on the regulatory landscape of the payment card industry (PCI). Join this session and find out about:

    • PFI (PCI Forensic Investigation) findings / trends
    • 2021 Payment Security Report highlights
    • The way forward: mitigating attacks / breach readiness

    And then we'll turn things over to David Kennedy, Managing Principal, Open Source Intelligence to cover:
    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities
  • Verizon Cyber Risk Roundtable Series Ep. 4 Nov 4 2021 4:00 pm UTC 75 mins
    Dave Grady, Verizon Security Evangelist
    Verizon presents The Cyber Risk Roundtable Series Episode 4

    In partnership with CrowdStrike

    In this 4-part webinar series, Verizon and partnering security experts discuss the state of cybersecurity and the role of security as a business enabler.

    The panel will review the latest data and research from Verizon’s gold standard research reports coupled with our field experience doing 600+ breach investigations every year to educate the cybersecurity community on ways to become more resilient and innovative through digital transformations.

    Cybersecurity stakeholders will learn how to…
    Focus on the most likely attack vectors for their industry and the resources available to build an agile, intelligence-driven security program.
    Ensure security has a seat at the table during product innovation and technology evaluations
    Build a collaborative relationship between security, network and IT teams, both tactically and strategically
    Leverage data to enable maximum return on program investments
  • Verizon Threat Research Advisory Center MIB: NIST CSF - Recover Oct 20 2021 2:00 pm UTC 90 mins
    Stefan Englbrecht, Dave Kennedy
    NIST CSF Recover – Oops they did it again: Preparation and Lessons Learned

    NIST CSF Recover is about developing and implementing appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity incident. Stefan Englbrecht, VTRAC Team, will cover how to use NIST CSF Recover to:

    • Develop a post-incident action plan
    • Learn from previous Incidents by conducting lessons-learned discussion and completing a postmortem review of any IR actions
    • Ensure continual maturation of an organization’s IR lifecycle

    And then we'll turn things over to David Kennedy, Managing Principal, Open Source Intelligence to cover:
    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities
  • Cybersecurity Innovation Showcase Ep. IV: What’s Lurking in Your Supply-Chain? Sep 16 2021 8:00 pm UTC 53 mins
    John Grim, Tony St. Clair
    Cybersecurity Innovation Showcase Series: In this 4-part webinar series, Verizon will present the most innovative security solutions designed to align with your organization’s digital transformation.

    Threat actors targeting your supply-chain, however small, have the potential for outsized impact to your organization. And to make matters worse, many cybersecurity practitioners have limited visibility around who or what resides within their supply-chain, and at every point along the supply-chain from development to disposal. Organizations with inadequate Supply-Chain Risk Management practices create various opportunities for malicious actors to exploit the “fog of war” in cyber defense by clouding visibility and limiting cyber defender abilities to prevent, mitigate, detect, and respond.

    In this webinar, Verizon Threat Research Advisory Center (VTRAC) security practitioners will share their perspectives on supply-chain risks and provide recommendations on how organizations can reduce exposure in their supply-chain.

    This webinar will explore:
    Common shortcomings of Supply-Chain Risk Management practices, controls and countermeasures
    Elements of a robust Supply-Chain Risk Management and effective Incident Response program
    Verizon solutions to reduce the supply-chain risk and detection and response when the need arises
  • Cybersecurity Showcase Ep. III: Verizon's Threat and Vulnerability Portfolio Sep 16 2021 6:00 pm UTC 60 mins
    Kevin Horvath, Verizon
    The number of security threats and vulnerabilities has exploded in recent years. Businesses must identify potential vulnerabilities and be proactive in assessing cyber threats and addressing any security gaps. Traditionally, these security vulnerabilities were detected using a computer program known as a vulnerability scanner, which scans networks, assets and applications for known weaknesses. But, in many cases, organizations may have complex vulnerabilities in their applications and business infrastructure that scanning tools alone can’t discover and more comprehensive assessment services are needed.

    Additionally, many organizations want to identify what TTPs (Tactics, Techniques, and Procedures) are used by sophisticated threat actors to compromise networks in various ways after the initial foothold has been obtained. Many times the traditional exploitation of a vulnerability via a missing security patch isn’t the only or primary means to gain the initial foothold, but leveraging misconfigurations or abusing protocols and other means can be used.

    This webinar will focus on how to position and sell three of Verizon’s Threat & Vulnerability assessment services:
    • Penetration Testing: Uses manual testing and advanced exploitation techniques to assess a customer's environment for various types of vulnerabilities and attempts various types of post-exploitation activities to measure the danger those weaknesses may cause, so they can prepare before an attack occurs.
    • Red Team Operations: Implements simulated sophisticated covert attacks to gauge the effectiveness of the customer’s defensive capabilities in terms of threat detection, response, and containment. It also serves as training exercises for defensive teams.
    • Ransomware Attack Simulation: Tests the current state of processes and technical aspects of company defenses and identifies measures they can take to prepare for a Ransomware attack.
  • Cybersecurity Showcase Ep. II: Close the gap between detection and action Sep 16 2021 4:00 pm UTC 60 mins
    Dave Grady, Verizon Security Evangelist
    Episode II: How to close the gap between compromise, discovery and action with Network Detection and Response

    Network security becomes increasingly complex with each passing day, making it critical that busy security teams have full visibility and threat detection capabilities. A wide range of security appliances like firewalls, intrusion detection systems, and forensics may already be in place, but managing multiple interfaces and data sets may be more than any one person - or team - can use effectively.

    Cloud-delivered network detection and response unifies network threat detection, forensics and integrated response, providing deep visibility into enterprise, cloud and industrial environments. The cloud makes it possible to apply multiple advanced analysis techniques such as machine learning, retrospective analysis, threat intelligence, behavior and anomaly detection in parallel to metadata and full-packet captures (PCAPs). In this webinar, Verizon cybersecurity experts will lead a discussion and present real use cases that show how to use network detection and response to deliver extremely reliable detections that leave attackers — even those executing multi-stage attacks — with no place to hide.
  • Cybersecurity Showcase Ep. I SASE: How to secure today’s evolving networks Sep 16 2021 2:00 pm UTC 60 mins
    Dave Grady, Verizon Security Evangelist
    In this 4-part webinar series, Verizon will present the most innovative security solutions designed to align with your organization’s digital transformation.

    New and emerging technologies are driving digital transformation across all industries, moving companies closer to becoming real-time enterprises capable of operating in ways once unimaginable. From Cloud and 5G to applications, next-generation technologies are enabling companies to run faster, smarter and better than ever before.

    This webinar explores some of the key cybersecurity implications of new and emerging technologies, with the goal of educating security program influencers about an emerging framework for meeting this challenge – SASE, a Secure Access Service Edge.

    Verizon believes SASE is merging the Network and Security together, in the cloud – without the added complexity. It’s the evolution of delivering networking and security from the cloud to protect users, applications and data. It is an extension of NaaS – including security without sacrificing performance.

    In this webcast from Verizon, you’ll hear from the front lines of SASE some best practices, strategies, and crucial considerations for securing today’s modern, rapidly evolving networks.

    During this webinar, you’ll learn:
    • The networking solutions, applications, and devices that are key components in SASE
    • SASE core capabilities
    • How a SASE strategy fits into an overall security strategy
  • Verizon Threat Research Advisory Center MIB: NIST CSF - Respond Sep 15 2021 2:00 pm UTC 90 mins
    Clarence Hill, Dave Kennedy
    NIST CSF Respond – Investigative Response

    In the grand scheme of cybersecurity incidents, data breaches tend to be the most severe and the most important to prepare for. Join this session for an update on the the cyberthreat landscape and takeaway:

    • Cyber threat actors and actions
    • Challenges with the cyber threat landscape
    • Tool solutions and approaches as a way forward

    And then we'll turn things over to David Kennedy, Managing Principal, Open Source Intelligence to cover:
    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities
  • Verizon Threat Research Advisory Center MIB: NIST CSF - Detect Aug 18 2021 2:00 pm UTC 90 mins
    John Grim, Dave Kennedy
    NIST CSF Detect – Threat Hunting

    The best defense is a strong offense. Threat hunting has become a necessary part of proactive cybersecurity. Endpoint Detection and Response (EDR) and Network Detection and Response (NDR) technologies play an important role in a swift and effective threat detection and response capability. Join this session and find out about:

    • Cyber threat landscape overview
    • Threat hunting toolkit components
    • Threat hunting approach and considerations
    And then we'll turn things over to David Kennedy, Managing Principal, Open Source Intelligence to cover:
    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities
  • Demystifying Fixed Wireless Access Part 2 Recorded: Jul 30 2021 28 mins
    TBD
    Demystifying Fixed Wireless Access, Part 2: Moving Beyond Traditional Cable Internet

    Unreliable or overly complex networks can result in lower productivity, lost opportunities, poor customer experiences and unnecessary expenses. Fixed wireless access could be the solution your business needs.

    During our recent webinar with experts from three technology companies, we discussed how fixed wireless access can help replace aging connections and untangle complex configurations while working as a viable alternative to traditional broadband.
  • Verizon Cyber Risk Roundtable Series Ep. 3: Strengthening Security in the Cloud Recorded: Jul 29 2021 19 mins
    Dave Grady, Verizon Security Evangelist
    In the next installment of our four-part webinar series examining the state of cyber security, we’ll look at the impact of the cloud on cybersecurity. With businesses moving applications and infrastructure to the cloud, and with end-users increasingly connecting by mobile devices, it’s time to move to a new, cloud-native zero-trust approach to networking and security. During the roundtable, experts from Verizon and Zscaler will discuss:

    ● Accelerating digital transformation by enabling secure cloud connectivity
    ● Embracing a new architectural approach to networking and security
    ● Increasing user productivity and reducing costs while simplifying IT
    ● Examining the latest data from the 2021 Data Breach Investigations Report
  • Cybersecurity Innovation Showcase Ep. III SASE: How to secure today’s networks Recorded: Jul 28 2021 35 mins
    Dave Grady, Beth Cohen & Yin Johnson
    Cybersecurity Innovation Showcase Series: In this 3-part webinar series, Verizon will present the most innovative security solutions designed to align with your organization’s digital transformation.

    New and emerging technologies are driving digital transformation across all industries, moving companies closer to becoming real-time enterprises capable of operating in ways once unimaginable. From Cloud and 5G to applications, next-generation technologies are enabling companies to run faster, smarter and better than ever before.
     
    This webinar explores some of the key cybersecurity implications of new and emerging technologies, with the goal of educating security program influencers about an emerging framework for meeting this challenge – SASE, a Secure Access Service Edge.
     
    There are varying degrees of SASE definitions, including various components that can be based on customer need and requirements. Even Gartner, the analyst firm who coined the term, has a very fluid definition of the evolving solution.
     
    Verizon believes SASE is merging the Network and Security together, in the cloud – without the added complexity. It’s the evolution of delivering networking and security from the cloud to protect users, applications and data. It is an extension of NaaS – including security without sacrificing performance.
     
    In this webcast from Verizon, you’ll hear from the front lines of SASE some best practices, strategies, and crucial considerations for securing today’s modern, rapidly evolving networks.
     
    During this webinar, you’ll learn:
    The networking solutions, applications, and devices that are key components in SASE
    SASE core capabilities
    How a SASE strategy fits into an overall security strategy
  • Verizon Threat Research Advisory Center MIB: NIST CSF - Protect Recorded: Jul 21 2021 72 mins
    Dave Kennedy
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    The process of executing a cybercriminal campaign has been simplified, automated, and democratized by the proliferation of very specialized services catering to every aspect of the underground economy.

    Join us to learn more about automation tactics such as:

    • Banking injects
    • Exploit kits
    • Spam and phishing services
    • Automated marketplaces
    • And more!


    And then we'll turn things over to David Kennedy, Managing Principal, Open Source Intelligence to cover:
    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities
  • Cybersecurity Innovation Showcase Ep. II: What’s Lurking in Your Supply-Chain? Recorded: Jul 21 2021 53 mins
    John Grim, Tony St. Clair
    Cybersecurity Innovation Showcase Series: In this 3-part webinar series, Verizon will present the most innovative security solutions designed to align with your organization’s digital transformation.

    Threat actors targeting your supply-chain, however small, have the potential for outsized impact to your organization. And to make matters worse, many cybersecurity practitioners have limited visibility around who or what resides within their supply-chain, and at every point along the supply-chain from development to disposal. Organizations with inadequate Supply-Chain Risk Management practices create various opportunities for malicious actors to exploit the “fog of war” in cyber defense by clouding visibility and limiting cyber defender abilities to prevent, mitigate, detect, and respond.

    In this webinar, Verizon Threat Research Advisory Center (VTRAC) security practitioners will share their perspectives on supply-chain risks and provide recommendations on how organizations can reduce exposure in their supply-chain.

    This webinar will explore:
    Common shortcomings of Supply-Chain Risk Management practices, controls and countermeasures
    Elements of a robust Supply-Chain Risk Management and effective Incident Response program
    Verizon solutions to reduce the supply-chain risk and detection and response when the need arises
  • Verizon 2021 DBIR report presentation Recorded: Jul 19 2021 57 mins
    Marc Chousterman, Principal Architect - Security Solutions - Verizon CISSP, CISM, CRISC, GCTI, GCFE, GCFA, CE|H, CCSK
    Rapport DBIR 2021
    Comprendre les tendances de la cybercriminalité
    Obtenez les dernières informations sur les tendances en matière de cybercriminalité grâce à la présentation du 14e rapport annuel de Verizon sur les enquêtes relatives aux compromissions de données (DBIR). Le DBIR offre une analyse approfondie sur les actions malveillantes des cybercriminels au cours de l'année 2020 et sur les raisons de leurs succès. Cette année, nous avons analysé près de 80 000 incidents provenant de 88 pays
  • Cybersecurity Innovation Showcase Ep.I: Cyber Risk Monitoring, Risk Assessment Recorded: Jul 14 2021 56 mins
    Mike Kimiecik
    Cybersecurity Innovation Showcase Series: In this 3-part webinar series, Verizon will present the most innovative security solutions designed to align with your organization’s digital transformation.

    Organizations, regardless of size or industry, are at risk of cyberattack— creating a growing need to understand external and internal threats, risks, vulnerabilities and security postures. Traditional approaches such as the use of security questionnaires and on-site reviews, have big resource limitations, especially when hundreds or even thousands of parties are involved. Verizon’s Cyber Risk Monitoring, Risk Assessment Program helps our customers align security investments to deploy defenses efficiently, address the needs for a risk management program and make the most of your security budget. Our team will help you navigate through the complexities of meeting executive leadership requirements and securing your enterprise from threats.

    Verizon can help you understand your risk when compared with the threat scenarios and attack patterns identified in our Data Breach Investigations Report. We use a proprietary scoring method to help you prove due diligence to auditors, clients and business partners, provide quantitative metrics on your security strategy to stakeholders and business leaders, and offer better peace of mind knowing your organization is prepared. Verizon’s Cyber Risk Monitoring, Risk Assessment Program supports IT enterprise initiatives and provides executive leadership with KPI’s, priority of effort recommendations and metrics to effectively communicate risk to key stakeholders.

    Join this informative webinar to learn more about how Verizon’s Cyber Risk Monitoring, Risk Assessment Program can help you make more informed cyber-risk decisions, backed by the integrity, capability and reliability of our services and people.
  • How CX Leaders Have Navigated ‘The Great Disruption’ Recorded: Jun 28 2021 53 mins
    Dr Steve Nuttall, Fifth Quadrant’s Director of CX Research | Verizon Panelists Mathew Wells & Amelia Diggle
    Join CX experts from Verizon and research partner, Fifth Quadrant, exploring advancing levels of CX Maturity Levels in APAC. This presentation has been designed to give you a deeper understanding of the 2021 CX Maturity Report – APAC, directly from the people that produced it.

    They'll take you through the foundations for CX success that leaders have capitalised on during the pandemic. It's an unmissable opportunity to advance your organisation's customer experience strategy for today and the future.

    Watch now to discover:
    -The differences between CX leaders and laggards
    -How CX leaders navigated “The Great Disruption’
    -The evolution of the contact centre operating model and the future of work
    -How Artificial Intelligence is being deployed for CX
  • 2021 Verizon Data Breach Investigations Report (DBIR) CISO Panel Recorded: Jun 24 2021 52 mins
    Martin Kessler (Verizon), Andy Bonillo (Ciena), Tony Faria (FM Global), Moderator: Dave Grady
    The 2021 Verizon Data Breach Investigations Report (DBIR), now in its fourteenth year, is an industry benchmark for information on global cybersecurity breaches and threat patterns. Join our panel of DBIR authors and distinguished CISOs as they discuss key findings from the report and what the data really mean for the cybersecurity industry.
Delivering the connected world. Simply. Securely. Reliably.
We deliver the promise of the connected world.

In today’s rapidly transforming environment, we integrate, secure and operate the networks, and mobile technologies that help businesses and governments around the globe expand reach, increase productivity, improve agility, and maintain longevity.

Our solutions across Connectivity, Security and Advanced Business Communications are designed to help enterprises pursue new possibilities and create entirely new revenue streams – more efficiently than ever.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Cybersecurity Showcase Ep. III: Verizon's Threat and Vulnerability Portfolio
  • Live at: Sep 16 2021 6:00 pm
  • Presented by: Kevin Horvath, Verizon
  • From:
Your email has been sent.
or close