Hi [[ session.user.profile.firstName ]]

Top Tools and Solutions to Fight Data Mining Malware

Nearly 1 million new malware threats are released every day. The sheer deluge of unique malware samples makes it difficult for incident responders to keep up to protect their networks. Even more difficult is the task for investigators and law enforcement to keep up with the size and number of command-and-control networks and criminal operations.
Join this presentation to learn about the solutions and tools you can employ to monitor criminal infrastructure and make it easy for incident handlers to identify problems on their network, for security analysts to protect their networks and for law enforcement to have reliable near-time information for their operations.
Recorded Aug 9 2016 48 mins
Your place is confirmed,
we'll send you email reminders
Presented by
John Bambenek, Threat Systems Manager at Fidelis Cybersecurity
Presentation preview: Top Tools and Solutions to Fight Data Mining Malware

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Key Considerations for Building Stronger Security Recorded: Jan 18 2018 60 mins
    John Bambenek (Fidelis) | Mike Bruemmer (Experian) | Kevin Lee (Sift Science) | Dennis Leber (Commonwealth of Kentucky)
    In the age of breaches and increased cyber attacks, security professionals are looking for the best ways to secure their organizations and prepare against upcoming cyber threats. Join this panel of experts are they look back the biggest events of 2017 and provide their recommendations for CISO's on what to look out for in the next months and how to improve their organization's cyber security in 2018.

    - Breaches and (Compromised) Identity
    - Lessons learned from 2017's major breaches (Equifax, Uber, etc.)
    - Fighting cyber fraud, identity theft, account takeovers
    - The likelihood of GDPR leading to companies not disclosing breaches
    - Cyber attack trends on the horizon
    - How to protect against these attacks and build a more resilient enterprise

    Speakers:
    - John Bambenek, Threat Systems Manager, Fidelis Cybersecurity
    - Dennis Leber, CISO at Cabinet for Health and Family Services, Commonwealth of Kentucky
    - Kevin Lee, Trust and Safety Architect, Sift Science
    - Michael Bruemmer, VP Consumer Protection, Experian Consumer Services
  • Defending Against Ransomware in 2017 Recorded: Sep 26 2017 63 mins
    John Bambenek (Fidelis Cybersecurity), Masha Sedova (Elevate Security), Jay Beale (InGuardians)
    Hacking and malware attacks, including ransomware attacks, are a major cause of breaches in 2017. With high-profile ransomware attacks on the rise, enterprises and small businesses worldwide are looking to better secure their data from cyber criminals and more nefarious attackers.

    Join this interactive Q&A session with security experts across industries to learn more about:
    - What can we learn from Wannacry, NotPetya and other ransomware attacks seen in 2017
    - Financial motivation or disruption
    - Who is at risk of a ransomware attack
    - What to do before, during, and after a ransomware attack
    - How can we better protect our businesses, organizations, governments and infrastructure from cyber attacks
    - Urgent steps to take today

    Moderator:
    - Jay Beale, CTO & COO of InGuardians

    Speakers:
    - John Bambenek, Threat Systems Manager, Fidelis Cybersecurity
    - Masha Sedova, Co-founder of Elevate Security
  • Harvey and Irma Phishing Scams & Social Engineering Recorded: Sep 7 2017 60 mins
    John Bambenek (Fidelis), Dan Lohrmann (Security Mentor), Nathan Wenzler (AsTech)
    In the wake of Hurricane Harvey's widespread devastation in late August, many people are pouring in their physical, emotional and financial support for the victims. Massive hurricanes like Harvey and Irma often attract cyber criminals, who view natural disasters as a way to make money.

    US-CERT at the Department of Homeland Security is now warning people to beware of malicious cyber activity seeking to capitalize on interest in Hurricane Harvey.

    Join this interactive Q&A panel as we discuss:
    - Types of cyber scams we should be aware of in the aftermath of Harvey and Irma
    - How to spot a malicious or phishing email from a mile away
    - What to do if you're a victim of a cyber attack
    - Recommendations for cyber safety after major disasters

    Speakers:
    - John Bambenek, Threat Systems Manager at Fidelis
    - Dan Lohrmann, CSO & Chief Strategist for Security Mentor
    - Nathan Wenzler, Chief Security Strategist at AsTech Consulting
  • Inside DGA Tracking: A Primer for Using OSINT DGA Feeds Recorded: Aug 23 2017 50 mins
    John Bambenek, President, Bambenek Consulting
    This presentation will cover how DNS surveillance works and how it has been operationalized to track over 4 dozen malware families. The results from this surveillance is given away for free and best practices will be covered in how best to use this data.
  • NotPetya: Wiper or Ransomware & How to Protect Yourself Recorded: Jul 7 2017 60 mins
    Chris Roberts (Acalvio), John Bambenek (Fidelis), Jay Beale (Inguardians), Vince in the Bay
    Join this interactive Q&A session and learn the facts about the recent NotPetya attack on the Ukraine and the collateral damage it caused by crippling large businesses and organizations worldwide.

    Topics that will be discussed during this live Q&A panel will include:
    - How is NotPetya different from Petya and Wannacry?
    - Timeline of the attack
    - Impact and aftermath
    - What's next? How can companies better protect their data against similar attacks in the future?

    Moderator:
    - Vincent Tocce of the Vince in the Bay Podcast

    Speakers:
    - Chris Roberts, Chief Security Architect at Acalvio
    - Jay Beale, COO & CTO of Inguardians
    - John Bambenek, Threat Systems Manager at Fidelis Cybersecurity
  • The State of the Internet of Insecure Things in 2017 Recorded: Jun 20 2017 64 mins
    Jay Beale (InGuardians), John Bambenek (Fidelis Cybersecurity), Mike Hamilton (Ziften), Vince Tocce (VITB Podcast)
    Internet of Things devices are notoriously lacking in security, making them easy targets for attackers to hijack and leverage in DDoS attacks. How have cyber attacks evolved in the last few months? What is the impact of the IoT devices on cybersecurity across organizations and industries? How can we better protect our organizations when it comes to attacks coming from the IoT?

    This panel of security experts will discuss the current state of IoT security and the IoT trends seen across industries. Join this interactive Q&A session and discover where the vulnerabilities lie and how we can improve cybersecurity.

    Moderator:
    - Vince Tocce, Founder of Vince in the Bay Podcast

    Speakers:
    - Jay Beale, CTO of Inguardians
    - John Bambenek, Threat Systems Manager at Fidelis Cybersecurity
    - Mike Hamilton, SVP Product at Ziften Technologies
  • Ransomware in the Age of Wannacry: What Fintech Needs to Know Recorded: May 18 2017 45 mins
    John Bambenek, Threat Systems Manager at Fidelis Cybersecurity
    This past week we saw the emergence of a worm-based ransomware attack in wannacry that showed us how damaging these attacks can be to critical services society relies on.

    This presentation will cover the recent wannacry attacks and what we have learned from them. In addition, we'll discuss the evolution of ransomware in recent years, focusing on attacks targeted against enterprises and so-called "high-interaction" ransomware attacks. Attendees will also be given a path forward of protecting their institution. A discussion of the renewal of Business Continuity and Disaster Recovery as a result and what this means for fintech going forward.

    About the Presenter:
    John Bambenek is Manager of Threat Intelligence Systems at Fidelis Cybersecurity and an incident handler with the Internet Storm Center. He is also a faculty member of the Department of Computer Science at the University of Illinois where he teaches courses in cybersecurity. He has been researching security threats and criminal organizations for 17 years and coordinating with US and foreign law enforcement entities to help bring criminal actors to justice.
  • The 2017 Verizon DBIR Report: What You Need to Know Right Now Recorded: May 4 2017 40 mins
    John Bambenek, Manager of Threat Systems, Fidelis Cybersecurity
    The 10th Annual Verizon Data Breach Investigations Report (DBIR) was just published; the industry gold standard in security incident reporting for the past year. The report covers incidents all over the globe and in all verticals.

    This webinar will cover the findings of the report but focus in on the key details enterprises need to know right now to protect themselves against the most relevant threats for the upcoming year.

    About the Presenter:
    John Bambenek is Manager of Threat Intelligence Systems at Fidelis Cybersecurity and an incident handler with the Internet Storm Center. He is also a faculty member of the Department of Computer Science at the University of Illinois where he teaches courses in cybersecurity. He has been researching security threats and criminal organizations for 17 years and coordinating with US and foreign law enforcement entities to help bring criminal actors to justice.
  • BrightTALK at RSA 2017: John Bambenek on the State of the Cyber World in 2017 Recorded: Apr 11 2017 10 mins
    Josh Downs, Community Manager, BrightTALK & John Bambenek, Manager, Threat Systems, Fidelis Cybersecurity
    BrightTALK caught up with Fidelis Cybersecurity's John Bambenek for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The future of Cyber warfare
    - The tasks for the US political administration on an information security level
    - The Yahoo breach and who was to blame
    - GDPR and the steps that companies need to take to prepare for the legislation
    - A vision of the threatscape; new actors, motives and techniques
    - AI and machine learning and the role it has to play in the cyber security industry

    About the Speaker:
    John Bambenek is Manager of Threat Intelligence Systems at Fidelis Cybersecurity and an incident handler with the Internet Storm Center. He is also a faculty member of the Department of Computer Science at the University of Illinois where he teaches courses in cybersecurity. He has been researching security threats and criminal organizations for 17 years and coordinating with US and foreign law enforcement entities to help bring criminal actors to justice.
  • What Does the Cloudbleed Leak Mean for Your Company? Recorded: Mar 3 2017 61 mins
    John Bambenek (Fidelis Cybersecurity), Jeffrey Goldberg (Agilebits), Jay Beale (InGuardians)
    Cloudflare revealed a serious bug in its software in February, which caused sensitive data like passwords, cookies, authentication tokens to spill in plaintext from websites using Cloudflare Content Delivery Network (CDN).

    Join this panel of experts and learn:
    - Who is affected by Cloudbleed
    - What this means for your organization
    - What should you do right away
    - How to better protect your data

    Moderator:
    John Bambenek, Threat Systems Manager at Fidelis Cybersecurity

    Speakers;
    Jeffrey Goldberg, Chief Defender Against the Dark Arts at Agilebits
    Jay Beale, CTO & COO of InGuardians
  • The Promise and the Perils of Machine Learning and Automating Cybersecurity Recorded: Feb 23 2017 58 mins
    John Bambenek, Threat Systems Manager, Fidelis Cybersecurity
    Those defending against cyberattacks are overwhelmed by the shear volume of incidents to respond to. It is so bad that it has been said there may be as many as 1 million unfilled cybersecurity jobs. Machine learning and automation is often heralded as a way to deal with this problem so that many incidents can be dealt with requiring pressing a button. While there is much promise is machine learning there are also many perils that need to be considered. Attackers know how we defend ourselves and they do use our defenses against us.

    This talk will cover some of the open-source tools and techniques available for organizations to use to defend themselves while keeping in mind how attackers could undermine our efforts.
  • Hacked Elections? Facts & Predictions for 2017 Recorded: Jan 18 2017 49 mins
    John Bambenek, Manager, Threat Systems at Fidelis Cybersecurity
    The US intelligence community has released their summary of the DNC breach and the election-related hacking and there have been additional disclosures about the attacks.

    This webinar will be the latest on what we know, what we don’t know and what many are merely speculating about. We’ll take a look forward for upcoming European elections to get a perspective on what can be expected there in the coming months.
  • Part 2: How Is This Yahoo! Breach Different from Their Other Breach? Recorded: Dec 22 2016 35 mins
    John Bambenek, Manager, Threat Systems at Fidelis Cybersecurity
    On December 14 Yahoo revealed a new breach affecting more than 1 billion users’ data. This breach is separate to the hack it disclosed earlier this year, which was the biggest data breach on record. Join John Bambenek, Threat Systems Manager at Fidelis Cybersecurity on the latest developments in the Yahoo breaches, what it means for you and steps to take today.
  • Elections, Deceptions and the Coming Cyberwar Recorded: Oct 17 2016 39 mins
    John Bambenek, Manager, Threat Systems at Fidelis Cybersecurity
    Earlier this year, it appeared Russian state sponsored actors had not only hacked the Democratic National Convention and Democratic Congressional Campaign Committee, they were using the purloined information for a propaganda operation insider the United States to attempt to influence the election. Now that the United States has made it clear there will be retaliation for this, we may have crossed over to open cyberwar. This talk will talk about the lead up to where we are today, what the likely outcomes of two developed nations attacking each other will be and what it means for consumers and enterprises who still most operate globally.
  • Part 1: What You Need To Know about the Yahoo! Breach: Steps To Take Today Recorded: Sep 28 2016 27 mins
    John Bambenek, Manager, Threat Systems at Fidelis Cybersecurity
    With the news Yahoo! was breached in 2014 and 500 million user accounts were potentially compromised, this breach became the biggest in history to date. However, the damage extends far beyond Yahoo! properties where the digital identities of users could be compromised on other sites, business documents leaked and other harm could come for users who don’t take immediate steps.

    This talk will cover not only the breach, but the aftermath in what users and enterprises should do to protect themselves over breaches affecting other companies.
  • Top Tools and Solutions to Fight Data Mining Malware Recorded: Aug 9 2016 48 mins
    John Bambenek, Threat Systems Manager at Fidelis Cybersecurity
    Nearly 1 million new malware threats are released every day. The sheer deluge of unique malware samples makes it difficult for incident responders to keep up to protect their networks. Even more difficult is the task for investigators and law enforcement to keep up with the size and number of command-and-control networks and criminal operations.
    Join this presentation to learn about the solutions and tools you can employ to monitor criminal infrastructure and make it easy for incident handlers to identify problems on their network, for security analysts to protect their networks and for law enforcement to have reliable near-time information for their operations.
Not Your Standard Run-of-the-Mill Consultancy
Bambenek Consulting is an IT consulting firm focused on cybersecurity and cybercrime. Every day, there is another story about another company having their banking accounts drained, someone having their identity stolen, or critical infrastructure being taken offline by hostile entities. Led by IT security expert, John Bambenek, we have the resources to bring to your business so you can be sure your organization and your customers’ data is safe. And when disaster does strike, you know you can count on us to be with you every step of the way as you recover from an incident.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Top Tools and Solutions to Fight Data Mining Malware
  • Live at: Aug 9 2016 4:00 pm
  • Presented by: John Bambenek, Threat Systems Manager at Fidelis Cybersecurity
  • From:
Your email has been sent.
or close