Hi [[ session.user.profile.firstName ]]

Why Threat Intelligence should be a key tool in your security portfolio

Knowing which threats are trending right now—and which vectors criminals are using to attack you—is the key to optimizing and fine-tuning your security policies and solutions for effective protection.
Barracuda collects a vast flow of real-time information and uses big data analytics to crunch those numbers in order to deliver up to date, actionable insights. In this interactive live session with Brianna Fischer and Fleming Shi will discuss:

• Latest threats in cyber security
• Real world examples of using threat intelligence in defending against cyber attacks
• How to use threat intelligence to fine tune your security policies
• How to gain access to the information you need to stay ahead of the biggest cyber threats

Register to learn the fastest, easiest way to get the information you need to stay ahead of the biggest cyber threat trends.
Recorded Jul 17 2018 50 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Fleming Shi, Senior Vice President, Advanced Technology Engineering, Barrcuda; Brianna Fischer, Product Marketing, Barracuda

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Umfassender Phishing-Schutz in Echtzeit dank künstlicher Intelligenz Recorded: May 1 2019 67 mins
    Julian Schreier, Sales Engineer, Barracuda Networks; Christian Töpfer, Manager Solutions & Services, heise Business Services
    Social-Engineering- und Spear-Phishing-Angriffe werden immer ausgefeilter. Viele Firmen haben Schwierigkeiten, ihre Sicherheitslösungen auf dem aktuellen Stand zu halten. In diesem Webcast erfahren Sie, wie Sie einem "Account-Takeover" bei Ihren Mitarbeitern und sonstigem Cyberbetrug mit den richtigen Maßnahmen und Lösungen in Echtzeit vorbeugen.

    Unternehmen sind das Ziel zahlreicher Bedrohungen und Exploits. Am gängigsten sind Phishing-Angriffe und zielgerichtete E-Mail-Angriffe von kompromittierten Konten mit der Absicht, per E-Mail an sensible oder vertrauenswürdige Daten heranzukommen. Mitarbeiter sollen dabei dazu verleitet werden, wertvolle Informationen offenzulegen oder Geldbeträge direkt an die Hacker zu überweisen. Bei fast der Hälfte der erfolgreichen Angriffe handelt es sich um die Übernahme/das Kapern von Konten ("Account-Takeover").

    Doch die Angreifer haben nicht genug. Die Bedrohungen werden immer ausgefeilter und finanziell gut ausgestattete Cyberkriminelle entwickeln zunehmend komplexe Varianten von Malware- und Social-Engineering-Angriffen. Wenn es parallel dazu in den Unternehmen an entsprechenden Sicherheitsvorkehrungen mangelt, ist guter Rat teuer.

    In diesem Webcast sind Sie richtig, wenn Sie erfahren wollen,
    - warum zielgerichtete Angriffe manche Mitarbeiter zu kostspieligen Fehlern verleiten,
    - wie Ihre Mitarbeiter böswillige Absichten und Betrugsversuche identifizieren,
    - wie KI genutzt wird, um das einzigartige Kommunikationsmuster eines Angreifers in Echtzeit zu erlernen,
    - wie KI, eine Integration in Microsoft Office 365 und Brand Protection zu einer umfassenden Cloud-basierten Sicherheitslösung kombiniert wird und
    - warum gerade Ihr Unternehmen von einer Lösung von Barracuda profitieren kann.
  • PODCAST: Spear Phishing - Top 3 Threats Recorded: Apr 25 2019 11 mins
    Asaf Cidon, Barracuda's Senior Vice President, Email Protection Products;
    Among the top new spear phishing threats to enterprises: Extortion. Asaf Cidon of Barracuda outlines the top three spear phishing threats and new strategies to defend against them.

    Cidon, Barracuda's Senior Vice President, Email Protection Products, was surprised to see how quickly extortion has taken off as a prevalent threat, as outlined by Barracuda' newest spear phishing report.

    "We're seeing that attackers are increasingly bypassing existing email defenses by sending emails that include no attachments or links, and basically tell the recipient that the attacker has obtained a password to their account, and wants them to send some bitcoin, otherwise they will expose very embarrassing information about the recipient," Cidon says. "In our report, we found that these attacks comprise over 10 percent of all the spear phishing attacks."

    In an interview about the spear phishing trends outlined in this report, Cidon discusses:

    - Insights from Barracuda's latest report;
    - Why top threats are so successful;
    - New defensive strategies and solutions.
  • The Next Level of Cloud Security: Taming Complexity Recorded: Apr 23 2019 40 mins
    Richard Turner, Dir. Public Cloud Marketing, Barracuda; Vinayak Shastri, Sr. Product Manager, Barracuda
    Organizations know that cloud security is different than what they were used to doing on-premises...but what many don’t realize is that cloud introduces new vulnerabilities that their on-premises world never needed to account for.

    In the future, 80% of cloud breaches will be due to misconfiguration, credentials mismanagement, or insider theft – not the cloud itself. Just what do organizations need to worry about in the cloud, and how can they remediate these new vulnerabilities?

    Join us to discuss these new challenges and what organizations can do to better protect themselves in the Public Cloud.
  • The Last Line of Defense in the Battle Against Phishing: Users Recorded: Mar 29 2019 62 mins
    Matt Yturri, Spiceworks, Peter Mullens, Barracuda, Tom Collins, SMB Pharmaceutical Company, Matt Toms, Gist Limited
    Defending your business against social-engineering and phishing attacks is crucial in today’s cyber landscape. Although your users may pose a high security risk they can also act as an additional layer of security by training them to be ever vigilant and to recognize the subtle clues of even the most cunning phishing attempts.

    On this Video Meetup we’ll talk to an IT Pro from the Spiceworks Community about implementing and managing a security awareness program within their organization and the lessons learned. We’ll also be joined by an expert from Barracuda to discuss how to best protect your company and train your users to be on the lookout.

    We’ll be discussing:

    How to design and implement a security awareness program that uses positive reinforcement to embed effective practices through out every business process.

    The importance of identifying the human risk factor through security surveys and testing utilizing the most up-to-date simulated phishing and social-engineering campaigns.

    How automating your incident response can keep attacks from spreading through your organization, including sending alerts to impacted users and removing malicious emails directly from their inboxes.
  • #IMOS19 - Keynote: What's Lurking in Your Inbox? Recorded: Mar 26 2019 31 mins
    Moderator: Dan Raywood, Speaker: Asaf Cidon
    Infosecurity invites Asaf Cidon from Barracuda Networks to deliver a presentation on the latest issues and challenges affecting them and their customers in the information security sector.
  • Demo of a Full Stack Cloud Security Solution -The Barracuda Difference Recorded: Mar 8 2019 49 mins
    Gemma Allen, Cloud Solution Architect, Barracuda plus special guest
    A technical discussion of how the approach to security within public cloud is evolving and what products and tools can help ensure you have the awareness and protection you need.
  • Shaping a security framework for multi cloud adoption Recorded: Feb 22 2019 45 mins
    Chris Hill, RVP, Public Cloud EMEA; Jez Back, Founder & Principal Erebus Technology Consulting Services Ltd
    One of the challenges with public cloud environments is the rate at which they change. Yet the ability to change / grow elastically is one of the key advantages to adopting public cloud. Complicate that further with a multi-cloud environment and you quickly find yourself lacking the ability to visualize your infrastructure, drill down into detail, gather resource level information and understand the relationship and interconnectivity of those resources and how they affect compliance and your security posture.

    Gartner has predicted that “Through 2020, 80% of cloud breached will be due to customer misconfiguration, mismanaged credentials or insider theft, not cloud provider vulnerabilities”.

    So how can you ensure your organisation not only has complete visibility of its cloud infrastructure but is also securing its workloads and apps and being compliant? Is it really an impossible task?

    Find out more in this webinar with Chris Hill, RVP of Public Cloud at Barracuda Networks and Jez Back, Founder & Principal Erebus Technology Consulting Services Ltd, where they will discuss:
    • The threat landscape around cloud infrastructure
    • Shared security model – what are you really responsible for when it comes to cloud security
    • Challenges associated with multi-cloud and keeping your organisation secure
    • How to maintain compliance across your cloud environment
    • How to obtain visibility of your cloud infrastructure and security posture at all times
  • A View from the IT Practitioner: End User Predictions for 2019 Recorded: Dec 11 2018 55 mins
    Michael Flouton - VP Security Strategy, Barracuda; Jez Back, Founder & Principal Erebus Technology Consulting Services Ltd
    2018 saw some great strides in cyber security as well as some major breaches. Will 2019 be the same? As we all try and stay one step ahead of the attackers and look into our crystal ball on what the future holds, Barracuda wanted to see how our customers and channel partners feel about the past, present, and future of cyber security and how their approach has evolved over time.

    We surveyed more than 1,500 IT leaders and security professionals in North America, EMEA, and APJ about their IT security priorities, how those priorities have shifted, and where they’re headed next.

    Join this webinar with Barracuda’s, VP Security Strategy, Michael Flouton and Erebus Technology's Jez Back, Founder & Principal, to find out:

    - What 1500 IT and security professionals in North America, EMEA and APJ believe will be the next big trends in cyber security
    - How their priorities have changed over the last 15 years and where they will focus for the next 15 years
    - Which cyber security trends have impacted their cyber security strategy
    - How to prepare your organisation for these new trends

    Register today to find out what your peers believe will be the key trends in cyber security and advice on how to stay ahead of the attackers in 2019 and beyond.
  • Saving Money and Stopping Cyber Attacks - 3 Simple Steps for the Small Business Recorded: Nov 14 2018 47 mins
    Amar Singh; Steve Vickers
    Are you open minded to saving money and ensuring that your business is better protected from cyber criminals at the same time? Join Amar Singh and Steve Vickers as they discuss a simple checklist for charities and small businesses. A non-technical discussion, we layout step by step guidance on what you can do:

    - To save money on your current IT and security investments
    - To ensure your third party is delivering the right level of security and service
    - Increase your operational efficiency and lower total cost of operations.
  • Are EMEA organisations ready for SDWAN? Recorded: Nov 6 2018 58 mins
    Darius Goodall, Sn. Director, Product Marketing, Barracuda Networks; Kelsey Parish, Research Manager, Vanson Bourne
    Cut through the noise around SD-WAN. Join us for this all-new webinar, where we’ll dive into the eye-opening results of our recent global survey of IT administrators.

    Find out what 910 of your peers around the globe are thinking, saying, and doing about the move to SD-WAN—and understand how attitudes and trends in the EMEA region differ in some respects from those in other regions.

    Don’t miss this opportunity to gain a firm, practical understanding of the main SD-WAN concerns and challenges that your peers are dealing with, and how they’re achieving the right balance of WAN performance and security.

    Attend this important live webinar and get the insights you need to make the best SD-WAN choices for your organization.
  • Cloud Security: The next generation Recorded: Oct 22 2018 51 mins
    Chris Hill, RVP, Public Cloud EMEA; Alex Hilton, Chief Executive, Cloud Industry Forum
    Multi-Cloud or hybrid environments has become a growing strategy for many organisations moving their applications and data in the cloud as it gives organisations the ability to be flexible in what they need for their business. In fact, according to recent research by Computing, 26 per cent of enterprises surveyed were using a multi-cloud approach compared with 22 per cent last year. However, along with this approach one thing organisations should not forget is that the need for security does not diminish. As the cloud continues to offer more in services, organisations need to be aware of the protection they are responsible for to ensure their applications and workloads are safe.

    So how do organisations stay ahead of the curve with security as well as being able to manage these multi-cloud or hybrid environments?

    Join our latest webinar where, Chris Hill, VP Public Cloud EMEA at Barracuda, and Alex Hilton, Chief Executive and Cloud Industry Forum (CIF)will discuss the latest challenges when it comes to migrating to the cloud, especially in a multi-cloud environment as well as analyse CIFs latest research findings on what organisations need to consider when adopting these cloud services.
  • Implementing a Cloud Ready Software Defined WAN - Challenges & Opportunities Recorded: Oct 18 2018 61 mins
    Amar Singh; Steve Vickers
    With the explosion of cloud-based cloud ready applications, many organisations struggle with optimising application performance for cloud or hybrid environments. The culprit, in many cases, is the connectivity from the offices to the cloud. The wide area network, (WAN) connecting offices to the Internet and to other offices, is still playing catchup. WAN technology is stuck in the old-age.

    Think about this: Does your business, small or large, have two or more broadband connections, maybe a broadband and a dial up or some other form of Internet connectivity? Apart from the security risk of having too many Internet points of exit, your business is also wasting money and resources in managing these various connectivity channels.

    In this webinar, Amar Singh and Steve Vickers explore the problems typically faced by organisations based on the latest research and show how organisations can create a seamless and secure SD-WAN infrastructure without having to manage multiple products.
  • Obi-WAN: Simplify Your WAN like a Jedi Recorded: Sep 19 2018 55 mins
    Justin Ong, Klaus Gheri, Simon Lok
    With the rise in cloud services along with remote and mobile users, Software-Defined WAN technology can act like the Force to help optimize your WAN and troubleshoot issues with as little sysadmin/Jedi intervention needed.

    On this Video Meetup, we’ll be talking about SD-WAN and how it can increase performance for your users while also increasing visibility and control across your network. We’ll be talking with experts from Barracuda Networks as well as an IT pro from the Spiceworks
    Community.

    What we're discussing:
    - How SD-WAN works with existing MPLS
    - Using SD-WAN to secure traffic going across your wide network
    - Weighing the cost benefit of SD-WAN
  • Next Generation Phishing Protection Recorded: Jul 19 2018 49 mins
    Peter Mullens, Product Marketing, Barracuda Networks
    Did you know email is still the biggest threat vector for phishing, with 74% of threats entered as an email attachment or link? Does your email protection do enough to help prevent your users from being phished?

    On this webinar you’ll learn how a multi-layered next generation email protection solution not only addresses the latest email threats but helps you stay ahead of the curve.

    What we’ll discuss:

    How advanced threats are evolving to use sophisticated techniques such as spear phishing and social engineering.

    The different layers needed in a next generation email protection solution.

    How you can get started today.
  • Why Threat Intelligence should be a key tool in your security portfolio Recorded: Jul 17 2018 50 mins
    Fleming Shi, Senior Vice President, Advanced Technology Engineering, Barrcuda; Brianna Fischer, Product Marketing, Barracuda
    Knowing which threats are trending right now—and which vectors criminals are using to attack you—is the key to optimizing and fine-tuning your security policies and solutions for effective protection.
    Barracuda collects a vast flow of real-time information and uses big data analytics to crunch those numbers in order to deliver up to date, actionable insights. In this interactive live session with Brianna Fischer and Fleming Shi will discuss:

    • Latest threats in cyber security
    • Real world examples of using threat intelligence in defending against cyber attacks
    • How to use threat intelligence to fine tune your security policies
    • How to gain access to the information you need to stay ahead of the biggest cyber threats

    Register to learn the fastest, easiest way to get the information you need to stay ahead of the biggest cyber threat trends.
  • The 5th Floor - Why Protecting Email Remains the Most Sensible Strategy. Recorded: Jun 28 2018 58 mins
    Amar Singh; Peter Mullens; Stefan Schachinger; Junior Birkett
    Ok, email is boring. Email is antiquated. Email is NOT dead, particularly with GDPR now in everyone's minds it remains the favourite attack vector for cyber criminals! Like it or not, if you don’t show the deserved love and attention to email, criminals will keep winning.

    No, User Education is not THE only answer. You need the right set of technologies that enable organisation to be cyber resilient.

    Join Amar Singh, practicing CISO, as he presents 'The 5th Floor - Why Protecting Email Remains the Most Sensible Strategy' and discusses with Peter, Stefan and Junior the lessons learnt and technologies available to businesses to increase their cybersecurity maturity.
  • Don’t get hooked: How to protect against Spear Phishing Recorded: Jun 26 2018 57 mins
    Justin Ong, Lawrence Micallef, Peter Mullens, Junior Birkett
    Did you know that around 90% of all hacks start with a targeted email attack? Protect your users and their data and assets from the biggest security threat there is: themselves.

    Join us for a video meetup where we’ll discuss the multi-layered security strategy you need to maximize your protection and minimize your risk.

    What we’ll discuss:

    - How spear phishing is evolving, and the social engineering techniques being used
    - How to defend against email fraud and account compromise
    - Stories from real-life attacks, and the lessons learned from them
  • The Day We Weaponised a Sleeper APT Recorded: Jun 15 2018 51 mins
    Amar Singh; Fleming Shi; Jonathan Tanner
    It’s not everyday you get the inside story on how a group of cybersecurity researchers stumbled upon an APT, an advanced persistent threat, when they were examining the intelligence data from their security kit.

    It appeared harmless and boring but of advanced attributes. But Fleming Shi and Jonathan Tanner suspected something was amiss.

    Facilitated by Amar Singh, practising CISO, on this exclusive webinar as he unpicks what Fleming and Jonathan did next. Their curiosity got the better of them and they set about tinkering to discover the true intentions of this benign malware.
  • Defending the Cloud Recorded: Jun 5 2018 51 mins
    Alex Hilton (CIF) | Chris Hill (Barracuda Networks) | Patrick Grillo (Fortinet) | Paul Dignan (F5 Networks)
    This panel of cloud and security experts will discuss the different ways enterprises are securing their cloud environments.

    Join top cloud and security experts for this interactive Q&A discussion on:
    - The top cloud trends in 2018
    - Encryption, key management and beyond
    - Biggest threats to the cloud
    - How to better safeguard data and privacy

    Speakers:
    - Alex Hilton, Chief Executive, Cloud Industry Forum
    - Chris Hill, RVP Cloud EMEA, Barracuda Networks
    - Patrick Grillo, Senior Director Solutions Marketing, Fortinet
    - Paul Dignan, Global Technical Account Manager, F5 Networks

    The session will be streamed LIVE from London from the Infosecurity Europe conference.
  • Targeted Attacks in Office 365 - Risks & Opportunities Recorded: May 3 2018 45 mins
    Asaf Cidon, Vice President, Content Security Services, Barracuda Networks
    Microsoft Office 365 is so ubiquitous-with more than 100 million monthly active subscribers-that it's almost become part of our identities. Cybercriminals have taken notice-and Office 365 has become a breeding ground for an increasing number of highly sophisticated attacks.

    Join this interactive webinar with Asaf Cidon, VP Content Security at Barracuda to discuss:

    - Findings from a recent survey on the adoption of Office 365, including the associated risks, drivers and opportunities, both in North America and EMEA

    - Evolution of attacks and the rising threat from targeted attacks like spear phishing that rely on personalized social engineering to lure victims

    - Key ways to identify attacks with real-life examples
    Five steps to prevent targeted attacks and protect your networks, employees and data
Barracuda Networks
Barracuda Networks

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Why Threat Intelligence should be a key tool in your security portfolio
  • Live at: Jul 17 2018 1:00 pm
  • Presented by: Fleming Shi, Senior Vice President, Advanced Technology Engineering, Barrcuda; Brianna Fischer, Product Marketing, Barracuda
  • From:
Your email has been sent.
or close