Hi [[ session.user.profile.firstName ]]

Uber, Equifax and the Year of Data Breaches

Massive data breaches are a dime a dozen these days, affecting more people than before and exposing the highly personal information of millions of consumers. Uber is the latest company to disclose a major breach, joining Equifax from a few months ago, in which the names, addresses and other personal data got stolen by hackers.

Join this interactive Q&A panel discussion to learn more about:
- Impact and lessons learned from the Uber breach
- What should enterprises do to better protect their customer data?
- How can we address the growing threat of cyber attacks?

Some of the industry's top minds will provide their insights on the impact of the recent breaches on consumers, organizations and policy.

Moderator:
- William Leichter, VP Marketing, Virsec Systems (Moderator)

Speakers:
- Chris Roberts, Chief Security Architect, Acalvio Technologies
- Chris Morales, Head of Security Analytics, Vectra Networks
- Jason Kent, CTO, AsTech Consulting
Recorded Dec 7 2017 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Chris Morales (Vectra Networks) | Jason Kent (AsTech) | Willy Leichter (Virsec Systems)
Presentation preview: Uber, Equifax and the Year of Data Breaches

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The Next Security Battleground: Attacks that Weaponize at Run-time Jun 26 2018 5:00 pm UTC 60 mins
    Satya Gupta, CTO, Virsec, Frank Walsh, Chief Security Architect, Virsec
    Most security solutions look for known threats, or identifiable malware that can be stopped at the perimeter. But today’s advanced hackers are increasingly using techniques to infiltrate networks and applications with benign-looking data or scripts that manipulate legitimate processes and only become weaponized when they when applications are running. The recent explosion of fileless and memory-based attacks including WannaCry, NotPetya, Industroyer and others have effectively exploited these techniques to bypass legacy security.
    Learn from Virsec security experts how these attacks leverage benign-looking input to corrupt processes, escalate privileges, hijack control of internal systems, and steal valuable data. Also discussed will be new tools like Virsec that identify and defend against weaponized code in real-time at the application level.
  • Preventing a Meltdown - Presentation at ICS Singapore 2018 Recorded: Apr 25 2018 19 mins
    Paul Forney, Chief Security Architect, Schneider Electric; Satya Gupta, CTO, Virsec
    Paul Forney, Chief Security Architect for Schneider Electric and Satya Gupta, CTO of Virsec delivered a joint presentation at the ICS Singapore Conference in April 2018, discussing the explosion of fileless and memory-based attacks, and strategies for protecting critical infrastructure.
  • Is The Next Cyber Threat is Already Inside Your Network? Recorded: Apr 3 2018 58 mins
    Usama Fayyad, OODA Health, Chenxi Wang, Rain Capital
    While many people focus on detecting the next cyber threat to wreak havoc, more attention should be paid to detecting precursors to attacks that may already be within your network. In many major attacks, malware and vulnerabilities dwell within networks for months or years before the full exploit is launched. Machine Learning is being applied to detect new threats in the wild, but these techniques can be equally effective when applied internally, to map acceptable application behavior and react quickly if there is a real attack. Join noted security experts for an interactive discussion on strategies to protect your organization from these lurking threats.
  • Can We Protect Critical Infrastructure from Cyberattacks? Recorded: Mar 27 2018 53 mins
    Paul Forney, Chief Security Architect, Schneider Electric; Satya Gupta, Founder & CTO, Virsec
    The past year has seen a sharp increase in cyberattacks targeting critical infrastructure such as power plants, water treatment facilities, oil & gas refineries and elsewhere. High-impact attacks such as StuxNet, HaveX, Black Energy, Industroyer, Triton and others have used advanced hacking techniques and memory exploits to hijack control, cause disruption, shut down critical systems or worse. These technique bypass conventional network security tools and have been considered “indefensible” by many security experts.

    Hear ICS and security experts discuss how to defend against advanced attacks and protect infrastructure from unknown threats.
  • The Memory Attack Battleground Recorded: Mar 20 2018 58 mins
    Satya Gupta, CTO, Willy Leichter, VP, Virsec
    The multitude of recent cyberattacks have a number of things in common: they are sophisticated, multi-pronged, use fileless techniques, and target applications at in process memory – largely invisible to conventional security products.

    Attacks including WannaCry, Petya, NotPetya, SystemD, Industroyer, and Apache Struts all leveraged memory-based attacks to infiltrate, pivot, and hijack valuable data. What used to be viewed as arcane, theoretical attacks have now become easily accessible through the Shadow Brokers leak of advanced memory corruption tool kits.

    Learn from Virsec experts:
    •Why memory attacks are under the radar of most security
    •How to map correct memory usage and detect deviations
    •New models for protecting applications from the inside
  • [Ep.4] Ask the Expert: Getting Serious About Cybercrime Recorded: Mar 7 2018 61 mins
    Joseph Carson (Thycotic) | William Leichter (Virsec) | Chenxi Wang
    This webinar is part of BrightTALK’s "Ask the Expert" Series. As attacks increase and start to have a significant impact, not just on companies’ bottom lines, but on their ability to carry out everyday business, cybersecurity has become much more of a boardroom issue than ever before. Increasingly this is causing forward looking organizations of all sizes to examine how security can be better integrated into business as normal.

    No business is immune from cybercrime and the theft of personal information and intellectual property will increase as the ability to turn raw data into money-spinning opportunities increases. The response to cybercrime is a business decision – and is all about risk management. Between human error and malicious insiders, time has shown us the majority of data breaches originate inside company walls. Employees and negligence are the leading causes of security incidents but remain one of the least reported issues. The fightback starts not in the organization but with people and increasingly in the home. More and more security professionals need to be re-assessing the risks to company data at a personal level - mobile/consumer devices, internet connected devices, cloud access and storage both inside and outside the corporate environment.

    Speakers:
    - Joseph Carson, Chief Security Scientist, Thycotic
    - William Leichter, VP Marketing, Virsec
    - Dr. Chenxi Wang, Founder of The Jane Bond Project & Vice Chair, Board of Directors, OWASP

    Audience members are encouraged to send questions to the expert, which will be answered during the live session.
  • Security Without Guessing Recorded: Mar 2 2018 2 mins
    Ray DeMeo, Virsec
    Ray DeMeo, COO of Virsec discusses a new model for security using deterministic, memory-based protection to stop attacks in real-time while eliminating false positives.
  • Protecting Against "Indefensible" Attack: Interview with Atiq Raza, CEO Recorded: Feb 27 2018 2 mins
    Atiq Raza, CEO, Virsec
    Atiq Raza, CEO of Virsec and tech industry luminary, discusses a unique approach to protecting against today's advanced fileless and memory attacks in real-time.
  • Will Artificial Intelligence Strengthen Your Security Stance? Recorded: Feb 15 2018 59 mins
    Chris Roberts, Acalvio | Chris Morales, Vectra | Vikram Kapoor, Lacework | Willy Leichter, Virsec
    The volume and frequency of cyber-attacks makes it impossible for security analysts to use manual threat analysis to keep up with a rapidly changing threat landscape.

    Innovations in artificial intelligence (AI) now make it possible to automate mundane security operations, and provide security analysts with access to large data sets. The benefits are significant: analyst time is freed-up, and they have access to better information enabling smarter, faster decisions about how to continually improve the security posture of their organization.

    Join this Q&A panel on how AI can help improve your organization's overall security.

    Speakers:
    - Chris Roberts, Chief Security Architect, Acalvio
    - Chris Morales, Head of Security Analytics, Vectra
    - Vikram Kapoor, Co-Founder and CTO, Lacework
    - Willy Leichter, Vice President of Marketing, Virsec
  • Uber, Equifax and the Year of Data Breaches Recorded: Dec 7 2017 60 mins
    Chris Morales (Vectra Networks) | Jason Kent (AsTech) | Willy Leichter (Virsec Systems)
    Massive data breaches are a dime a dozen these days, affecting more people than before and exposing the highly personal information of millions of consumers. Uber is the latest company to disclose a major breach, joining Equifax from a few months ago, in which the names, addresses and other personal data got stolen by hackers.

    Join this interactive Q&A panel discussion to learn more about:
    - Impact and lessons learned from the Uber breach
    - What should enterprises do to better protect their customer data?
    - How can we address the growing threat of cyber attacks?

    Some of the industry's top minds will provide their insights on the impact of the recent breaches on consumers, organizations and policy.

    Moderator:
    - William Leichter, VP Marketing, Virsec Systems (Moderator)

    Speakers:
    - Chris Roberts, Chief Security Architect, Acalvio Technologies
    - Chris Morales, Head of Security Analytics, Vectra Networks
    - Jason Kent, CTO, AsTech Consulting
  • Equifax Breach Lessons: How to Stop the Next Breach - Or Slow it Down Recorded: Sep 29 2017 61 mins
    Rick Holand (Digital Shadows), Chris Sullivan (Core Security), Josh Shaul (Akamai), William Leichter (Virsec)
    What are the lessons learned from the recent slate of mega-breaches (Equifax, CIA, NSA)? How can we apply these lessons toward educating our workforce and strengthening our organizations' security posture?

    Join this interactive panel with cyber security experts to learn more about:
    - Why the Equifax data breach was inevitable
    - How to prepare against the next big one
    - How to detect breaches faster
    - The first 24 hours after a breach
    - The importance of employee security training
    - What CISOs can learn from this breach

    Speakers:
    - Rick Holand, VP Strategy, Digital Shadows
    - Chris Sullivan, SVP, Chief Information Security Office, Core Security
    - Josh Shaul, VP of Product Management, Akamai

    Moderator:
    - William Leichter, VP Marketing, VIrsec Security
  • Equifax Hack and Improving Data Protection Recorded: Sep 21 2017 61 mins
    Satya Gupta (Virsec Systems), Shawn Burke (SungardAS), Vamshi Sriperumbudur (CipherCloud), William Leichter (Virsec)
    In the aftermath of the Equifax data breach, both consumers and enterprises are scrambling for ways to minimize the impact. Since highly personal information was exposed (social security numbers, addresses, birthdays), the implications of this breach could haunt us in the long-term future.

    What are the lessons of this breach to individuals, as well as organizations?

    Join this interactive panel discussion with security experts to learn:
    - The short and long-term effects of this data breach
    - What you can do to protect yourself and your organization
    - How to protect against future scams
    - Why breaches happen and how organizations can improve their breach prevention efforts, as well as employ technologies and process for faster breach detection and response
    - How to improve cyber security going into 2018

    Speakers:
    - Satya Gupta, CTO, Virsec Systems
    - Shawn Burke, Global Chief Security Officer, Sungard Availability Services
    - Vamshi Sriperumbudur, VP Marketing, CipherCloud

    Moderator:
    - William Leichter, VP Marketing, Virsec Systems
  • Understand Virsec in 3 Minutes Recorded: Sep 20 2017 4 mins
    Virsec Systems
    This animated overview provides a quick introduction to Virsec's unique Trusted Execution technology, delivering deterministic protection against today's most advanced memory and fileless attacks.
  • Equifax Breach Interview: What happened? How could this have been avoided? Recorded: Sep 10 2017 24 mins
    Willy Leichter, Satya Gupta
    Interview with security expert Satya Gupta, CTO of Virsec, on the initial news of the Equifax breach. Satya discusses the likely causes, the challenges of fileless attacks, and why advanced threats fly under the radar of conventional security tools.
  • Protecting Against Ransomware Attacks - NetApp and Virsec Recorded: Sep 5 2017 7 mins
    Willy Leichter, Virsec
    This demonstration shows a live ransomware attack and how it can be detected in real-time by Virsec, and thwarted by automatically restoring data through the NetApp SnapLock WORM drive system.
Virsec: A New Approach to Security
Virsec delivers real-time protection from today's most dangerous cyber threats including memory corruption, fileless and zero-day attacks. Learn about the latest threats, and hear analysis and recommendations from security experts.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Uber, Equifax and the Year of Data Breaches
  • Live at: Dec 7 2017 7:00 pm
  • Presented by: Chris Morales (Vectra Networks) | Jason Kent (AsTech) | Willy Leichter (Virsec Systems)
  • From:
Your email has been sent.
or close