Hi [[ session.user.profile.firstName ]]

Prioritizing Cybersecurity During a Global Crisis

Amid the disruption of COVID-19, IT priorities have rapidly shifted to enabling remote access while often reducing staffing and expenses, which can raise the risks of damaging cyberattacks. This webinar will discuss new security challenges and the need for enterprises to increase cybersecurity vigilance during this crisis while finding practical ways to increase automation and make critical applications self-defending.
Recorded Jun 16 2020 36 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Sajin Yousuff Kutty - FVC, Willy Leichter - Virsec
Presentation preview: Prioritizing Cybersecurity During a Global Crisis

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Protecting Critical Infrastructure from Cyberattacks During Global Disruption Jul 28 2020 5:00 pm UTC 45 mins
    Booz Allen Hamilton, ProtectedIT, Virsec, Moderated by Maria Korolov
    The rapid move to enabling remote access during the pandemic has heightened security concerns, especially in the industrial control space. At the same time, Dark Reading reports that many IT and OT organizations have put new security initiatives “on pause” while they try to manage these rapid changes. As cyberattacks targeting critical infrastructure continue to rise, this is potentially a recipe for disaster.

    Join a panel of experts from Booz Allen Hamilton, ProtectedIT and, Virsec for an interactive discussion on how IT/OT teams can balance increased remote access and automation while maintaining security effectiveness and vigilance. The panel discussion will be moderated by well-known technology and security journalist, Maria Korolov.
  • Achieving Cyber Resiliency Across High-Value Applications Jul 22 2020 5:00 pm UTC 45 mins
    Frank Walsh - Virsec, Jacob Noffke - Raytheon
    Improving resilience has become a critical goal as organizations must adapt to rapidly changing cyber threats, while ensuring that critical systems can withstand attack without disruption. Most cyber resiliency solutions have focused on protecting at the network, operating system, and hardware layers. While these remain important, attackers are increasingly targeting mission-critical applications as they execute in runtime. Stopping these in-memory exploits requires an additional layer of resiliency at the application layer.

    Join experts from Raytheon and Virsec for an interactive discussion on the latest approaches to cyber resiliency, and the need for a multi-layered approach that includes runtime application protection.
  • Modernizing Security with Next-Generation Technology Recorded: Jun 18 2020 18 mins
    Damian Ehrlicher - CEO of ProtectedIT, Willy Leichter - Virsec
    A discussion with Damian Ehrlicher from ProtectedIT on how solutions like Virsec help their customers in modernizing security, making it more effective and easier to manage.
  • Prioritizing Cybersecurity During a Global Crisis Recorded: Jun 16 2020 36 mins
    Sajin Yousuff Kutty - FVC, Willy Leichter - Virsec
    Amid the disruption of COVID-19, IT priorities have rapidly shifted to enabling remote access while often reducing staffing and expenses, which can raise the risks of damaging cyberattacks. This webinar will discuss new security challenges and the need for enterprises to increase cybersecurity vigilance during this crisis while finding practical ways to increase automation and make critical applications self-defending.
  • Making Cybersecurity a Priority During a Global Crisis Recorded: Jun 9 2020 71 mins
    Andy Nallappan/Broadcom, Troels Oerting/World Economic Forum, Lakshmanan Chidambaram, Usama Fayyad, Rajiv Singh, Atiq Raza
    Even before the Coronavirus upended our business and personal lives, cybersecurity statistics seemed to be going in the wrong direction. Now, amid the disruption of COVID-19, IT priorities have rapidly shifted to enabling remote access while often reducing staffing and expenses, significantly raising the risks of damaging cyberattacks.
  • Inside Security: Why is it Important to Protect the Full Application Stack Recorded: May 29 2020 24 mins
    Satya Gupta - CTO, Willy Leichter - VP of Marketing
    Join Virsec CTO Satya Gupta and Willy Leichter for a discussion of the importance of protecting the full application stack including Web, Memory, and Host layers. Attackers are adept and finding security blind spots. Combating this requires a deeper, more holistic application security.
  • Inside Security Webcast: What is RASP and What Should it Be? Recorded: May 20 2020 28 mins
    Willy Leichter, Satya Gupta
    Runtime Application Security Protection (RASP) has been defined in limited terms, but the demands for runtime security are increasing. Join security experts from Virsec for a discussion of the need to protect applications during runtime, across the full stack.
  • Prioritizing Cybersecurity During a Global Crisis Recorded: May 19 2020 43 mins
    Experts from FVC and Virsec
    Amid the disruption of COVID-19, IT priorities have rapidly shifted to enabling remote access while often reducing staffing and expenses and significantly raising the risks of damaging cyberattacks.

    Join a panel of global cybersecurity experts for an interactive discussion hosted by FVC and Virsec, on the need for enterprises to increase cybersecurity vigilance during this crisis.

    Discussion topics will include:
    • The need to accelerate digital transformation to improve efficiency and security
    • Increasing automation and accuracy for critical security systems and applications
    • The need to share accurate, actionable information about attacks quickly·
    • Best practices for maintaining and improving security in today’s extraordinary times.
  • Making Applications Self-Defending with Control Flow Integrity Protection Recorded: May 15 2020 5 mins
    Vimal Solanki, Head of Security Strategy, Intel
    Intel's head of security strategy, interviewed on the Virsec stage at RSA 2020, discusses the need to update our security models and incorporate the Control Flow Integrity protection, at the memory level of applications to stop today's most advanced attacks.
  • New Models for Today's Security Threats with Virsec at RSA 2019 by Byron Acohido Recorded: May 7 2019 33 mins
    Byron Acohido, Last Watchdog, Willy Leichter & Shauntinez Jakab, Virsec
    Join an interview with Pulitzer-prize-winning journalist Byron Acohido at RSA 2019 on pressing security issues and new security models, with Willy Leichter, VP of Marketing and Shauntinez Jakab, Director of Product Marketing for Virsec.
  • Spectre Will Haunt Us for a Long Time Recorded: Oct 31 2018 58 mins
    Satya Gupta, CTO; Shauntinez Jakab, Dir. of Product Mkt.; Willy Leichter, VP of Marketing
    Learn How to Defend Your Business Now

    Since Spectre and Meltdown burst onto the scene in early 2018, and vendors have been scrambling to deploy patches, but we are not close to eliminating this 20-year-old vulnerability, and new variants continue to emerge. According to the researchers who discovered Spectre, “it is not easy to fix, it will haunt us for quite some time.”

    Business must, of course, go on but ignoring elephant-in-the-room threats is never wise. Solutions are emerging that look deeper into processor caching and memory usage, and selectively limit speculative execution, without recompiling code or hobbling performance.

    Join security experts from Virsec for a deep dive into how Spectre works, the latest variants, the limitations of current patches, and how to disrupt attacks without a performance hit.
  • Defending Your Business from Attacks that Weaponize at Runtime (WRT) Recorded: Oct 11 2018 46 mins
    Vinay Mamidi, Sr. Dir. Product Mgt., Shauntinez Jakab, Dir. Product Mkt., Willy Leichter, VP of Marketing
    The vast majority of security solutions are focused on an out-of-date model of chasing known malware that is already weaponized – ready to do damage. Today’s security landscape has shifted away from this, with the majority of modern attacks bypassing conventional security systems by delivering benign-looking data. These benign components subvert interpreters and assemble to create dangerous weaponized code that can derail applications, expose sensitive data, or damage critical infrastructure. 

    Join experts from Virsec for an interactive webinar discussing the emergence of WRT attacks and new strategies organizations need to use to protect applications in memory in real time.
  • Can We Rein in the Global Cybersecurity Crisis? Recorded: Sep 25 2018 54 mins
    Troels Oerting, Head of Global Centre for Cybersecurity, World Economic Forum; Usama Fayyad, CIO OODA Health
    The World Economic Forum has elevated cyberattacks as one of the top global risks in terms of likelihood and impact, ahead of all other types of technological, economic, political or terrorist risks. The easy availability of advanced hacking tools combined with our aging infrastructure and outdated security models is a recipe for disaster. To tackle this looming crisis, we need to rethink our approach to security and develop new strategies to protect our most critical applications and infrastructure.

    Join renowned security experts Troels Oerting, CIO of the World Economic Forum for an interactive discussion on new strategies to preempt this global crisis.
  • Is Security the Achilles' Heel of IoT? Recorded: Sep 20 2018 45 mins
    Prith Banerjee, Sr. Client Partner, Korn Ferry; Willy Leichter, Virsec
    New Security Strategies to Keep Up with IT/OT Convergence

    With the explosion of IoT and increased convergence between IT systems and industrial Operational Technology (OT), is security an afterthought? While the potential of IoT seems limitless, inadequate security could significantly dampen growth and put much of our industrial infrastructure at risk.

    Join us for an interactive discussion with renowned security and IoT expert Prith Banerjee, Senior Client Partner at Korn Ferry and former EVP and CTO at Schneider Electric.
  • Protecting Critical Infrastructure from Cyberattacks Recorded: Sep 11 2018 52 mins
    Maj. Gen. Robert Wheeler, USAF (Retired); Willy Leichter, Virsec
    New Mindsets and Strategies for Proactive Defense

    There is no doubt that our infrastructure is under attack, and new vulnerabilities are being revealed daily. A perfect storm of political forces, aging infrastructure, increased automation, and advanced decentralized hacking all mean that we can’t be complacent about the security of our nation’s industrial backbone. To tackle today’s threats, we can’t rely on outdated security models and need a shift in mindset and defensive strategies that are up to the task.

    Join us for an interactive discussion with Maj. Gen. Robert Wheeler, a renowned security expert and former Deputy Chief Information Officer for Command, Control, Communications and Computers (C4) and Information Infrastructure Capabilities (DCIO for C4IIC).
  • Are You Expecting Too Much from Your WAF? Recorded: Aug 16 2018 49 mins
    Vinay Mamidi, Sr. Director of Product Management; Shauntinez Jakab, Director of Product Marketing
    Learn How to Improve Security While Reducing Your WAF Dependency

    Web application firewalls are a popular line of defense, but they can also be difficult to manage, require too much expert tuning, and deliver floods of false positives. And many advanced attacks such as the Equifax breach have easily bypassed WAFs. Perhaps we’re asking too much from a tool that sits at the network perimeter and has limited application context.

    Join experts from Virsec for an interactive webinar discussing next-generation technology that can augment WAF protection, dramatically reduce false positives, reduce your reliance on patching, and stopping advanced attacks that weaponize at runtime (WRT).
  • The Next Cybersecurity Challenge: Attacks that Weaponize at Runtime Recorded: Jul 24 2018 3 mins
    Troels Oerting, Head of Global Centre for Cybersecurity, World Economic Forum
    Troels Oerting, Head of the World Economic Forum Centre for Cybersecurity discussed a new class of cyber attack that exploits fileless and memory-based techniques. These attacks bypass conventional security and only weaponize as programs execute in runtime.
  • The Next Security Battleground: Attacks that Weaponize at Run-time Recorded: Jun 27 2018 37 mins
    Satya Gupta, CTO, Virsec, Frank Walsh, Chief Security Architect, Virsec
    Most security solutions are locked into an out-of-date mindset, looking for known malware that has been constructed by hackers and delivered already weaponized – ready to do damage. But today’s advanced hacks are increasingly bypassing conventional security systems by delivering benign-looking data that only gets weaponized when applications are live, in runtime memory. By subverting interpreters and manipulating legitimate processes and memory, these attacks can assemble benign components to create dangerous weaponized code that can derail applications, expose sensitive data, or damage critical infrastructure.

    Join experts from Virsec for an interactive webinar discussing the emergence of WRT attacks and new strategies organizations need to use to protect applications in memory in real time.
  • Preventing a Meltdown - Presentation at ICS Singapore 2018 Recorded: Apr 25 2018 19 mins
    Paul Forney, Chief Security Architect, Schneider Electric; Satya Gupta, CTO, Virsec
    Paul Forney, Chief Security Architect for Schneider Electric and Satya Gupta, CTO of Virsec delivered a joint presentation at the ICS Singapore Conference in April 2018, discussing the explosion of fileless and memory-based attacks, and strategies for protecting critical infrastructure.
  • Is The Next Cyber Threat is Already Inside Your Network? Recorded: Apr 3 2018 58 mins
    Usama Fayyad, OODA Health, Chenxi Wang, Rain Capital
    While many people focus on detecting the next cyber threat to wreak havoc, more attention should be paid to detecting precursors to attacks that may already be within your network. In many major attacks, malware and vulnerabilities dwell within networks for months or years before the full exploit is launched. Machine Learning is being applied to detect new threats in the wild, but these techniques can be equally effective when applied internally, to map acceptable application behavior and react quickly if there is a real attack. Join noted security experts for an interactive discussion on strategies to protect your organization from these lurking threats.
Virsec: A New Approach to Security
Virsec delivers real-time protection from today's most dangerous cyber threats including memory corruption, fileless and zero-day attacks. Learn about the latest threats, and hear analysis and recommendations from security experts.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Prioritizing Cybersecurity During a Global Crisis
  • Live at: Jun 16 2020 7:00 am
  • Presented by: Sajin Yousuff Kutty - FVC, Willy Leichter - Virsec
  • From:
Your email has been sent.
or close