Hi [[ session.user.profile.firstName ]]

Achieving Cyber Resiliency Across Mission-Critical Assets

Improving resilience has become a critical goal as organizations must adapt to rapidly changing cyber threats, while ensuring that critical systems can withstand attack without disruption. Most traditional cybersecurity solutions have relied on perimeter protection, frequent patching, and auditing security logs. While these remain important, we must assume that the sophisticated attacker is already inside the network and has established access and privilege. For true cyber resiliency, we need deeper protection at the network, hardware, and OS layers, as well as visibility and control over how critical applications execute during runtime.
Join experts from Raytheon Intelligence & Space and Virsec for an interactive discussion on the latest approaches to cyber resiliency, and the need for stronger protection at each layer of the system.
Speakers will include:
- Teresa Shea – Vice President, Cyber Offense and Defense Experts, Raytheon Intelligence & Space
- Frank Walsh, Chief Security Architect, Virsec
- Jacob Noffke, Principal Cyber Engineer, Raytheon Intelligence & Space
- Moderated by Willy Leichter, VP of Marketing, Virsec
Recorded Jul 30 2020 52 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Teresa Shea - Raytheon, Frank Walsh - Virsec, Jacob Noffke - Raytheon
Presentation preview: Achieving Cyber Resiliency Across Mission-Critical Assets

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Protecting Critical Infrastructure from Cyberattacks During Global Disruption Oct 13 2020 5:00 pm UTC 45 mins
    Booz Allen Hamilton, ProtectedIT, Virsec, Moderated by Maria Korolov
    The rapid move to enabling remote access during the pandemic has heightened security concerns, especially in the industrial control space. At the same time, Dark Reading reports that many IT and OT organizations have put new security initiatives “on pause” while they try to manage these rapid changes. As cyberattacks targeting critical applications and infrastructure continue to rise, this is potentially a recipe for disaster.

    Join a panel of experts from Booz Allen Hamilton, ProtectedIT and, Virsec for an interactive discussion on how IT/OT teams can balance increased remote access and automation while maintaining security effectiveness and vigilance. The panel discussion will be moderated by well-known technology and security journalist, Maria Korolov.
  • Webinar: Five Essential Steps for Enterprise Application Security Sep 24 2020 5:00 pm UTC 45 mins
    Virsec
    Today’s advanced cyberattacks can easily bypass perimeter security tools, and businesses must assume that the precursors to your next attack are already inside your network. This has effectively moved the battleground to the application itself. The goal of modern hackers is to enter innocuously and corrupt applications as they execute during runtime. These attacks increasingly occur in process memory where they can act undetected, derail applications, expose sensitive data, and leave few clues behind. Learn how to change your fundamental security posture to protect the attack surface across the enterprise.
  • Webinar: Runtime Application Security for Dev-Sec-Ops Recorded: Sep 17 2020 16 mins
    Ray DeMeo, SVP, Virsec
    Today’s CISOs are facing unprecedented challenges. Between being forced to shift to operating remotely almost overnight and battling a surge in cyberattacks, the enterprise is under siege. Gartner urges business to “treat every application and API as a public-facing one.” Runtime memory is a notorious “black box,” which is precisely why attackers target it. This lack of visibility leaves systems vulnerable, enabling bad actors to run rampant. Ray DeMeo, Founder and SVP of Virsec, addresses how businesses can pivot to adopt a new security posture that emphasizes prevention and leverages self-defending applications.
  • Webinar: How Healthcare Can Maintain Cybersecurity During the COVID-19 Crisis Recorded: Sep 16 2020 32 mins
    Special Guest Melina Scotto, GDIT’s Federal Health Chief Information Security Officer
    Cyber criminals have responded to the COVID-19 pandemic with a wave of attacks against the healthcare sector. Their goal is to steal private data, shutdown systems with ransomware and exploit the crisis for financial gain. Even before the pandemic, many healthcare organizations struggled to maintain adequate cybersecurity. Recent research reveals that 83% of healthcare providers are running outdated software. More than 56% of medical devices are still running Window 7, which Microsoft stopped supporting in January 2020, and the FBI recently warned that "continuing to use Windows 7 within an enterprise may provide cybercriminals access into computer systems.”

    Melina Scotto, GDIT’s Federal Health Chief Information Security Officer, joins Virsec to outline best practices for maintaining security in today’s extraordinary times. She will detail how healthcare organizations can deploy cybersecurity solutions that automate protection and make critical applications and devices self-defending, without requiring painful software and platform upgrades. She will also discuss how to overcome the challenge of enabling remote patient and provider access without compromising security.
  • Protect the Enterprise from Ransomware Recorded: Sep 10 2020 40 mins
    Ray DeMeo, SVP, Virsec; Frank Walsh, Chief Security Architect, Virsec
    An astonishing 62% of organizations reported being a victim of ransomware in 2020. Many businesses don’t have a ransomware plan or response and some quietly pay the ransom without remedying the cause(s). NIST guidelines stress that “organizations that do not implement detection and response solutions leave themselves at risk for many types of data integrity attacks.” Learn how to protect the full application stack at the web, memory, and host layers to detect and stop ransomware attacks immediately – before the damage is done.
  • Live Demo: Protecting Web Applications Recorded: Aug 27 2020 32 mins
    Frank Walsh, Chief Security Architect
    Virsec is unique in protecting enterprise web applications across the full stack, including web traffic, web servers, third-party code, binary applications, and backend servers and databases. Join Virsec's Chief Security Architect, Frank Walsh, for an interactive demonstration of Virsec’s unique ability to protect mission-critical applications across the full application stack during runtime.
  • Inside Security: Protecting Enterprise Web Applications Recorded: Aug 20 2020 31 mins
    Mark Pelkoski, Sr. Director of Security Architecture
    Effective protection for enterprise web applications requires more than simply monitoring HTTP traffic with a WAF. Because attackers will always find your blind spots, it’s critical to protect the full stack of any external-facing application – including web traffic, web servers, third-party code, binary applications, backend applications, and databases. Join Mark Pelkoski, Senior Director of Security Architecture at Virsec for an interactive discussion on practical ways to defend business-critical applications from top to bottom.
  • Live Demo: Runtime Memory Protection Recorded: Aug 13 2020 32 mins
    Mark Pelkoski - Sr. Director of Security Archtecture
    Protecting applications during runtime at the memory level has long been considered difficult to impossible. Join Security Architect, Mark Pelkoski for a live demonstration of Virsec’s unique ability to detect and stop memory-based attacks during runtime before damage is done.
  • Inside Security: The Importance of Memory Protection Recorded: Aug 6 2020 21 mins
    Frank Walsh - Chief Security Architect, Willy Leichter - VP of Marketing
    You can’t protect what you can’t see – and most security is blind to process memory. Attackers know this and are launching in-memory attacks that bypass conventional security products. Join Frank Walsh, Chief Security Architect at Virsec, for an interactive discussion on the importance of memory protection, and a new approach that protects applications from the inside during runtime.
  • Achieving Cyber Resiliency Across Mission-Critical Assets Recorded: Jul 30 2020 52 mins
    Teresa Shea - Raytheon, Frank Walsh - Virsec, Jacob Noffke - Raytheon
    Improving resilience has become a critical goal as organizations must adapt to rapidly changing cyber threats, while ensuring that critical systems can withstand attack without disruption. Most traditional cybersecurity solutions have relied on perimeter protection, frequent patching, and auditing security logs. While these remain important, we must assume that the sophisticated attacker is already inside the network and has established access and privilege. For true cyber resiliency, we need deeper protection at the network, hardware, and OS layers, as well as visibility and control over how critical applications execute during runtime.
    Join experts from Raytheon Intelligence & Space and Virsec for an interactive discussion on the latest approaches to cyber resiliency, and the need for stronger protection at each layer of the system.
    Speakers will include:
    - Teresa Shea – Vice President, Cyber Offense and Defense Experts, Raytheon Intelligence & Space
    - Frank Walsh, Chief Security Architect, Virsec
    - Jacob Noffke, Principal Cyber Engineer, Raytheon Intelligence & Space
    - Moderated by Willy Leichter, VP of Marketing, Virsec
  • Security in 5 Minutes: the Importance of Runtime Protection Recorded: Jul 14 2020 3 mins
    Willy Leichter, VP of Marketing, Virsec
    This brief video explains the importance of runtime application protection. While most security solutions protect before or after code execution, Virsec is unique in monitoring and protecting applications as they are running, and instantly detecting unauthorized deviations.
  • Modernizing Security with Next-Generation Technology Recorded: Jun 18 2020 18 mins
    Damian Ehrlicher - CEO of ProtectedIT, Willy Leichter - Virsec
    A discussion with Damian Ehrlicher from ProtectedIT on how solutions like Virsec help their customers in modernizing security, making it more effective and easier to manage.
  • Prioritizing Cybersecurity During a Global Crisis Recorded: Jun 16 2020 36 mins
    Sajin Yousuff Kutty - FVC, Willy Leichter - Virsec
    Amid the disruption of COVID-19, IT priorities have rapidly shifted to enabling remote access while often reducing staffing and expenses, which can raise the risks of damaging cyberattacks. This webinar will discuss new security challenges and the need for enterprises to increase cybersecurity vigilance during this crisis while finding practical ways to increase automation and make critical applications self-defending.
  • Making Cybersecurity a Priority During a Global Crisis Recorded: Jun 9 2020 71 mins
    Andy Nallappan/Broadcom, Troels Oerting/World Economic Forum, Lakshmanan Chidambaram, Usama Fayyad, Rajiv Singh, Atiq Raza
    Even before the Coronavirus upended our business and personal lives, cybersecurity statistics seemed to be going in the wrong direction. Now, amid the disruption of COVID-19, IT priorities have rapidly shifted to enabling remote access while often reducing staffing and expenses, significantly raising the risks of damaging cyberattacks.
  • Inside Security: Why is it Important to Protect the Full Application Stack Recorded: May 29 2020 24 mins
    Satya Gupta - CTO, Willy Leichter - VP of Marketing
    Join Virsec CTO Satya Gupta and Willy Leichter for a discussion of the importance of protecting the full application stack including Web, Memory, and Host layers. Attackers are adept and finding security blind spots. Combating this requires a deeper, more holistic application security.
  • Inside Security Webcast: What is RASP and What Should it Be? Recorded: May 20 2020 28 mins
    Willy Leichter, Satya Gupta
    Runtime Application Security Protection (RASP) has been defined in limited terms, but the demands for runtime security are increasing. Join security experts from Virsec for a discussion of the need to protect applications during runtime, across the full stack.
  • Prioritizing Cybersecurity During a Global Crisis Recorded: May 19 2020 43 mins
    Experts from FVC and Virsec
    Amid the disruption of COVID-19, IT priorities have rapidly shifted to enabling remote access while often reducing staffing and expenses and significantly raising the risks of damaging cyberattacks.

    Join a panel of global cybersecurity experts for an interactive discussion hosted by FVC and Virsec, on the need for enterprises to increase cybersecurity vigilance during this crisis.

    Discussion topics will include:
    • The need to accelerate digital transformation to improve efficiency and security
    • Increasing automation and accuracy for critical security systems and applications
    • The need to share accurate, actionable information about attacks quickly·
    • Best practices for maintaining and improving security in today’s extraordinary times.
  • Making Applications Self-Defending with Control Flow Integrity Protection Recorded: May 15 2020 5 mins
    Vimal Solanki, Head of Security Strategy, Intel
    Intel's head of security strategy, interviewed on the Virsec stage at RSA 2020, discusses the need to update our security models and incorporate the Control Flow Integrity protection, at the memory level of applications to stop today's most advanced attacks.
  • New Models for Today's Security Threats with Virsec at RSA 2019 by Byron Acohido Recorded: May 7 2019 33 mins
    Byron Acohido, Last Watchdog, Willy Leichter & Shauntinez Jakab, Virsec
    Join an interview with Pulitzer-prize-winning journalist Byron Acohido at RSA 2019 on pressing security issues and new security models, with Willy Leichter, VP of Marketing and Shauntinez Jakab, Director of Product Marketing for Virsec.
  • Spectre Will Haunt Us for a Long Time Recorded: Oct 31 2018 58 mins
    Satya Gupta, CTO; Shauntinez Jakab, Dir. of Product Mkt.; Willy Leichter, VP of Marketing
    Learn How to Defend Your Business Now

    Since Spectre and Meltdown burst onto the scene in early 2018, and vendors have been scrambling to deploy patches, but we are not close to eliminating this 20-year-old vulnerability, and new variants continue to emerge. According to the researchers who discovered Spectre, “it is not easy to fix, it will haunt us for quite some time.”

    Business must, of course, go on but ignoring elephant-in-the-room threats is never wise. Solutions are emerging that look deeper into processor caching and memory usage, and selectively limit speculative execution, without recompiling code or hobbling performance.

    Join security experts from Virsec for a deep dive into how Spectre works, the latest variants, the limitations of current patches, and how to disrupt attacks without a performance hit.
Virsec: A New Approach to Security
Virsec delivers real-time protection from today's most dangerous cyber threats including memory corruption, fileless and zero-day attacks. Learn about the latest threats, and hear analysis and recommendations from security experts.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Achieving Cyber Resiliency Across Mission-Critical Assets
  • Live at: Jul 30 2020 5:00 pm
  • Presented by: Teresa Shea - Raytheon, Frank Walsh - Virsec, Jacob Noffke - Raytheon
  • From:
Your email has been sent.
or close