Hi [[ session.user.profile.firstName ]]

Defending Against Nation-State Attacks: Breaking the Kill Chain

As more alarming news emerges about nation-state attacks like SolarWinds and Hafnium, many organizations are not sure how to react. Even if you keep up with security basics, like patching, access control, and network hygiene, these attacks seem to easily bypass conventional security tools.

Join security experts from Virsec for analysis of the multi-step kill chains involved in these attacks, and new strategies to interrupt these attacks at multiple points, during runtime.
Recorded Apr 15 2021 40 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Virsec
Presentation preview: Defending Against Nation-State Attacks: Breaking the Kill Chain

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Memory Protection: Technology Primer May 6 2021 5:00 pm UTC 30 mins
    Virsec
    Runtime memory is the foundation of most computing, yet few security technologies have any visibility or control over critical systems as they execute in memory. A few vendors talk about memory protection, but they typically look for behavioral anomalies after execution, or operate at the O/S level with no application awareness.

    Join security experts from Virsec for a primer on how memory protection should operate, and the critical need for application-awareness as code executes. With over 48 patents, Virsec has unrivaled expertise in the area of memory protection and pioneered solutions that provide critical visibility and control over this new security battleground.
  • Runtime: The New Security Battleground Apr 29 2021 5:00 pm UTC 30 mins
    Virsec
    Advanced attacks like SolarWinds and Hafnium are easily bypassing conventional security tools and targeting a blind spot – application runtime. While most tools try to guess at threats at the perimeter, or look for clues after the fact, they view application workloads as a “black box.”

    Join security experts from Virsec as we discuss the urgent need to gain visibility, and control over critical workloads as code executes. This will include a demonstration of how Virsec maps acceptable application execution and instantly spots and stops deviations during runtime.
  • Leave No Apps Behind: Protecting Legacy Applications Apr 22 2021 5:00 pm UTC 30 mins
    Virsec
    From ERP to SCADA to government databases, legacy applications are a fact of life and won’t go away anytime soon. Yet far too much of our security thinking assumes that organizations can always patch, upgrade, or rip-and-replace complex legacy applications to deploy new, supposedly safer systems. There must be a better way.

    Join security experts from Virsec for a discussion on how to secure legacy applications, in any state, without depending on patching, upgrades, or significant downtime.
  • Defending Against Nation-State Attacks: Breaking the Kill Chain Recorded: Apr 15 2021 40 mins
    Virsec
    As more alarming news emerges about nation-state attacks like SolarWinds and Hafnium, many organizations are not sure how to react. Even if you keep up with security basics, like patching, access control, and network hygiene, these attacks seem to easily bypass conventional security tools.

    Join security experts from Virsec for analysis of the multi-step kill chains involved in these attacks, and new strategies to interrupt these attacks at multiple points, during runtime.
  • Hafnium Exchange Exploit: Is Patching Enough? Recorded: Apr 8 2021 33 mins
    Virsec
    Virsec delivers a detailed analysis of the Hafnium Microsoft Exchange server exploit. Watch recreations of the attacks perpetrated by the Hafnium hacking group that exploited vulnerabilities in Microsoft Exchange. We'll go through all the steps of the Kill Chain and discuss whether patching will be enough to repair the damage and how to best harden your defenses.
  • Supply Chain Protection: Stop Remote Code Execution During Runtime Recorded: Apr 1 2021 62 mins
    Virsec
    The SolarWinds supply chain attack was a brutal security failure that relied on perimeter tools, threat hunting and prior knowledge to stop an attack – only to find that these tools were powerless to identify and stop it.

    Existing security tools are not sufficient to secure the supply chain, namely because the most sophisticated attacks are occurring at runtime, a notorious blind spot in organizations. Conventional security tools are not instrumented to detect exploits in memory and do not provide any visibility into runtime. More importantly, they do not provide runtime protection, so evasive attacks that proliferate at the memory level often go undetected for days, months, or even years.

    Virsec joins the esteemed SANS Institute to share effective new tactics and tools to protect and defend against sophisticated and evasive supply chain attacks like remote code execution and other crippling runtime exploits.

    Watch a live demonstration of the technology that stops runtime exploits in its tracks, learn how to identify and prevent these attacks in your own infrastructure, and get best practices to protect your workloads against future or ongoing supply chain attacks.
  • Memory Protection Demo Recorded: Mar 25 2021 32 mins
    Virsec
    Protecting applications during runtime at the memory level has long been considered difficult to impossible. John Chambers, former CEO of Cisco, recently proclaimed that we are at the inflection point for the next paradigm shift in cybersecurity; the battleground has moved to the workloads, and the only way to effectively defend them is by ensuring application-aware protection at runtime.

    Traditional and legacy solutions are not enough to protect organizations from the extremely advanced attacks we are seeing today. Organizations will need to implement application-aware security controls in on-premises, cloud, hybrid, and / or container environments to effectively defend against sophisticated and evasive attacks and exploits.

    Mark Pelkoski, Senior Director of Security Architecture at Virsec, steps us through a real-time demonstration of Virsec’s unique ability to detect and stop memory-based attacks during runtime before damage is done.
  • Demonstration of the Hafnium-MS Exchange Attack Recorded: Mar 25 2021 6 mins
    Virsec
    This video shows a live demonstration of the full attack kill chain likely used by the Hafnium Group to attack thousands of Microsoft Exchange servers globally.
  • Zero-Trust Cloud Workload Protection Cloud Security Summit Recorded: Mar 16 2021 50 mins
    Virsec
    As attacks on software supply chains, and critical applications continue, we need to extend the zero-trust model into cloud workloads during runtime, ensuring that only the right code and processes can execute, regardless of the threat environment.

    Join security experts from Virsec as they discuss the challenges of protecting an expanding attack surface area with cloud, hybrid, and container environments, and the need for application-awareness, and effective runtime protection. Get best practices for security implementations for workloads that ensure vulnerability protection with granular application control, system integrity assurance, and advanced memory protection at runtime.

    Willy Leichter, VP of Marketing and Product Strategy
    Willy Leichter leads Virsec marketing and product strategy. With extensive experience in a range of IT domains including network security, global data privacy laws, data loss prevention, access control, email security and cloud applications, he is a frequent speaker at industry events and author on IT security and compliance issues. A graduate of Stanford University, he has held marketing leadership positions in the US and Europe, at CipherCloud, Axway, Websense, Tumbleweed Communications, and Secure Computing (now McAfee).


    Shauntinez Jakab, Senior Director of Product Marketing
    Shauntinéz has spent over 20 years working with executives to create unique high-growth product and business strategies in cybersecurity, network management, parallel systems, enterprise software and cloud-based services. She has held senior positions at F5 Networks, Intuit, Aryaka Networks and Citrix Systems. Shauntinez holds a BS in Electrical Engineering from Grambling State University, with graduate studies in microelectronics.
  • Analysis of the Hafnium / MS Exchange Cyberattack Recorded: Mar 16 2021 26 mins
    Satya Gupta, CTO
    The Virsec Security Lab has analyzed and recreated the attacks allegedly perpetrated by the Hafnium hacking group exploiting vulnerabilities in Microsoft Exchange. This video steps through all the steps of the Kill Chain and highlights where Virsec can stop these attacks.
  • Florida Water Utility Attack Demonstration Recorded: Mar 10 2021 5 mins
    Virsec
    In this demo, the Virsec Research Lab demonstrates how the recent attack on a Florida Water Utility may have been perpetrated, through spear-phising, exploiting a vulnerability in TeamViewer, and launch remote code execution malware.
  • Analysis of the SolarWinds Attack Recorded: Mar 9 2021 40 mins
    Satya Gupta, CTO
    Learn in depth about how the SolarWinds attack was perpetrated and how Virsec could have pre-emptively stopped the attack kill chain at multiple points.
  • Analysis of the Florida Water Utility Cyberattack Recorded: Mar 2 2021 31 mins
    Robert Touchton - MR Systems, Satya Gupta - Virsec, Saurabh Sharma - Virsec
    Water and wastewater treatment plants are some of the most vulnerable critical infrastructure targets in the United States. Many of these facilities are underfunded, under-resourced and are not monitored 24/7. Throw into the mix vulnerable legacy applications and operating systems, and you might as well send out engraved invitations for hackers to come on in!

    Residents of Oldsmar, Florida were lucky that a plant manager happened to notice the hack in real-time and was able to stop the attempted poisoning of the entire city’s population. But water utilities shouldn’t have to rely on luck to prevent such dangerous attacks.

    Experts from Virsec and MR Systems discuss what's known about the recent attack on the Florida Water Utility that compromised security and exposed direct access to a critical SCADA system. Get action items you can implement right now to harden your system's defenses immediately.

    Distinguished guests include
    Robert Touchton, Chief Technology Officer, MS Systems
    Satya Gupta, Chief Technology Officer and Co-Founder, Virsec
    Saurabh Sharma, VP Sales ICS & Strategic Partnerships, Virsec
  • Achieving Cyber Resiliency Across Mission-Critical Assets Recorded: Feb 18 2021 52 mins
    Raytheon, Virsec
    Improving resilience has become a critical goal as organizations must adapt to rapidly changing cyber threats, while ensuring that critical systems can withstand attack without disruption. Most traditional cybersecurity solutions have relied on perimeter protection, frequent patching, and auditing security logs. While these remain important, we must assume that the sophisticated attacker is already inside the network and has established access and privilege.

    For true cyber resiliency, we need deeper protection at the network, hardware, and OS layers, as well as visibility and control over how critical applications execute during runtime.

    Join experts from Raytheon Intelligence & Space and Virsec for an interactive discussion on the latest approaches to cyber resiliency, and the need for stronger protection at each layer of the system.

    Featuring:
    - Teresa Shea – Vice President, Cyber Offense and Defense Experts, Raytheon Intelligence & Space
    - Jacob Noffke, Principal Cyber Engineer, Raytheon Intelligence & Space
    - Frank Walsh, Chief Security Architect, Virsec
    - Moderated by Willy Leichter, VP of Marketing, Virsec
  • Zero Trust Cloud Workload Protection Recorded: Feb 11 2021 25 mins
    Virsec
    Cloud computing adoption provides agility, scalability and performance. But cloud deployments require ongoing security controls, and organizations often mistakenly believe that their provider-based security is sufficient enough to protect them. However, nothing could be further from the truth. Application workloads are the new battleground and as infrastructure is outsourced to the cloud, organizations need to implement application-aware workload protection.

    Gartner recognizes Virsec in a select group of Cloud Workload Protection vendors that provide advanced memory and process integrity protection. Virsec is platform-agnostic and works seamlessly with clouds, containers, distributed and hybrid systems. Virsec is the only vendor to integrate application control, system integrity assurance and memory protection and exploit prevention.

    Join us for an in-depth dive into how you can close your security gaps and enable business in the cloud. Get best practices for security implementations for workloads that ensure vulnerability protection with granular application control, system integrity assurance, and advanced memory protection at runtime.
  • SolarWinds Post-Mortem Report: Analysis & Action Plan Recorded: Feb 4 2021 34 mins
    Virsec
    The SolarWinds attack showed everyone that despite billions of dollars spent on cybersecurity, many organizations were exposed and unprotected for months on end. All the end point protection, perimeter and threat hunting tools didn’t identify the nefarious Remote Code Execution (RCE) attack that ran undetected in runtime, a notorious blind spot for enterprises and critical infrastructure alike.

    See how the culprits infiltrated and deposited a backdoor into the well-protected SolarWinds software infrastructure, and then into the systems of tens of thousands of users in the SolarWinds supply chain. Watch an end-to-end recreation of the SolarWinds attack and see how the Virsec security solution immediately detects and stops the evasive exploit.

    Satya Gupta, Virsec CTO and Co-Founder, explains why effective supply chain protection requires new tactics. He analyzes the technical details of the SolarWinds attack and provides actionable intelligence to prevent it from happening again.
  • Weekly Vulnerability Analysis: Episode 15 Recorded: Feb 2 2021 20 mins
    Satya Gupta, CTO
    Virsec Security Research Lab publishes a weekly analysis of the Top 5 vulnerabilities that have a large potential impact, high severity level, and should be acted upon by enterprise security teams. This video series accompanies daily blogs detailing each vulnerability.

    This episode discusses: CVE-2020-4949: IBM WebSphere App Server (XXE), CVE-2021-25646: Apache Druid (RCE), CVE-2020-29535: RSA Archer (Stored XSS), CVE-2021-3156: SUDO (Heap Overflow), CVE-2021-3115: Golang (CMDi and RCE), CVE-2020-4888: IBM QRadar SIEM- (Java Deserialization RCE)
  • Application-Aware Workload Protection: What It Is; Why It Matters (Intl) Recorded: Jan 29 2021 45 mins
    Virsec
    Virsec has developed the only application-aware workload protection technology that is able to detect and defeat any attack – known or unknown – in runtime. Application workloads have become the number one attack surface. Whether on servers or clouds or containers – workloads are being attacked every day, every minute and every second.

    If you’re wondering, “Hey, what’s a workload?” then this webinar is for you. And if you’re tasked with securing all or any part of your organization’s IT infrastructure, this webinar is definitely for you. See why industry giants like Raytheon, Cisco, Broadcom, General Dynamics, and Schneider Electric have turned to Virsec to protect their attack surfaces.

    Virsec stops malicious code the moment it attempts to execute and delivers complete visibility across the application stack. Join Virsec's senior director of product marketing, Shauntinez Jakab, to learn how to proactively protect your attack surfaces with no signatures, no patching, no noise and no tuning.
  • Application-Aware Workload Protection: What It Is; Why It Matters Recorded: Jan 28 2021 44 mins
    Virsec
    Virsec has developed the only application-aware workload protection technology that is able to detect and defeat any attack – known or unknown – in runtime. Application workloads have become the number one attack surface. Whether on servers or clouds or containers – workloads are being attacked every day, every minute and every second.

    If you’re wondering, “Hey, what’s a workload?” then this webinar is for you. And if you’re tasked with securing all or any part of your organization’s IT infrastructure, this webinar is definitely for you. See why industry giants like Raytheon, Cisco, Broadcom, General Dynamics, and Schneider Electric have turned to Virsec to protect their attack surfaces.

    Virsec stops malicious code the moment it attempts to execute and delivers complete visibility across the application stack. Join Virsec's senior director of product marketing, Shauntinez Jakab, to learn how to proactively protect your attack surfaces with no signatures, no patching, no noise and no tuning.
  • SolarWinds Attack End-to-End Demo Recorded: Jan 26 2021 9 mins
    Virsec
    This demonstration shows how the culprits infiltrated and deposited a backdoor into the well-protected SolarWinds software infrastructure, which then made its way into the systems of tens of thousands of users in the SolarWinds supply chain. This type of attack, Remote Code Execution (RCE), is devastating because it executes in runtime, a notorious blind spot for most organizations.

    Current security solutions rely on knowledge of past malware to form signatures or behavioral profiles of what might happen next. End point protection, perimeter and threat hunting tools won’t identify unique malware that already exists in your system.

    Effective supply chain protection requires new tactics. Watch as the Virsec security solution immediately identifies and stops an evasive Remote Code Execution attack in an end-to-end recreation of the SolarWinds attack.
Security from the Inside
Virsec is the industry leader of application-aware server workload protection. Learn how to improve and optimize your security posture, ensure real-time protection from today's most dangerous cyber threats and attacks, including memory corruption, fileless and zero-day attacks. Hear valuable insights from cybersecurity leaders, experts and influencers, vulnerability analysis and more.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Defending Against Nation-State Attacks: Breaking the Kill Chain
  • Live at: Apr 15 2021 5:00 pm
  • Presented by: Virsec
  • From:
Your email has been sent.
or close