Hi [[ session.user.profile.firstName ]]

Evolution of cyberattacks and how to lower your vulnerabilities against them

In today’s cybercriminal world, the perception of attacker capability is vastly different from the reality of what organisations are having to defend against. Furthermore, an understanding of what attackers are after, why and how they monetize stolen or compromised assets, serves as one of the key factors in better understanding how current defenses and security processes, tools and frameworks, stack up, against the latest techniques available to the cybercriminal elite.

Join this webinar to learn:

How the three main attacks classes have evolved over the decades

What tools, techniques and procedures cybercriminals use today, with a deeper dive view of the cybercriminal economy that allows instant monetization of stolen or compromised business assets

What the most popular tools used today are and provide insights into a concerning (but rapidly growing) trend in attacker automation, with levels of sophistication akin to the capabilities of nation state groups

How to build an effective security testing programme in response to these changing trends and capabilities by the adversary and how to disrupt the attacker

Through the employment of your own sophisticated security functions and frameworks, to help originations change the game in what has become an adversarial golden age for cybercriminals across the world
Recorded Jun 7 2018 63 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Andy Condliffe, Solution Architect EMEA, Synack
Presentation preview: Evolution of cyberattacks and how to lower your vulnerabilities against them

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Part II: A Day in the Life of an Ethical Hacker, with Callum Carney, SRT Member Recorded: Aug 6 2019 35 mins
    Callum Carney, Synack Red Team Member and Justin Shaw-Gray, Sales Director, Synack
    Part II: A Day in the Life of an Ethical Hacker: A Discussion and Demo with Callum Carney, Synack Red Team Member

    Join us for part II of this compelling webcast series. This time around Callum will share his screen and walk you through the SRT portal and process he follows when responding to vulns. He'll answer more questions and will show you what it's like to be a member of the Synack Red Team.

    You'll hear about:
    - SRT tools including the XSS Hunter

    - What constitutes a vulnerability and the decisions that SRT members must make when faced with deciding what vulnerabilities are worth reporting

    - How detailed an SRT member's report typically has to be in order to be accepted during the 24hr reporting timeframe

    We hope you can join!
  • How FinServ is using Crowdsourced Security to Stay Ahead of the Adversary Recorded: Jul 16 2019 19 mins
    Nick Harahill, Synack Senior Director Global Operations, & Monica Armand, Synack Product Marketing Manager
    Curious how Financial Services organizations are better securing their organizations from malicious attackers? Many organizations are using crowdsourced security testing and Synack’s Senior Director of Global Operations, Nick Harrahill, reveals how companies are using Crowdsourced Security to achieve compliance, reduce risk, and stay ahead of the adversary. In this webinar we discuss:
    -What strategies Financial Services security teams use to manage the increasing severity of vulns
    -Why crowdsourced penetration testing is the right solution for Financial Services
    -How Financial Services organization set up a crowdsourced security programs so they are finding the vulnerabilities that are most impactful
  • How Continuous Security Testing Better Supports Rapid Software Development Recorded: Jun 28 2019 50 mins
    Mohamed Abotaleb, Cyber Defence Center & IR Manager, Telefonica and Ron Peeters, Managing Director EMEA, Synack
    How Continuous Security Testing Better Supports Rapid Software Development and Increasingly Agile Systems

    Penetration testing is the traditional method used for uncovering exploitable vulnerabilities but falls progressively short in protecting the business due to its inability to emulate adversarial hacker behavior and today’s sophisticated cyber-attacks. Furthermore, periodic pen tests typically need to be scheduled at least several months in advance and thereby do not align with the short term urgency and nature of the continuous deployment required by DevOps SDLC. Hence, applications and updates go live without being thoroughly tested, resulting in the risk that at any moment in time serious vulnerabilities may be introduced into live systems and are not detected in a timely manner.

    Join speakers Mohamed Abotaleb and Ron Peeters and learn about:

    - The security issues and challenges of a rapid software development and deployment environment with agile systems

    - A new continuous security testing model that better supports DevOps SDLC and Cloud environment

    - How this testing model combines automation technology with continuous or on-demand manual security testing

    - A recent case study from Telefonica that demonstrates the benefits and capabilities of such continuous testing security model
  • Part II: A Day in the Life of an Ethical Hacker, with Callum Carney, SRT Member Recorded: Jun 12 2019 36 mins
    Callum Carney, Synack Red Team Member and Justin Shaw-Gray, Sales Director, Synack
    Part II: A Day in the Life of an Ethical Hacker: A Discussion and Demo with Callum Carney, Synack Red Team Member

    Join us for part II of this compelling webcast series. This time around Callum will share his screen and walk you through the SRT portal and process he follows when responding to vulns. He'll answer more questions and will show you what it's like to be a member of the Synack Red Team.

    You'll hear about:
    - SRT tools including the XSS Hunter

    - What constitutes a vulnerability and the decisions that SRT members must make when faced with deciding what vulnerabilities are worth reporting

    - How detailed an SRT member's report typically has to be in order to be accepted during the 24hr reporting timeframe

    We hope you can join!
  • Five ways the G2000 is Building Security and Trust Recorded: Jun 4 2019 29 mins
    Ravi Das, Cyber Security News and Ann-Marie (Punky) Witt, Synack
    We asked CISOs from the Global 2000, government agencies, and high-growth companies about their 2019 priorities. Across the board, they answered: effective, efficient security that is grounded in trust.

    In this new webinar Cyber Security News’ Ravi Das dives deep into the 2019 Trust Report findings with Synack’s Director of Product Marketing, Anne-Marie (Punky) Witt. In this webinar, Ravi and Punky discuss the key findings from the report, including:
    - The 2019 list of most secure and trusted industries
    - Average security performance over time (and the impact on trust scores)
    - The ROI of a continuous, integrated approach to security
    - Trends in severity of vulnerability findings and remediation
    - The 5 things that successful organizations are doing to build security and trust
  • Intelligence in Penetration Testing - Human vs. Artificial Recorded: May 7 2019 36 mins
    Doug Cody, Solutions Architect
    As cybercrime continues to evolve and the consequences and damages of an attack continue to increase, it is vital to manage vulnerabilities through security testing.

    Security Testing can be done in several different ways, the one that's best for you is the one that aligns with your threat model and traditional concerns. Join Doug Cody, Solutions Architect, Synack as he discusses the roles of scanners, penetration testing, bug bounty, AI and more.

    Join this webinar to learn:
    - How Different Vulnerabilities Map to Different Discovery Methods
    - What Scanners Really Do
    - What Penetration Testers Really Do
  • Essential Elements of a Penetration Test Recorded: Apr 23 2019 36 mins
    Jason Calvert, Synack Red Team / Rajesh Krishnan, Synack Product Marketing
    What do you get when you buy a penetration test? If it’s the same thing you got last time - maybe you’re not getting enough for your money. Technology for monitoring testing, analyzing traffic, and crowdsourcing have changed pen testing forever.

    Join security expert and Synack Red Team member Jason Calvert and Synack’s Rajesh Krishnan as they go through the Essential Elements. Viewers can learn:
    - Core components of a penetration test
    - Who uses the outputs and why
    - What you can now get above and beyond a plain penetration test
  • Five ways the G2000 is Building Security and Trust Recorded: Apr 16 2019 29 mins
    Ravi Das, Cyber Security News and Ann-Marie (Punky) Witt, Synack
    We asked CISOs from the Global 2000, government agencies, and high-growth companies about their 2019 priorities. Across the board, they answered: effective, efficient security that is grounded in trust.

    In this new webinar Cyber Security News’ Ravi Das dives deep into the 2019 Trust Report findings with Synack’s Director of Product Marketing, Anne-Marie (Punky) Witt. In this webinar, Ravi and Punky discuss the key findings from the report, including:
    - The 2019 list of most secure and trusted industries
    - Average security performance over time (and the impact on trust scores)
    - The ROI of a continuous, integrated approach to security
    - Trends in severity of vulnerability findings and remediation
    - The 5 things that successful organizations are doing to build security and trust
  • Next-Generation Penetration Testing - Go Beyond Just Compliance Recorded: Apr 9 2019 45 mins
    Andy Condliffe, Solution Architect
    What’s your standard penetration testing getting you? Compliance and a vague summary report. What could you get with a crowdsourced penetration test from Synack?

    - A crowd of top, trusted researchers
    - Technology that optimizes for testing efficiency, control, and visibility
    - Managed workflow processes
    - Own the IP of all discovered vulnerabilities with none of the liability.

    Stop settling for the ordinary...Try the Next-Gen. See how you can go beyond just compliance by joining our webinar. You will learn:

    - The problems that traditional penetration testing haven’t addressed
    - How Synack’s crowdsourced platform offers a better pen test and better customer experience
    - Specific use cases for a Synack crowdsourced penetration test
  • Penetration Testing or Vulnerability Scanning - Aren’t they the same thing? Recorded: Apr 2 2019 52 mins
    Mike Larmie, Federal Solutions Architect, Synack
    Take a look behind the curtain and decide for yourself. Join government security expert Mike Larmie as he breaks down the key differences. He will share what your agency needs to know to make sure your security program is both identifying vulnerabilities and reducing risk of exploit. He will cover the techniques, tools, and tradecraft of each, as well as common questions such as:

    -Who performs the services?
    -How often do they run in a network environment?
    -What’s covered in their data output and reporting?
    -What’s their value?

    Mike will present how government agencies are reinventing how they conduct security testing to achieve greater efficiency and ROI. Learn how your agency’s security team CAN achieve security without compromise.

    BIO: Mike Larmie, Federal Solutions Architect at Synack has more than 20 years of IT Security Experience, and has been involved with countless missions within the DoD, Intel and Civilian Federal Agencies. He has a wealth of experience having worked at companies such as Tenable, Sourcefire, Rapid7, Infoblox, G2 and others.
  • Day in the Life of an Ethical Hacker: A Discussion w/ Callum Carney, SRT Member Recorded: Apr 2 2019 44 mins
    Callum Carney, Synack Red Team Member, Justin Shaw-Gray, Sales Director, Synack
    The Synack Red Team (SRT) gives the most talented security researchers across the globe a platform to do what they love and get paid for it. A private network of highly-curated and vetted security researchers, the SRT is challenged every day to deliver exploitation discovery and management for some of the biggest brands in the world. On the Synack platform, researchers have access to the industry’s first ever hacker toolkit built at enterprise scale, to make them more efficient and effective at uncovering critical vulnerabilities that matter.

    These ethical hackers are increasingly being recognised as an important way for businesses to unearth security weaknesses before they can be exploited by online criminals.

    In this Webinar, Synack Red Team member, Callum Carney joins Synack’s Justin Shaw Gray for an open conversation on what a day in the life of an ethical hacker is all about. He’ll discuss:

    - How he started his ethical hacker journey
    - Why he chose Synack
    - How it’s changed in the 2 years he’s been working with us
    - What information is critical to successful testing
    - Why you should be using ethical hackers
    - Processes used when a new target comes online.
    - And much much more


    Callum started his ethical hacking journey by supporting organisations such as Google, Spotify and Local UK Businesses to secure their systems. In January 2017, after noticing all of the great comments regarding the Synack platform (fast payouts, fast response times, etc), he applied for the Synack Red Team and was accepted. During his time with Synack he has worked to secure a multitude of systems including government and Fortune 500 enterprise systems. In addition to his work with Synack Callum is studying for an Undergraduate Masters Degree in Computer Science and working as a Software Tester/Developer for the UKs largest supplier of Functional Skills and GCSE assessments.
  • Understanding Crowdsourced Security Models for Government Recorded: Mar 29 2019 35 mins
    Paul Mote, Chief Solutions Architect
    Join Synack on a journey as we provide an overview of different crowdsourced security testing models such as Crowdsourced Penetration Testing, Bug Bounty, and Vulnerability Disclosure Policies. We will cover insights discussed in our recently published white paper, Crowdsourced Security White Paper: Adoption and Market Trends in the U.S. Government, and highlight the key differentiators in crowdsourced security models including vetting, technology, practical applications, and pricing. Come away with an understanding of what model(s) are right for your agency!
  • Trust in Action: A Discussion with Kevin Fielder, CISO, Just Eat Recorded: Mar 26 2019 35 mins
    Kevin Fielder, CISO, Just Eat, Justin Shaw-Gray, Sales Director, Synack
    Consumers are upping the ante for CISOs in 2019! >19% of consumers reported that they would not feel comfortable shopping at a store that has been breached or using an online service and 50% of consumers claim that security was a priority when choosing a bank. From eCommerce to Financial Services: trust is top of mind for consumers, and trust is becoming a core part of the CISO charter.

    Join Synack's Justin Shaw-Gray as he interviews Kevin Fielder, CISO, Just Eat
    They'll discuss:

    - The security challenges CISOs face in eCommerce and how they are integrating crowdsourced security into their day-to-day operations to build trust with the board and with customers.
    - What security’s role is in building a trusted business
    - How to plug security into DevOps
    - And Kevin's perspective on which security programs are actually worthwhile and where innovation is needed. What works? What doesn’t?

    You won’t want to miss this lively discussion
  • Synack as Partner for Your TIBER Framework Recorded: Mar 12 2019 52 mins
    Andy Condliffe, Solution Architect EMEA, Synack
    The European Central Bank created a framework to provide guidance to leaders at financial institutions to help them secure their organizations. TIBER standardizes how to source and conduct an intelligence red team assessment so you can better protect your organization.

    Please join us as Andy Condliffe, Solution Architect at Synack EMEA presents on:
    - How Synack’s AI-powered security testing platform was created to help security leaders demonstrate adherence to regulatory standards and utilize effective vulnerability discovery in order to best protect their digital assets.
    - How Synack’s hacker-powered security platform offers top quality testing results and expert insights on TIBER compliance and remediation routes, packaged in an efficient solution that doesn’t burden your team or usurp your control.
    - And how your journey with Synack will ensure you gain efficient, effective results with zero compromise.
  • Human vs. Artificial - Intelligence in Penetration Testing Recorded: Feb 28 2019 37 mins
    Doug Cody, Solutions Architect
    Security Testing can be done in several different ways, the one that's best for you is the one that aligns with your threat model and traditional concerns. Join Doug Cody, Solutions Architect, Synack as he discusses the roles of scanners, penetration testing, bug bounty, AI and more.

    During this webinar, you'll learn:
    * How Different Vulnerabilities Map to Different Discovery Methods
    * What Scanners Really Do
    * What Penetration Testers Really Do
  • Penetration Testing or Vulnerability Scanning - Aren’t they the same thing? Recorded: Dec 18 2018 53 mins
    Mike Larmie, Federal Solutions Architect, Synack
    Take a look behind the curtain and decide for yourself. Join government security expert Mike Larmie as he breaks down the key differences. He will share what your agency needs to know to make sure your security program is both identifying vulnerabilities and reducing risk of exploit. He will cover the techniques, tools, and tradecraft of each, as well as common questions such as:

    -Who performs the services?
    -How often do they run in a network environment?
    -What’s covered in their data output and reporting?
    -What’s their value?

    Mike will present how government agencies are reinventing how they conduct security testing to achieve greater efficiency and ROI. Learn how your agency’s security team CAN achieve security without compromise.

    BIO: Mike Larmie, Federal Solutions Architect at Synack has more than 20 years of IT Security Experience, and has been involved with countless missions within the DoD, Intel and Civilian Federal Agencies. He has a wealth of experience having worked at companies such as Tenable, Sourcefire, Rapid7, Infoblox, G2 and others.
  • Why your penetration tests in 2018 were a let down and best practices for 2019 Recorded: Dec 5 2018 53 mins
    Quoc Dang, Andy Condliffe, Synack EMEA
    You know that standard penetration tests delivered by the BIG 5 misses the mark when it comes to protecting the new needs of the cyber-secure, agile, data-driven organisation. You probably run them once or thrice a year to tick a compliance box or because your superiors have told you to do so. Why settle for the old way of doing a penetration test performed by a couple of junior testers only to wait weeks for the reports and be disappointed with the results? Join the Synack EMEA team for an upcoming webinar where we will share how crowdsourced security testing is modernizing the pen test for agile, data-driven organisations who need, more than ever, to be secure. We will cover:

    What's wrong with traditional penetration tests
    Why smarter, innovative organizations adopt a continuous, crowdsourced approach to security testing
    How the use of AI, bug bounty and smart technology transforms testing results
    When you can started your own crowdsourced security testing
  • Beyond Bug Bounty in Financial Services Recorded: Nov 7 2018 60 mins
    Karl Schimmeck, Morgan Stanley; Jay Kaplan, Synack; Mikhail Sosonkin, Synack Red Team; Sean Sposito, Javelin Strategies
    Penetration testing is not a new concept – and that’s the problem, especially for financial institutions working to protect their financial assets and customer data in a modern, digital economy.

    Banks, credit card companies, digital currency exchanges, and other financial institutions from the Fortune 500 to early stage companies are turning to crowdsourced security to get beyond penetration testing and achieve both real security and compliance.

    Karl Schimmeck, Executive Director, Global Head of Vulnerability Management at Morgan Stanley, recently took the stage with Jay Kaplan, CEO & Co-Founder of Synack, and Mikhail Sosonkin, Synack Red Team member, at leading payments conference Money20/20 to talk about how the industry is conducting more aggressive security testing in a controlled, efficient, results-oriented way.
  • Security & Democracy: Collaborating on Election Security Recorded: Nov 6 2018 55 mins
    Chris Krebs and tech leaders Synack, Microsoft, and Cloudflare
    Under Secretary for the Department of Homeland Security’s National Protection and Programs Directorate (NPPD) Chris Krebs and tech leaders Synack, Microsoft, and Cloudflare came together in Washington D.C. today through a “Security and Democracy” event convened by TheBridge. This event brought together private companies who are driving election security initiatives with the Department of Homeland Security to discuss the election threat landscape, the progress of public-private collaboration efforts to secure the election process, and the future outlook on local elections and election security.
  • Offensive Security Testing for SAP HANA and Fiori Apps; why you are at risk ... Recorded: Nov 6 2018 59 mins
    Ron Peeters, Synack; Uemit Uezdurmus; SAP; Holger Stumm, CEO of LOG2
    SAP HANA environments have complex architectures with large attack surfaces and many potential breach points. They are often exposed and external facing to a large extent i.e. SAP FIORI Apps. Traditional compliance-based pen tests and vulnerability scanning simply aren’t able to mimic sophisticated cyber attacks in order to find and fix exploitable vulnerabilities. This puts your organization at great risk of being compromised, data breaches and GDPR violations. So what are the options?

    Join this session as we outline the need for a smarter security testing solution that is offensive, mimics attacker behaviour, reduces your attack surface, and lowers vulnerabilities against sophisticated attacks. We will cover:

    How a crowd of elite security testers can be deployed rapidly to uncover serious vulnerabilities in your external facing SAP applications
    How a continuous offensive security approach to your SAP landscape is needed in support of modern agile SDLC / DevOps environments

    Presented by:

    – Uemit Uezdurmus, Global Head of SAP Managed Security Services, SAP

    – Holger Stumm, CEO of LOG2, a Germany based specialist in SAP security testing for 30+ years

    – Ron Peeters, Managing Director EMEA of Synack, a Silicon Valley based leader in Offensive Security Testing.
Synack
Synack is a security company revolutionizing how enterprises view cybersecurity: through a hacker’s eyes. Synack’s private, managed hacker-powered security solution arms clients with hundreds of the world's most skilled, highly vetted ethical hackers who provide a truly adversarial perspective to clients’ IT environments.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Evolution of cyberattacks and how to lower your vulnerabilities against them
  • Live at: Jun 7 2018 9:00 am
  • Presented by: Andy Condliffe, Solution Architect EMEA, Synack
  • From:
Your email has been sent.
or close