Hi [[ session.user.profile.firstName ]]

Evolution of cyberattacks and how to lower your vulnerabilities against them

In today’s cybercriminal world, the perception of attacker capability is vastly different from the reality of what organisations are having to defend against. Furthermore, an understanding of what attackers are after, why and how they monetize stolen or compromised assets, serves as one of the key factors in better understanding how current defenses and security processes, tools and frameworks, stack up, against the latest techniques available to the cybercriminal elite.

Join this webinar to learn:

How the three main attacks classes have evolved over the decades

What tools, techniques and procedures cybercriminals use today, with a deeper dive view of the cybercriminal economy that allows instant monetization of stolen or compromised business assets

What the most popular tools used today are and provide insights into a concerning (but rapidly growing) trend in attacker automation, with levels of sophistication akin to the capabilities of nation state groups

How to build an effective security testing programme in response to these changing trends and capabilities by the adversary and how to disrupt the attacker

Through the employment of your own sophisticated security functions and frameworks, to help originations change the game in what has become an adversarial golden age for cybercriminals across the world
Recorded Jun 7 2018 63 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Andy Condliffe, Solution Architect EMEA, Synack
Presentation preview: Evolution of cyberattacks and how to lower your vulnerabilities against them

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Intelligence in Penetration Testing - Human vs. Artificial May 7 2019 8:00 am UTC 36 mins
    Doug Cody, Solutions Architect
    As cybercrime continues to evolve and the consequences and damages of an attack continue to increase, it is vital to manage vulnerabilities through security testing.

    Security Testing can be done in several different ways, the one that's best for you is the one that aligns with your threat model and traditional concerns. Join Doug Cody, Solutions Architect, Synack as he discusses the roles of scanners, penetration testing, bug bounty, AI and more.

    Join this webinar to learn:
    - How Different Vulnerabilities Map to Different Discovery Methods
    - What Scanners Really Do
    - What Penetration Testers Really Do
  • Essential Elements of a Penetration Test Apr 23 2019 5:00 pm UTC 36 mins
    Jason Calvert, Synack Red Team / Rajesh Krishnan, Synack Product Marketing
    What do you get when you buy a penetration test? If it’s the same thing you got last time - maybe you’re not getting enough for your money. Technology for monitoring testing, analyzing traffic, and crowdsourcing have changed pen testing forever.

    Join security expert and Synack Red Team member Jason Calvert and Synack’s Rajesh Krishnan as they go through the Essential Elements. Viewers can learn:
    - Core components of a penetration test
    - Who uses the outputs and why
    - What you can now get above and beyond a plain penetration test
  • Five ways the G2000 is Building Security and Trust Recorded: Apr 16 2019 29 mins
    Ravi Das, Cyber Security News and Ann-Marie (Punky) Witt, Synack
    We asked CISOs from the Global 2000, government agencies, and high-growth companies about their 2019 priorities. Across the board, they answered: effective, efficient security that is grounded in trust.

    In this new webinar Cyber Security News’ Ravi Das dives deep into the 2019 Trust Report findings with Synack’s Director of Product Marketing, Anne-Marie (Punky) Witt. In this webinar, Ravi and Punky discuss the key findings from the report, including:
    - The 2019 list of most secure and trusted industries
    - Average security performance over time (and the impact on trust scores)
    - The ROI of a continuous, integrated approach to security
    - Trends in severity of vulnerability findings and remediation
    - The 5 things that successful organizations are doing to build security and trust
  • Next-Generation Penetration Testing - Go Beyond Just Compliance Recorded: Apr 9 2019 45 mins
    Andy Condliffe, Solution Architect
    What’s your standard penetration testing getting you? Compliance and a vague summary report. What could you get with a crowdsourced penetration test from Synack?

    - A crowd of top, trusted researchers
    - Technology that optimizes for testing efficiency, control, and visibility
    - Managed workflow processes
    - Own the IP of all discovered vulnerabilities with none of the liability.

    Stop settling for the ordinary...Try the Next-Gen. See how you can go beyond just compliance by joining our webinar. You will learn:

    - The problems that traditional penetration testing haven’t addressed
    - How Synack’s crowdsourced platform offers a better pen test and better customer experience
    - Specific use cases for a Synack crowdsourced penetration test
  • Penetration Testing or Vulnerability Scanning - Aren’t they the same thing? Recorded: Apr 2 2019 52 mins
    Mike Larmie, Federal Solutions Architect, Synack
    Take a look behind the curtain and decide for yourself. Join government security expert Mike Larmie as he breaks down the key differences. He will share what your agency needs to know to make sure your security program is both identifying vulnerabilities and reducing risk of exploit. He will cover the techniques, tools, and tradecraft of each, as well as common questions such as:

    -Who performs the services?
    -How often do they run in a network environment?
    -What’s covered in their data output and reporting?
    -What’s their value?

    Mike will present how government agencies are reinventing how they conduct security testing to achieve greater efficiency and ROI. Learn how your agency’s security team CAN achieve security without compromise.

    BIO: Mike Larmie, Federal Solutions Architect at Synack has more than 20 years of IT Security Experience, and has been involved with countless missions within the DoD, Intel and Civilian Federal Agencies. He has a wealth of experience having worked at companies such as Tenable, Sourcefire, Rapid7, Infoblox, G2 and others.
  • Day in the Life of an Ethical Hacker: A Discussion w/ Callum Carney, SRT Member Recorded: Apr 2 2019 44 mins
    Callum Carney, Synack Red Team Member, Justin Shaw-Gray, Sales Director, Synack
    The Synack Red Team (SRT) gives the most talented security researchers across the globe a platform to do what they love and get paid for it. A private network of highly-curated and vetted security researchers, the SRT is challenged every day to deliver exploitation discovery and management for some of the biggest brands in the world. On the Synack platform, researchers have access to the industry’s first ever hacker toolkit built at enterprise scale, to make them more efficient and effective at uncovering critical vulnerabilities that matter.

    These ethical hackers are increasingly being recognised as an important way for businesses to unearth security weaknesses before they can be exploited by online criminals.

    In this Webinar, Synack Red Team member, Callum Carney joins Synack’s Justin Shaw Gray for an open conversation on what a day in the life of an ethical hacker is all about. He’ll discuss:

    - How he started his ethical hacker journey
    - Why he chose Synack
    - How it’s changed in the 2 years he’s been working with us
    - What information is critical to successful testing
    - Why you should be using ethical hackers
    - Processes used when a new target comes online.
    - And much much more


    Callum started his ethical hacking journey by supporting organisations such as Google, Spotify and Local UK Businesses to secure their systems. In January 2017, after noticing all of the great comments regarding the Synack platform (fast payouts, fast response times, etc), he applied for the Synack Red Team and was accepted. During his time with Synack he has worked to secure a multitude of systems including government and Fortune 500 enterprise systems. In addition to his work with Synack Callum is studying for an Undergraduate Masters Degree in Computer Science and working as a Software Tester/Developer for the UKs largest supplier of Functional Skills and GCSE assessments.
  • Understanding Crowdsourced Security Models for Government Recorded: Mar 29 2019 35 mins
    Paul Mote, Chief Solutions Architect
    Join Synack on a journey as we provide an overview of different crowdsourced security testing models such as Crowdsourced Penetration Testing, Bug Bounty, and Vulnerability Disclosure Policies. We will cover insights discussed in our recently published white paper, Crowdsourced Security White Paper: Adoption and Market Trends in the U.S. Government, and highlight the key differentiators in crowdsourced security models including vetting, technology, practical applications, and pricing. Come away with an understanding of what model(s) are right for your agency!
  • Trust in Action: A Discussion with Kevin Fielder, CISO, Just Eat Recorded: Mar 26 2019 35 mins
    Kevin Fielder, CISO, Just Eat, Justin Shaw-Gray, Sales Director, Synack
    Consumers are upping the ante for CISOs in 2019! >19% of consumers reported that they would not feel comfortable shopping at a store that has been breached or using an online service and 50% of consumers claim that security was a priority when choosing a bank. From eCommerce to Financial Services: trust is top of mind for consumers, and trust is becoming a core part of the CISO charter.

    Join Synack's Justin Shaw-Gray as he interviews Kevin Fielder, CISO, Just Eat
    They'll discuss:

    - The security challenges CISOs face in eCommerce and how they are integrating crowdsourced security into their day-to-day operations to build trust with the board and with customers.
    - What security’s role is in building a trusted business
    - How to plug security into DevOps
    - And Kevin's perspective on which security programs are actually worthwhile and where innovation is needed. What works? What doesn’t?

    You won’t want to miss this lively discussion
  • Synack as Partner for Your TIBER Framework Recorded: Mar 12 2019 52 mins
    Andy Condliffe, Solution Architect EMEA, Synack
    The European Central Bank created a framework to provide guidance to leaders at financial institutions to help them secure their organizations. TIBER standardizes how to source and conduct an intelligence red team assessment so you can better protect your organization.

    Please join us as Andy Condliffe, Solution Architect at Synack EMEA presents on:
    - How Synack’s AI-powered security testing platform was created to help security leaders demonstrate adherence to regulatory standards and utilize effective vulnerability discovery in order to best protect their digital assets.
    - How Synack’s hacker-powered security platform offers top quality testing results and expert insights on TIBER compliance and remediation routes, packaged in an efficient solution that doesn’t burden your team or usurp your control.
    - And how your journey with Synack will ensure you gain efficient, effective results with zero compromise.
  • Human vs. Artificial - Intelligence in Penetration Testing Recorded: Feb 28 2019 37 mins
    Doug Cody, Solutions Architect
    Security Testing can be done in several different ways, the one that's best for you is the one that aligns with your threat model and traditional concerns. Join Doug Cody, Solutions Architect, Synack as he discusses the roles of scanners, penetration testing, bug bounty, AI and more.

    During this webinar, you'll learn:
    * How Different Vulnerabilities Map to Different Discovery Methods
    * What Scanners Really Do
    * What Penetration Testers Really Do
  • Penetration Testing or Vulnerability Scanning - Aren’t they the same thing? Recorded: Dec 18 2018 53 mins
    Mike Larmie, Federal Solutions Architect, Synack
    Take a look behind the curtain and decide for yourself. Join government security expert Mike Larmie as he breaks down the key differences. He will share what your agency needs to know to make sure your security program is both identifying vulnerabilities and reducing risk of exploit. He will cover the techniques, tools, and tradecraft of each, as well as common questions such as:

    -Who performs the services?
    -How often do they run in a network environment?
    -What’s covered in their data output and reporting?
    -What’s their value?

    Mike will present how government agencies are reinventing how they conduct security testing to achieve greater efficiency and ROI. Learn how your agency’s security team CAN achieve security without compromise.

    BIO: Mike Larmie, Federal Solutions Architect at Synack has more than 20 years of IT Security Experience, and has been involved with countless missions within the DoD, Intel and Civilian Federal Agencies. He has a wealth of experience having worked at companies such as Tenable, Sourcefire, Rapid7, Infoblox, G2 and others.
  • The Complete Guide to Crowdsourced Security Testing Recorded: Dec 13 2018 22 mins
    Rajesh Krishnan, Product Marketing, Synack
    Adoption of bug bounty programs has doubled in the past 3 years, shining a light on crowdsourced security testing options. The bug bounty model, which incentivizes a crowd of creative hackers to probe organizations’ digital assets for exploitable vulnerabilities, has proven quite effective. However, not all crowdsourced testing programs are equal. All programs crowdsource hackers, most incorporate levels of controls for trust and accountability, and some use testing data to help break down testing coverage levels and risk management.

    Join this webinar to learn:
    - Why crowdsourcing hackers and bug bounty is trending
    - Who these crowdsourced hackers are and what they do
    - Where crowdsourced security programs differ
    - How to decide what crowdsourced programs best fit your organization
    - Where the future of crowdsourced security is heading
  • Why your penetration tests in 2018 were a let down and best practices for 2019 Recorded: Dec 5 2018 53 mins
    Quoc Dang, Andy Condliffe, Synack EMEA
    You know that standard penetration tests delivered by the BIG 5 misses the mark when it comes to protecting the new needs of the cyber-secure, agile, data-driven organisation. You probably run them once or thrice a year to tick a compliance box or because your superiors have told you to do so. Why settle for the old way of doing a penetration test performed by a couple of junior testers only to wait weeks for the reports and be disappointed with the results? Join the Synack EMEA team for an upcoming webinar where we will share how crowdsourced security testing is modernizing the pen test for agile, data-driven organisations who need, more than ever, to be secure. We will cover:

    What's wrong with traditional penetration tests
    Why smarter, innovative organizations adopt a continuous, crowdsourced approach to security testing
    How the use of AI, bug bounty and smart technology transforms testing results
    When you can started your own crowdsourced security testing
  • Beyond Bug Bounty in Financial Services Recorded: Nov 7 2018 60 mins
    Karl Schimmeck, Morgan Stanley; Jay Kaplan, Synack; Mikhail Sosonkin, Synack Red Team; Sean Sposito, Javelin Strategies
    Penetration testing is not a new concept – and that’s the problem, especially for financial institutions working to protect their financial assets and customer data in a modern, digital economy.

    Banks, credit card companies, digital currency exchanges, and other financial institutions from the Fortune 500 to early stage companies are turning to crowdsourced security to get beyond penetration testing and achieve both real security and compliance.

    Karl Schimmeck, Executive Director, Global Head of Vulnerability Management at Morgan Stanley, recently took the stage with Jay Kaplan, CEO & Co-Founder of Synack, and Mikhail Sosonkin, Synack Red Team member, at leading payments conference Money20/20 to talk about how the industry is conducting more aggressive security testing in a controlled, efficient, results-oriented way.
  • Security & Democracy: Collaborating on Election Security Recorded: Nov 6 2018 55 mins
    Chris Krebs and tech leaders Synack, Microsoft, and Cloudflare
    Under Secretary for the Department of Homeland Security’s National Protection and Programs Directorate (NPPD) Chris Krebs and tech leaders Synack, Microsoft, and Cloudflare came together in Washington D.C. today through a “Security and Democracy” event convened by TheBridge. This event brought together private companies who are driving election security initiatives with the Department of Homeland Security to discuss the election threat landscape, the progress of public-private collaboration efforts to secure the election process, and the future outlook on local elections and election security.
  • Offensive Security Testing for SAP HANA and Fiori Apps; why you are at risk ... Recorded: Nov 6 2018 59 mins
    Ron Peeters, Synack; Uemit Uezdurmus; SAP; Holger Stumm, CEO of LOG2
    SAP HANA environments have complex architectures with large attack surfaces and many potential breach points. They are often exposed and external facing to a large extent i.e. SAP FIORI Apps. Traditional compliance-based pen tests and vulnerability scanning simply aren’t able to mimic sophisticated cyber attacks in order to find and fix exploitable vulnerabilities. This puts your organization at great risk of being compromised, data breaches and GDPR violations. So what are the options?

    Join this session as we outline the need for a smarter security testing solution that is offensive, mimics attacker behaviour, reduces your attack surface, and lowers vulnerabilities against sophisticated attacks. We will cover:

    How a crowd of elite security testers can be deployed rapidly to uncover serious vulnerabilities in your external facing SAP applications
    How a continuous offensive security approach to your SAP landscape is needed in support of modern agile SDLC / DevOps environments

    Presented by:

    – Uemit Uezdurmus, Global Head of SAP Managed Security Services, SAP

    – Holger Stumm, CEO of LOG2, a Germany based specialist in SAP security testing for 30+ years

    – Ron Peeters, Managing Director EMEA of Synack, a Silicon Valley based leader in Offensive Security Testing.
  • TAG Cyber Interview: The Future of Penetration Testing Recorded: Oct 8 2018 23 mins
    Jay Kaplan, CEO, Synack& Ed Amoroso, Tag Cyber
    Synack Co-Founder and CEO Jay Kaplan talks about the past, present, and future of the company with Ed Amoroso of Tag Cyber.
  • Bringing Hacker-Powered Security Testing to DevOps SDLC Recorded: Sep 27 2018 51 mins
    Andy Condliffe, Solution Architect EMEA, Synack
    DevOps allows organizations to bring web, mobile, and IoT applications to life faster than traditional SDLC models. However, continuous releases and updates introduce new risks by the way of exploitable vulnerabilities that are introduced and left undetected and unresolved/unpatched in the production stream.

    Traditional point-in-time penetration tests can’t keep up with the frequency and short deployment cycles of the modern DevOps organization. Traditional pen tests are usually conducted through checklist-based activities that lack the comprehensiveness to mimic and defend against sophisticated cyber attacks. The result? An increase in serious, exploitable vulnerabilities in live applications and a slew of high-profile breaches..

    Leading enterprise organizations are utilizing a crowdsourced security testing platform that combines continuous vulnerability scanning tools with manual, crowdsourced human security testing. This model of offensive and adversarial-based testing delivers realistic attack traffic on customers’ applications, resulting in effective vulnerability discovery and management and “smart” security intelligence without compromising security and control. Scalable and controlled crowdsourced testing at a continuous cadence is the answer for secure DevOps SDLC.

    Join this session by Andy Condliffe of Synack EMEA as he shares how Synack can help lower the risks of dynamic deployments with a continuous, human, offensive security testing model that’s better suited for the modern DevOps organization
  • The Complete Guide to Responsible Disclosure Programs Recorded: Sep 25 2018 28 mins
    Rajesh Krishnan, Product Marketing, Synack.
    To beat criminal hackers, it helps to have ethical ones on your side. Responsible Disclosure Programs - where companies invite suspected security vulnerability reports from the public - have been on the rise in the past few years. Should your company consider Responsible Disclosure? Learn more about the ins and outs of these types of programs and how they can differ in the level of liability and management incurred. Technical. Social, Legal, and other indicators will all be raised.
  • Penetration Testing or Vulnerability Scanning - Aren’t they the same thing? Recorded: Jul 24 2018 53 mins
    Mike Larmie, Federal Solutions Architect, Synack
    Take a look behind the curtain and decide for yourself. Join government security expert Mike Larmie as he breaks down the key differences. He will share what your agency needs to know to make sure your security program is both identifying vulnerabilities and reducing risk of exploit. He will cover the techniques, tools, and tradecraft of each, as well as common questions such as:

    -Who performs the services?
    -How often do they run in a network environment?
    -What’s covered in their data output and reporting?
    -What’s their value?

    Mike will present how government agencies are reinventing how they conduct security testing to achieve greater efficiency and ROI. Learn how your agency’s security team CAN achieve security without compromise.

    BIO: Mike Larmie, Federal Solutions Architect at Synack has more than 20 years of IT Security Experience, and has been involved with countless missions within the DoD, Intel and Civilian Federal Agencies. He has a wealth of experience having worked at companies such as Tenable, Sourcefire, Rapid7, Infoblox, G2 and others.
Synack
Synack is a security company revolutionizing how enterprises view cybersecurity: through a hacker’s eyes. Synack’s private, managed hacker-powered security solution arms clients with hundreds of the world's most skilled, highly vetted ethical hackers who provide a truly adversarial perspective to clients’ IT environments.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Evolution of cyberattacks and how to lower your vulnerabilities against them
  • Live at: Jun 7 2018 9:00 am
  • Presented by: Andy Condliffe, Solution Architect EMEA, Synack
  • From:
Your email has been sent.
or close