Hi [[ session.user.profile.firstName ]]

Are You Too Negative When It Comes to Your Endpoint Security Strategy?

Like most organizations, you’ve probably deployed endpoint security. Still, you can’t seem to stop all existing and new threats, particularly fileless malware. You’re being infected, getting ransomware and/or having unwanted downtime.

This presentation will include a dynamic discussion between Lenny Liebmann, founding partner at Morgan Armstrong and Nir Gaist, founder and CTO at Nyotron on why the Negative Security model that tries to track down everything “bad” will eventually miss some elusive new threat.

Although a multi-layered security strategy that includes a Positive Security model provides better and more continuous protection for endpoints, this model has historically been difficult since it involves complex and time consuming whitelist maintenance. Lenny and Nir will describe a new OS-Centric Positive Security model that is a game changing innovation for simpler and more effective endpoint security.
Recorded Jan 16 2018 46 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Lenny Liebmann, Founding partner at Morgan Armstrong, Nir Gaist, Founder and CTO at Nyotron
Presentation preview: Are You Too Negative When It Comes to Your Endpoint Security Strategy?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Will Windows 10’s Controlled Folder Access Protect Your Data from Ransomware? May 22 2018 4:00 pm UTC 60 mins
    Nyotron’s Vera Drobov, Security Researcher, & Rene Kolga, Sr. Director, Product Management
    With the release of Windows 10 Fall Creators Update, Microsoft added a new feature called Controlled Folder Access (CFA) to Windows Defender Exploit Guard. This features allows users and organizations to control which processes can access certain folders in an attempt to help protect data from malicious programs, such as ransomware or wipers.

    But, will CFA really keep your data safe? Vera Drobov of Nyotron’s Security Research Team and Rene Kolga, Senior Director of Product Management at Nyotron will discuss why this isn’t likely due to vulnerabilities in the CFA feature. Our team has discovered at least five different ways of exploiting and bypassing CFA, including:

    - APC Injection
    - Windows Management Instrumentation (WMI)
    - Office Macros

    During this interactive webinar, you will see multiple exploits in action.
  • Endpoint Security: The Right Balance Between Positive and Negative Approaches Apr 26 2018 7:00 pm UTC 60 mins
    Forrester Senior Analyst Chris Sherman and Nyotron's Senior Director of Product Management Rene Kolga
    Endpoint security represents the frontline in your fight against cybercriminals. Despite the relative maturity of the endpoint security market, new threats and evolving attacker capabilities have proven traditional approaches inadequate - and left organizations exposed.

    Guest speaker Forrester Senior Analyst Chris Sherman and Nyotron's Senior Director of Product Management Rene Kolga will discuss the current state of endpoint security while highlighting a path forward for organizations looking to re-focus their strategies to combat current threats.

    Attendees will learn:

    • Which threats are causing the most difficulties for traditional
    endpoint security approaches
    • Why organizations need to balance positive and negative security
    approaches
    •How to layer multiple tools for maximum protection
  • Iranian-Backed OilRig Group Returns with Next-Generation Malware Recorded: Mar 29 2018 43 mins
    Rene Kolga, Senior Director of Product Management at Nyotron and Robert Zamani, Director of Solutions Architect at Nyotron
    Nyotron’s research team began tracking new active OilRig attacks on a number of organizations across the Middle East in November 2017. Our security team has discovered that the Iran-linked OilRig group has significantly evolved its tactics, techniques and procedures (TTPs), introduced next-generation malware tools and new data exfiltration methods since previous attacks.

    Among key advancements, the new variant of OilRig introduces a variety of new command and control (C&C) and data exfiltration capabilities using Google Drive, SmartFile, a file sharing and transfer solution, and an ISAPI filter to extend the functionality of Microsoft Internet Information Services (IIS) servers.

    During this webinar, Nyotron will provide technical details of the attacks along with the TTPs used and the timelines to help security professionals deal with this threat actor in the future.
  • Why Machine Learning is More Likely to Cure Cancer Than to Stop Malware Recorded: Feb 27 2018 54 mins
    Shahid N. Shah, Cybersecurity and risk management expert, and Rene Kolga, Senior Director of Product Management at Nyotron
    Machine Learning (ML) has become the shiny new object for security and is the foundational pillar of products such as Next-Generation Antivirus (NGAV) and User and Entity Behavior Analytics (UEBA). While most of these products have promised to be a “silver bullet” against malware, complete protection remains elusive. In fact, ML is more likely to detect and cure cancer than to stop all of today’s advanced threats for a number of reasons:

    • The past doesn’t predict the future
    • Nothing will keep the bad guys out
    • The harder you try the more you fail
    • You can’t always be connected
    • It’s a black box

    Shahid N. Shah, an internationally recognized cybersecurity and risk management expert, and Rene Kolga, Senior Director of Product Management at Nyotron, will explain these shortcomings and how to avoid them. Instead of chasing after an infinite number of malware variants and attack vectors, a different approach to malware detection is to focus on the finite intentions behind attacks, such as data exfiltration, corruption and deletion.
  • Are You Too Negative When It Comes to Your Endpoint Security Strategy? Recorded: Jan 16 2018 46 mins
    Lenny Liebmann, Founding partner at Morgan Armstrong, Nir Gaist, Founder and CTO at Nyotron
    Like most organizations, you’ve probably deployed endpoint security. Still, you can’t seem to stop all existing and new threats, particularly fileless malware. You’re being infected, getting ransomware and/or having unwanted downtime.

    This presentation will include a dynamic discussion between Lenny Liebmann, founding partner at Morgan Armstrong and Nir Gaist, founder and CTO at Nyotron on why the Negative Security model that tries to track down everything “bad” will eventually miss some elusive new threat.

    Although a multi-layered security strategy that includes a Positive Security model provides better and more continuous protection for endpoints, this model has historically been difficult since it involves complex and time consuming whitelist maintenance. Lenny and Nir will describe a new OS-Centric Positive Security model that is a game changing innovation for simpler and more effective endpoint security.
The Industry's First OS-Centric Positive Security Solution
Nyotron offers the last line of defense to help win the war on malware. Based on the industry’s first OS-Centric Positive Security model that only allows legitimate operating system behavior, Nyotron prevents data exfiltration, corruption and other damage. Nyotron seamlessly complements existing endpoint security products with a future-proof solution, providing protection from any attack vector without foreknowledge of an exploit. The company’s headquarters is in Santa Clara, California, and R&D is in Israel. To learn more, visit www.nyotron.com.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Are You Too Negative When It Comes to Your Endpoint Security Strategy?
  • Live at: Jan 16 2018 8:00 pm
  • Presented by: Lenny Liebmann, Founding partner at Morgan Armstrong, Nir Gaist, Founder and CTO at Nyotron
  • From:
Your email has been sent.
or close