Hi [[ session.user.profile.firstName ]]

Cybercrime Ins and Outs: Peeling Back the Onion

What motivated recent cyber attacks? How did the malware work? Who fell victim to it and why? By examining modern cyber criminals and their weapons of choice, you can develop solid strategies to combat them. Join Ivanti expert Chris Goettl, Director of Product Management for Security, as he talks WannaCry, NotPetya, SamSam, and more, and looks at what these attacks mean for you.

- What methods, tools, and entry points were used?
- What does this tell us about your organization’s soft underbelly?
- How should this impact your multi-layered security strategy?
- How can you quickly protect yourself from most attacks today?
Recorded Sep 19 2018 47 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Chris Goettl, Director of Product Management, Security
Presentation preview: Cybercrime Ins and Outs: Peeling Back the Onion

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Cybercrime Ins and Outs: Peeling Back the Onion Recorded: Sep 19 2018 47 mins
    Chris Goettl, Director of Product Management, Security
    What motivated recent cyber attacks? How did the malware work? Who fell victim to it and why? By examining modern cyber criminals and their weapons of choice, you can develop solid strategies to combat them. Join Ivanti expert Chris Goettl, Director of Product Management for Security, as he talks WannaCry, NotPetya, SamSam, and more, and looks at what these attacks mean for you.

    - What methods, tools, and entry points were used?
    - What does this tell us about your organization’s soft underbelly?
    - How should this impact your multi-layered security strategy?
    - How can you quickly protect yourself from most attacks today?
  • September Patch Tuesday Analysis Recorded: Sep 13 2018 85 mins
    Chris Goettl, Todd Schell
    Join us this month as we recap the Microsoft and 3rd Party security patches released on Patch Tuesday. We will discuss things to watch out for, products to be sure to test adequately, and which patches should be highest priority to roll out.
  • The Exciting and Surprising Future of IT Recorded: Aug 1 2018 54 mins
    Kevin J Smith
    The role of IT as a leader in the business is very different than how IT has been seen in the past. The business needs the leadership of IT more than ever. As IT professionals, we will be part of a remarkable transformation of IT over the next decade. This will change virtually all of what we do. Join Kevin as he dives into the factors that are driving these changes and how you can rise and extend your career in the midst of the changes.

    In this webinar, we will explore:
    - What changes to expect
    - What we can do now to be ready
    - How IT will undergo these changes while at the same tie remaining true to the fundamentals of IT
  • Two Case Studies: How Fit is your ITSM? Recorded: Jun 28 2018 59 mins
    David Martinez, Scott Roberts, Kim Mau, Jim Czyzewski
    The healthcare landscape is always changing and is on the leading edge of new technologies. Keeping healthcare information systems running at optimal levels and providing excellent support is critical to providing high quality patient care. In this webinar, we are joined by three healthcare IT leaders to discuss their top service management challenges. They will share what challenges they are facing and some of the strategies and approaches they are developing to solve their top issues.
    Join Ivanti customers Scott Roberts, IS Help Desk Manager at Community Medical Centers, and Kim Mau, IT Manager, and Jim Czyzewski, Desktop Support Supervisor at MidMichigan Health, for this customer webinar.
  • June Patch Tuesday 2018 Recorded: Jun 28 2018 71 mins
    Chris Goettl, Todd Schell, Brian Secrist
    “April showers bring May flowers”—but did you know May flowers bring June bugs? A less known line from that poem for sure, but quite apt for a Patch Tuesday synopsis where software updates are the name of the game. This June there’s more grist for the mill, though there are fewer patches than we’ve seen of late. Take note of the fix for a new zero day targeting a Flash bug. And use this relative downtime to make sure your patch processes are in good working order. Remember: Meltdown and Spectre are back with all new bugs to banish from your IT environment.
  • The Unification of IT: What is it and Why is it Important? Recorded: Jun 27 2018 56 mins
    Kevin J Smith
    The transformation of IT is upon us and will cause us to rethink virtually everything we do in IT every day. A primary part of this transformation is the unification of all things IT. So what does unifying IT mean, anyway? Join Kevin as he discusses how unifying IT will help your department save time, money, and resources and will give you time to become a more strategic player in the business.
    In this webinar, we'll break down
    -What exactly unification of IT entails
    -What factors are driving this unification
    -How this realignment of IT will enable us to operate IT in fundamentally new ways
    -How IT can better serve and ultimately drive the business
  • Transforming your Security Products at the Endpoint Recorded: Jun 26 2018 56 mins
    Phil Richards, Mark Stevens, Nik Patronus
    Are you thinking about extending the endpoint capabilities of your Security Solution? Join us for a deep dive into the value of embedding patch management capabilities into your security software. Learn how other security companies have chosen to add patching and remediation. Why in 2018 patching is more important than ever as your customers confront ransomware, zero day attacks, and more.
    You'll learn: h
    -How patch management is being used to enhance the value of security solutions
    -How large security software companies have utilized embedded patch management in their own products to grow revenue
    -What to consider when you're looking to add patch remediation to your solution
  • Five Insights for Windows 10 in the Enterprise Recorded: Jun 20 2018 58 mins
    Adam Smith, Rex McMillan
    New bi-monthly webinar series offering updates from Windows experts from Ivanti, professional service providers, and your peers from companies like yours. This webinar will feature short, helpful sections including:
    -An insider preview
    -Outside insights
    -Migration magic
    -Best practices
    -A comprehensive Q&A session
  • Patch Management Best Practices Recorded: May 30 2018 82 mins
    Chris Goettl, Todd Schell
    Patch management is critical to reducing your attack surface and keeping your endpoints and business running smoothly. Unfortunately, it's also a process that must be repeated weekly, monthly, quarterly, and whenever critical fixes have been identified for your environment. The good news is: with the right tools and some advance planning, this process can run smoothly and leave your IT team with more time to support core business goals.
    Join us to learn about trends in patch management, including the latest ways Ivanti is helping Security and IT teams work together like a well-oiled machine.
  • Windows 10 Migration Tips, Tricks, and Strategies Recorded: May 23 2018 53 mins
    Chris Burbank, Randy Barger
    Windows 10 presents IT with a vast array of new challenges, and delivering a seamless migration is daunting. Additionally, Microsoft’s new release cadence, with frequent large updates, will force IT into a constant state of migration and endless rounds of critical decisions, overtaxing IT resources and IT teams’ ability to keep up. In this webinar, Ivanti consultants will share their best practices (and tricks) to reduce Windows 10 complexity, ease migration challenges, and migrate users with minimal interruption.
    You’ll also learn
    -How to ensure a transparent user migration to Windows 10 with no loss of local user file or profile data
    -How to manage and roam between hybrid Windows 7, 8, and 10 physical/virtual environments
    -How to centrally manage and track migration progress
  • Turbocharge Your ITSM: See What You Can Do With the Right Metrics and Analytics Recorded: May 17 2018 63 mins
    Jeremy Carter - Manager, Product Management and Alan Taylor - Principal Product Manager
    Know the saying “if you can’t measure it, you can’t manage it”? While it may not hold all the time, having the right data and metrics does make it easier to fuel a world-class ITSM practice. But not all metrics are created equal, nor does more data always lead to better results. What metrics makes sense often depends on where you are in your ITSM journey.

    Join us to learn how to improve your IT service management operations with the right metrics and strategy. In this session, we’ll dive into best practices from customer engagements, to provide you with insights such as:

    •The importance of the right metrics for specific ITSM processes
    •How to improve service levels with great data and analytics
    •Best practices for building insightful analytics and dashboards
    •Why you need to communicate great results to the rest of the business
  • Learning from Atlanta: 5 Steps to Securing Government IT Recorded: May 10 2018 50 mins
    Chris Goettl, John Rush
    The City of Atlanta was rocked by cybercriminals that locked up critical systems and applications earlier this year. With paralyzing security threats now aimed at state and local agencies, the public sector is scrambling to find ways to secure their environments before the end of the fiscal year.
    Join Ivanti's Chris Goettl, Director of Product Management for Security, and John Rush, Senior Systems Engineer, as they talk taking security to a new level in your agency in just five steps.
  • May 2018 Patch Tuesday Analysis Recorded: May 9 2018 69 mins
    Chris Goettl, Todd Schell
    They say May brings flowers, but we're getting more Patch Tuesday showers this month. Get ready to defend against a heavy downpour of CVEs, including zero-days and other critical vulnerabilities. Rain is also in the forecast in the guise of public disclosures, so patch the holes in those systems before the deluge can begin. And finally? Some of this inclement weather is designed to grant the necessary access rights - so, remember, even with privilege management in place, you need to properly layer on security to keep the storms at bay.
  • Panel Discussion: Seven Pillars of a Modern Hardware Asset Management Practice Recorded: Apr 25 2018 61 mins
    Martin Thompson, Todd Hogan, Mareike Fondufe, Philip Merson
    In this educational webinar, Martin Thompson, founder and analyst at The ITAM Review, and Ivanti Product Managers Todd Hogan and Darren Wilensky will explore seven major areas of consideration for building a solid Hardware Asset Management Practice.
    In the webinar, Martin will unveil the Hardware Asset Management survey results fresh from the press and discuss these with the panel. The panel discussion will cover:
    1. Hardware asset management accuracy and the knock-on business benefits.
    2. Setting scope and justifying the investment of a hardware asset management practice.
    3. Managing the relationship betwen users and myriad device types - corporate and BYOD.
    4. Delivering performance metrics that demonstrate business value.
    5. Major process areas to consider.
  • April 2018 Patch Tuesday Analysis Recorded: Apr 11 2018 72 mins
    Chris Goettl, Todd Schell
    "April showers" the poem begins, and while it's not an all-out storm, April Patch Tuesday provides more than a sprinkling of updates, including critical patches. Take note as well of the out-of-band patch that protects you from an Elevation of Privilege vulnerability as well as the Java update. Java remains a common target for threat actors. In the midst of these clouds, though, here's a silver lining: Microsoft lifted the AV compatibility check prior to delivery of Windows security updates. It's full speed ahead on patching!
  • You've Been Breached - Don't Panic! Let's Talk What NOT To Do Recorded: Mar 22 2018 56 mins
    Phil Richards - CSO, Chris Goettl - Director of Product Management, Amber Boehm - Manager of Product Marketing
    In the wake of well-publicized breaches like those at Equifax and Uber, everyone from the EU Parliament to the U.S. Securities and Exchange Commission is taking a hard look at cybersecurity—and rethinking how and how quickly the word goes out that a breach occurred. Join Ivanti security experts as they:

    - Perform their own incident postmortem on headline-making breaches and disclosures
    - Provide guidance on getting incident response and breach management right
    - Discuss security tools that will minimize the chances a breach happens at all

    The best case scenario is it never happens to you. But since that’s also not very likely, learn the right way to respond when everything else goes wrong.
  • Cybersecurity Game Show Recorded: Mar 21 2018 37 mins
    Chris Goettl, Duane Newman, Cache Walker, Amber Boehm
    Tune into Ivanti’s first cybersecurity-themed game show! Join our three contestants as they compete to answer security trivia questions, ranging from cybersecurity in pop culture to ransomware ridiculousness. All live attendees will have the chance to participate in answering some questions and earn huge prizes.
    This webinar will be so fun, you might even feel guilty for watching it during work. No sales pitch and no death-by-slide-deck—just a bunch of IT experts dueling it out for cybersecurity supremacy.
  • GDPR: Headache or Opportunity? Recorded: Feb 20 2018 54 mins
    Phil Richards, CSO and Simon Townsend, EMEA Field, CTO
    Join Phil Richards and Simon Townsend to get both an EMEA and Americas perspective on how technology solutions such as Discovery, Patching, Application Control, Privilege Management and Service Management can help you minimize the headaches around GDPR.

    Attendees will learn:
    • How to navigate GDPR without a silver bullet
    • The importance of identifying PII data, protecting users, and securing endpoints
    • How to integrate, unify, orchestrate, and automate with service management
    • Ways to implement solutions that reduce the pain associated with GDPR

    It can be hard to see GDPR as anything more than a massive on-going headache. However, while GDPR requires companies to adjust how they handle data in many ways, it also helps organizations ensure overall compliance, protect against cybersecurity threats, manage their IT assets, and more. Register today and discover solutions to help you prepare for GDPR and accelerate your organization with fewer headaches.
  • Patch Tuesday: Critical Vulnerabilities & Fixes Recorded: Feb 14 2018 51 mins
    Chris Goettl, Director of Product Management, Security & Todd Schell, Product Manager
    Nail down your patch strategy and always be prepared for the latest exploits with Patch Tuesday coverage from Ivanti. Join IT security professionals Chris Goettl and Todd Schell in this live, zero-pitch webinar as they go in-depth on each bulletin, share strategies on how to best protect your environment, and answer all your IT security questions. Ivanti’s Patch Tuesday coverage is recognized by leading IT security journalists and is regularly featured by industry analysts.

    • Most recent news on Spectre and Meltdown
    • The latest issues to watch out for on Windows 10, Microsoft Office, Adobe, etc.
    • What products are affected and their severity levels
    • Which patches are highest priority to roll out
The Power of Unified IT
When Landesk and Heat Software combined in January of 2017, we knew we needed a new company name. For nearly 30 years, Landesk and Heat offered user-centered IT solutions designed to increase user productivity while reducing IT security risk. Landesk was the only vendor recognized by Gartner in the four areas of client management, endpoint protection, IT service and support, and enterprise mobility management.
Over the years, both companies changed. Landesk acquired companies like Wavelink, Shavlik, Xtraction Solutions, and, most recently, Appsense. Heat was created by combining FrontRange and Lumension. That's a lot of brand names. And in order to gather all these brands under one roof, we needed a new identity - and Ivanti was born. And since then, Concorde and RES have joined the Ivanti family.
Our mission is clear - to help customers succeed in their respective markets through the "Power of Unified IT"

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Cybercrime Ins and Outs: Peeling Back the Onion
  • Live at: Sep 19 2018 8:00 pm
  • Presented by: Chris Goettl, Director of Product Management, Security
  • From:
Your email has been sent.
or close