Hi [[ session.user.profile.firstName ]]

The Malware Battleground in 2017

2016 has been yet another record breaking year in many aspects of the cyber security and malware world. We will look at some of the trends and vectors that have materialized or strengthened in 2016 and will carry into 2017.

Join Shimon N. Oren, Deep Instinct’s Head of Cyber-Intelligence, to learn about the evolution of malware and cyber threats in the previous year. From ransomware, through cross platform campaigns, to file-less attacks we will review and give examples of the newest concepts and campaigns that will shape this year’s play ground between hackers and the cyber-industry.

About the Presenter:
Shimon Noam Oren is the head of Cyber-Intelligence at Deep Instinct. Prior to joining Deep Instinct Shimon served for 14 years as an officer in the Israel Defense Force's elite cyber unit. With a background that includes a wide range of cyber security and intelligence positions, Shimon successfully led multifunctional teams of engineers, analysts, hackers and security professionals in various settings and operations. Some of his other accomplishments during his tenure in the military include developing new methods and tools for researching and analyzing cyber-attacks and leading a product management team in charge of a series of innovative cyber collection products. Shimon has worked extensively with a variety of industry, defense and intelligence partners and agencies in North America and Europe, and was awarded the President of Israel Award for outstanding service.
Recorded Feb 22 2017 56 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Shimon Oren, Head of Cyber-Intelligence at Deep Instinct
Presentation preview: The Malware Battleground in 2017

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • How to Optimize Your Cybersecurity Stack Recorded: Oct 27 2020 49 mins
    Steve Salinas, Head of Product Marketing at Deep Instinct
    Smartphones and smart TVs connected to the network, mobile laptops connecting via remote IPs, sensitive information accessible from anywhere, cloud storage systems holding cross-company data, the organization is a veritable minefield of security disasters. How is your organization approaching your enterprise’s security operations?
    In this webinar, our experts will offer their advice and recommendations on how to build an optimal cybersecurity stack that works across all devices, tools, and locations from which your end-users may be working. The session will also provide practical advice on how to develop a consistent security strategy that works for all of your end-users, no matter their role or the applications they use.

    Join us in this webinar to gain:
    • Understanding of the challenges typically experienced when trying to develop an “air-tight” cybersecurity stack
    • Strategies for protecting those devices that cannot be secured with traditional endpoint protection tools
    • Learn what security measures are most effective against ransomware and file-less threats
    • Get tips for patching, monitoring, and managing the devices of remote workers'
  • Live Demo: How to Protect Against Script based Attacks Recorded: Oct 13 2020 27 mins
    Steve Salinas and Matthew Fulmer
    Cyber attackers are constantly look for new ways to wreak their havoc and one of the methods they employ is script-based attacks. Most endpoint security products handle file-based attacks well, scripts have therefore emerged as an excellent way for attackers to avoid making changes to a disk, as they easily bypass the threat detection capabilities of most products.

    Join us in this webinar, where we explore how script-based or fileless malware operates; how scripts provide initial access, enable evasion, and facilitate lateral movements post-infection. We’ll also address what can be done to prevent them, enabling analysts to recognize and identify attack methods.
    Join us in this webinar to gain:
    •Critical information on how script-based attacks work their malicious logic; how it operates and spreads infection
    •Knowledge from the experts on how script-based attack techniques are modifying to penetrate and stay undetected by security operations
    •Information on how security teams can identify attack methods
    •Get some tips on how to make your organization more resilient to script based attacks
  • Live Demo: How to Prevent the New Wave of Emotet Recorded: Sep 8 2020 28 mins
    Steve Salinas & Ron Ben-Yizhak of Deep Instinct
    The finding of Emotet on your corporate network can mark the beginning of the end, the death knell of your organization’s security, heck, the end of your organization! In no small way, the creators of Emotet have been able to leave their notorious trail of destruction, through their advanced evasion techniques as they continuously work on finding new ways of being persistent and going undetected.

    Join us in this webinar, where we explore the research conducted by Deep Instinct on the new wave of Emotet and the evasion techniques that it employs. Our research has shown the advanced use of obfuscation to hide the malicious API calls and the use of benign code to manipulate the algorithm of that sophisticated and expensive AI-based security tool that you may have in place.

    Join us in this webinar to gain:
    • Critical information on how Emotet works its malicious logic; how it operates and spreads infection
    • Knowledge from the experts on how Emotet techniques are modifying to penetrate and stay undetected by many organizational security operations
    • Information on how security teams can find the encrypted payload
    • Get some tips on how to make your organization more resilient to an Emotet attack
  • Live Demo: How Deep Instinct Supports MSSPs Recorded: Aug 25 2020 42 mins
    Steve Salinas of Deep Instinct
    With increasing frequency, the mid-market of small and medium size businesses is approaching MSSPs to provide the cybersecurity coverage that they would never be able to resource internally. While MSSPs are largely well equipped, with a pooled selection of human capital and tools to do the job well, it is still challenging to manage the numerous companies and organizations that are usually involved in the multi-tenant environment.

    Join us in this webinar where we address the increased need for MSSPs to provide advanced endpoint security services, the challenges commonly faced by MSSPs and what additional supports and features MSSPs should expect to gain from their security vendor to enable multi-tenancy management.

    After this webinar you will:
    • Deepen your knowledge of what you can ask for and expect in an EPP security product geared to meet the needs of MSSPs
    • Learn about the many added benefits that can be gained from deploying Deep Instinct’s Multi-Tenancy Security Solution
    • See a demo of Deep Instinct’s Multi-Tenancy console in action.
  • Stories From The SOC: Snake And Maze Ransomware Recorded: Aug 18 2020 37 mins
    Steve Salinas & Guy Propper of Deep Instinct
    For the many cyberattacks that have been splashed across news stories recently, there is a good chance that a bunch of them were caused by a Snake or Maze attack. Snake gained its fame for attacking the Japanese car manufacturer, Honda in June. While later that same month Maze made headlines for reportedly hitting LG Electronics, after already attacking Xerox, and Cognizant. The hackers claim to have successfully stolen proprietary information.

    Join our live webinar as we talk about the rising sophistication and success of ransomware. We’ll be addressing the recent techniques that hackers are using in their creation and deployment of their attacks, how victims have responded, do they concede to demands? And what organizations can do to keep their data out of harm’s way.

    During this webinar you will:
    • Learn about these two malware families; how they operate and spread infection
    • Hear from the experts on how ransomware techniques are modifying to add more leverage to their demands
    • Get some tips on how to make your organization more resilient to ransomware attacks
    • Find out how Deep Instinct applies its multi-layered defense to predict and prevent attacks.
  • Live Demo - Deep Instinct vs Next-Gen AVs Recorded: Aug 4 2020 43 mins
    Steve Salinas of Deep Instinct
    Are you out shopping for a Next-Gen AV?

    If ‘yes’, then pull up a seat this webinar is for you!

    During the live demo we will be comparing the features and capabilities offered by commonly used Next-Gen AVs against Deep Instinct’s prevention approach to security.

    Join us as we get ‘under the hood’ on the technical bits and bytes demonstrating Deep Instinct’s points of differentiation and added value. Some of the differences that we will address include the respective anti-malware engines that are used, desktop firewalls, the regularity of scheduled scans, and available integrations among other aspects.

    After this webinar you will:
    • Be able to navigate the EPP buyer’s market with greater proficiency.
    • Understand how Deep Instinct’s technology is different from most other Next-Gen AV offerings
    • Learn about the many added benefits that can be gained from deploying Deep Instinct
    • See a demo of Deep Instinct in action.
  • Symantec vs Deep Instinct: What you Need to Know Recorded: Jul 22 2020 46 mins
    Steve Salinas of Deep Instinct
    Change stinks, but it does not need to be painful.

    If you are a Symantec customer and in the market for a new EPP, then this webinar is for you! We will be comparing the features and capabilities offered by Symantec’s Endpoint Security offering for Enterprise against Deep Instinct’s multi-layered approach to security.

    Join us as we get ‘under the hood’ on the technical bits and bytes of the two different vendors; the technology used by their respective detection engines, which file types they support, remediation services provided, management and deployment offerings and a whole lot more.

    After this webinar you will:

    • Understand how Deep Instinct’s technology is different from Symantec and most other AV offerings
    • Learn about the many added benefits that can be gained from deploying Deep Instinct
    • See a demo of Deep Instinct in action. The simplicity is nothing short of astounding
  • On the Go: Achieving Consistent Security Whether Working from Home or the Office Recorded: Jun 30 2020 46 mins
    Steve Salinas of Deep Instinct and Chris Sherman of Forrester Research
    Join us and guest speaker Chris Sherman from Forrester Research in this webinar as we address the security implication of moving between more risky to less risky networks.

    After an extended Work From Home period, many organizations are now planning their employees’ return to the office. But they are also planning a future with hybrid model of enabling employees to both work from remote locations and work from the office. However, with the potential to dramatically broaden attack surfaces, it’s important to make sure that employees do not inadvertently pollute the organizational network with unsafe endpoints, VPN or Internet connections. So how do you make sure the transition between home and office is smooth and safe? The answer lies in getting to zero, by applying a zero-time approach to all threats and a zero-trust approach to all users.

    During this webinar you will:

    •Find out about secure resources you can offer employees regardless of where they are located
    •Learn about stepping up security controls in light of zero trust and zero-time best practices
    •Learn how to adapt to managing different risk levels
    •Find out how to use deep learning to bolster your zero time / zero trust defences
    •Live Q&A with Deep Instinct’s Security experts
  • Under the Hood: Live Demo on Preventing Fileless Attacks Recorded: Jun 24 2020 31 mins
    Brian Black & Stephen Salinas
    Fileless attacks are some of the most misunderstood attack vectors in the cyberthreat landscape. With so many different criteria of what actually makes an attack vector fileless, it’s no wonder that security teams struggle to identify and detect fileless attacks in order to determine the best way to protect their environment. In this live demo we will discuss the various ways attackers carry out fileless attacks and show you how Deep Instinct is designed to neutralize all of them.

    After this webinar you will:

    •Understand how fileless attacks work
    •See how Deep Instinct prevents fileless attacks
    •Get best practices you can implement to limit your attack surface
  • The Cybersecurity Trade-Off Recorded: Jun 10 2020 45 mins
    Shimon Noam Oren, VP Research & Deep-Learning at Deep Instinct & Steve Salinas, Head of Product Marketing at Deep Instinct
    It is an accepted fact that increasing prevention controls results in a higher rate of false positives. If the goal is to prevent as many threats as possible, with most solutions in the market today it makes sense that as thresholds tighten, some wrong categorization can occur. Given this fact, many security teams continuously work to balance their prevention settings with their capacity to investigate false positives; we call this the Prevention Trade-off Dilemma.

    However, there is an emerging technology that eliminates this trade-off dilemma - Deep learning-based prevention. Deep learning prevention by its very nature ensures security teams do not have to make these problematic trade-off decisions required by other security products, as it analyzes all available data to make its malicious/benign decisions.

    By attending this webinar, you will:
    •See why the cyber trade-off decision is unavoidable with legacy and most next-gen prevention tools
    •Gain a servicable understanding of the differences between machine-learning and deep-learning prevention
    •Real world example of how this trade-off was significantly minimized with a deep learning-based solution
    •Live Q&A with Deep Instinct’s Security experts
  • See Live Demo of Deep Instinct Tackling Ransomware Head-On Recorded: May 27 2020 32 mins
    Brian Black & Stephen Salinas
    Ransomware is by far one of the most pervasive attacks faced by organizations big and small. If successful, a ransomware attack leaves the organization in shambles, struggling to recover days, weeks, even months after the attack.
    Deep Instinct, the pioneer in applying deep learning to cybersecurity, delivers a multi-layer approach to ransomware prevention, helping organizations avoid the pain caused by ransomware.
    In this webinar you will learn how with Deep Instinct your ransomware concerns can be a thing of the past.

    After this webinar you will know:
    1. How ransomware works
    2. Why ransomware can be so damaging
    3. How Deep Instinct prevents ransomware from damaging your organization
  • Best Practices to Manage an Effective Security Strategy in the Education Sector Recorded: May 20 2020 42 mins
    Steve Salinas & Matthew Fredrickson
    Teachers, students, admin, parents, the education sector has possibly the most diverse user base, each requiring its own user privileges, access requirements and with their own behavioral trends. Yet besides this, there are a number of unique challenges to securing an educational environment, be they ensuring broad attack surface protection, great flexibility with minimal false positives and all while maintaining a relatively flat and cost-effective security posture.

    Whether running a security team for a school district, college, or university, every solution added to the security stack must be fit for purpose and deliver on expectations.
    So, where to begin?

    Deep Instinct invites you to join us for an informative discussion with Matthew Frederickson, Director of Information Technology for Council Rock School District in Newton, PA, to hear about how he took a fresh approach to build out his security framework. Matthew will share best practices from the field in evaluating security technology as well as adopting a new approach to security.

    After this webinar, you will:

    •Understand common challenges experienced by IT security staff of securing an educational environment
    •Understand where AI technology is being used within educational environments to optimize security
    •Get a real-world example of Council Rock’s transformation from reactive to proactive security
    •Key tips for implementing a proactive security approach that will improve overall process
    •Live Q&A with Deep Instinct’s Security experts

    We will have plenty of time for questions so come ready to get your questions answered by the experts.
  • What is the Economic Value of Prevention in Cybersecurity? Recorded: Apr 30 2020 43 mins
    Dr. Larry Ponemon, Chairman and Founder of the Ponemon Institute & Steve Salinas, Head of Product Marketing at Deep Instinct
    In this webinar we address the results and implications of the groundbreaking research The Economic Value of Prevention in the Cybersecurity Lifecycle. Conducted by the Ponemon Institute and sponsored by Deep Instinct, the report analyzes the cost savings that can be taken in an efficient, zero-time prevention model. Results were sourced from over 600 IT and IT security practitioners who are knowledgeable about their organizations’ cybersecurity technologies and processes.
    Attend and you’ll gain:
    •An understanding of which areas of the cybersecurity lifecycle, that when effectively managed, can have the most direct impact on reducing costs
    •Learn which domains of cybersecurity are currently receiving the greatest focus and budget allocations
    •Get strategic insight on how companies can optimize their security budgets to achieve an optimal defense against even the most advanced attacks.
  • Cyber Attack Evasion Techniques Recorded: Mar 23 2020 51 mins
    Guy Propper, Eric Bruno
    When it comes to evasion techniques there’s a perpetual cat and mouse game between malware developers and solutions providers. By drawing on the latest in evasion techniques, malware developers not only go undetected on the compromised machine but more importantly, they hide their malicious indicators and behaviors from detection tools and automated threat analysis systems.

    From this session you will:

    > Learn how to identify the different evasion techniques that are being used by malware developers.
    > Hear about advanced malware that uses different evasion combinations.
    > Gain insight on how companies unwittingly contribute to the increased sophistication of evasion techniques.
    > Get actionable insights and techniques on how to impede their effectiveness
  • Developing and Managing an Endpoint Security Strategy for Your Enterprise Recorded: Jan 14 2020 62 mins
    Stacey Halota, Nadav Maman, Sara Peters
    Wireless devices. Mobile laptops that could be booted up from anywhere. Desktop systems loaded with sensitive information. Smartphones and smart TVs. For the IT security manager, the concept of “endpoint security” has evolved significantly over the past year or two.
    How is your enterprise approaching the endpoint security problem? In this webinar, experts offer advice and recommendations on how to build an endpoint security strategy that works across all of the devices that the end user might employ. You’ll also get insight on how to develop a consistent endpoint security strategy that works for all of your end users, no matter what their roles or applications

    Attend this webinar and you'll:
    Reassess how to define "endpoint"
    Identify strategies for defending those devices that cannot be secured with traditional endpoint protection tools
    Learn what security measures are most effective against ransomware and other leading threats to your endpoints
    Get tips for patching, monitoring and managing remote workers' devices
  • Is real-time threat prevention possible? Recorded: Dec 23 2019 28 mins
    Brian Black
    Deep Instinct is able to prevent threats in zero-time. Yet is that even possible? Brian Black, Senior Sales Engineer at Deep Instinct explains the deep learning technology that lies behind the prevention-focused cybersecurity solution and how it is unique from other machine learning-based security solutions in the market. Both subsets of Artificial Intelligence (AI) machine learning has its limitations, particularly that it relies on a human expert to extract and engineer features that the data will analyze. In contrast, Deep Learning entirely skips this human stage as it autonomously analyzes 100% of the raw data in a file. This ability to analyze more data without being subject to human error enables Deep Instinct's industry-leading detection rates.
  • Deep Instinct 2.3 Dashboard Demo and a Competitive Analysis Recorded: Nov 25 2019 29 mins
    Brian Black
    In this Deep Instinct product demo Brian Black, Senior Sales Engineer, demonstrates how Deep Instinct is able to detect and prevent threats that were not detected by comparable enterprise solutions. From VirusTotal he selects particularly evasive and very new ransomware threats that had not been detected by other vendors. He then tests it against Deep Instinct's 'brain' which had not been updated since August 2018, making it at least 15 months old, and yet Deep Instinct detects the threat, each and every time. Despite the late training and update of the artificial brain, Deep Instinct is able to detect brand new samples that had only been released into the wild in the last few days. The ability to do this lies in the solution's deep learning algorithm's predictive capabilities that make it so unique from anything else out there on the market.
  • We Prevent What Others Can't Find - Deep Instinct Overview Recorded: Nov 13 2019 42 mins
    Brian Black
    What makes Deep Instinct's deep learning-based cybersecurity solution unique? Brian Black, our Senior Sales Engineer provides an overview of Deep Instinct's zero time, preventative solution. He explains the value of having a deep learning framework dedicated to cybersecurity; As the deep learning algorithm is able to analyze files statically in pre-execution, it enables zero time prevention, meaning files are detected and prevented prior to executing and running. Furthermore, the 'intelligence' of the algorithm entails that higher detection rates can be achieved while producing industry-low levels of false positives.
  • Implementing an Effective Defense Against Ransomware Recorded: Nov 5 2019 60 mins
    Eldad Gal, John Pironti,Sara Peters
    Ransomware has become one of the fastest growing cyber threats faced by enterprises today, not to mention municipal governments, hospitals and schools. What are the most common ways that ransomware gets into systems, and how can you limit the possibility of infection? If you are infected, what steps should you take to mitigate the problem, and how should you deal with the perpetrators? This webinar answers these questions and more, providing expert advice on how to stop ransomware from infecting your critical systems and data, and what to do if your defenses fail.

    From this session you will:

    > Learn to apply security hygiene measures and endpoint protections that will make your systems far more resilient.
    > Find out what to do and what NOT to do with backups, to soothe the sting on having been infected.
    > Know the risk factors to assess when determining whether or not to pay out a ransom.
    > Learn to identify the early warning signs that an attacker is planning to deploy ransomware on your systems and stop them in their tracks.
  • AI vs AI: The Good, the Bad and the Ugly Recorded: Sep 10 2019 59 mins
    Nadav Maman, Bruno Mariano, and Peter Krass
    The day hackers start using AI and how to protect against it!

    Think about what would happen when hackers start using the power of AI for their malicious ends? With the dissemination of AI knowledge and resources, this has become not a theoretical question of if, but when. In this webinar we draw out the implications of this; the risks it holds to the retail sector and what organizations can do to ensure ongoing protection.

    From this session you will:

    > Understand the future cyber-threat landscape
    > Understand the role that advanced AI will play in the development of future malware
    > Hear deep learning experts provide a break-down of different types of AI attacks and how they will work
    > Gather valuable information that will be useful when planning your future focused security strategy
    > Hear recommendations from other cyber experts on how they protected their enterprise against advanced AI cyber threats
Before You Know It
Harnessing the power of deep learning, Deep Instinct is revolutionizing cyber security - Unleashing game-changing threat detection and prevention technology.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Malware Battleground in 2017
  • Live at: Feb 22 2017 6:00 pm
  • Presented by: Shimon Oren, Head of Cyber-Intelligence at Deep Instinct
  • From:
Your email has been sent.
or close