Hi [[ session.user.profile.firstName ]]

On the Go: Achieving Consistent Security Whether Working from Home or the Office

Join us and guest speaker Chris Sherman from Forrester Research in this webinar as we address the security implication of moving between more risky to less risky networks.

After an extended Work From Home period, many organizations are now planning their employees’ return to the office. But they are also planning a future with hybrid model of enabling employees to both work from remote locations and work from the office. However, with the potential to dramatically broaden attack surfaces, it’s important to make sure that employees do not inadvertently pollute the organizational network with unsafe endpoints, VPN or Internet connections. So how do you make sure the transition between home and office is smooth and safe? The answer lies in getting to zero, by applying a zero-time approach to all threats and a zero-trust approach to all users.

During this webinar you will:

•Find out about secure resources you can offer employees regardless of where they are located
•Learn about stepping up security controls in light of zero trust and zero-time best practices
•Learn how to adapt to managing different risk levels
•Find out how to use deep learning to bolster your zero time / zero trust defences
•Live Q&A with Deep Instinct’s Security experts
Recorded Jun 30 2020 46 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Steve Salinas of Deep Instinct and Chris Sherman of Forrester Research
Presentation preview: On the Go: Achieving Consistent Security Whether Working from Home or the Office

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Symantec vs Deep Instinct: What you Need to Know Jul 22 2020 5:00 pm UTC 45 mins
    Steve Salinas of Deep Instinct
    Change stinks, but it does not need to be painful.

    If you are a Symantec customer and in the market for a new EPP, then this webinar is for you! We will be comparing the features and capabilities offered by Symantec’s Endpoint Security offering for Enterprise against Deep Instinct’s multi-layered approach to security.

    Join us as we get ‘under the hood’ on the technical bits and bytes of the two different vendors; the technology used by their respective detection engines, which file types they support, remediation services provided, management and deployment offerings and a whole lot more.


    After this webinar you will:

    • Understand how Deep Instinct’s technology is different from Symantec and most other AV offerings
    • Learn about the many added benefits that can be gained from deploying Deep Instinct
    • See a demo of Deep Instinct in action. The simplicity is nothing short of astounding
  • On the Go: Achieving Consistent Security Whether Working from Home or the Office Recorded: Jun 30 2020 46 mins
    Steve Salinas of Deep Instinct and Chris Sherman of Forrester Research
    Join us and guest speaker Chris Sherman from Forrester Research in this webinar as we address the security implication of moving between more risky to less risky networks.

    After an extended Work From Home period, many organizations are now planning their employees’ return to the office. But they are also planning a future with hybrid model of enabling employees to both work from remote locations and work from the office. However, with the potential to dramatically broaden attack surfaces, it’s important to make sure that employees do not inadvertently pollute the organizational network with unsafe endpoints, VPN or Internet connections. So how do you make sure the transition between home and office is smooth and safe? The answer lies in getting to zero, by applying a zero-time approach to all threats and a zero-trust approach to all users.

    During this webinar you will:

    •Find out about secure resources you can offer employees regardless of where they are located
    •Learn about stepping up security controls in light of zero trust and zero-time best practices
    •Learn how to adapt to managing different risk levels
    •Find out how to use deep learning to bolster your zero time / zero trust defences
    •Live Q&A with Deep Instinct’s Security experts
  • Under the Hood: Live Demo on Preventing Fileless Attacks Recorded: Jun 24 2020 31 mins
    Brian Black & Stephen Salinas
    Fileless attacks are some of the most misunderstood attack vectors in the cyberthreat landscape. With so many different criteria of what actually makes an attack vector fileless, it’s no wonder that security teams struggle to identify and detect fileless attacks in order to determine the best way to protect their environment. In this live demo we will discuss the various ways attackers carry out fileless attacks and show you how Deep Instinct is designed to neutralize all of them.

    After this webinar you will:

    •Understand how fileless attacks work
    •See how Deep Instinct prevents fileless attacks
    •Get best practices you can implement to limit your attack surface
  • The Cybersecurity Trade-Off Recorded: Jun 10 2020 45 mins
    Shimon Noam Oren, VP Research & Deep-Learning at Deep Instinct & Steve Salinas, Head of Product Marketing at Deep Instinct
    It is an accepted fact that increasing prevention controls results in a higher rate of false positives. If the goal is to prevent as many threats as possible, with most solutions in the market today it makes sense that as thresholds tighten, some wrong categorization can occur. Given this fact, many security teams continuously work to balance their prevention settings with their capacity to investigate false positives; we call this the Prevention Trade-off Dilemma.

    However, there is an emerging technology that eliminates this trade-off dilemma - Deep learning-based prevention. Deep learning prevention by its very nature ensures security teams do not have to make these problematic trade-off decisions required by other security products, as it analyzes all available data to make its malicious/benign decisions.

    By attending this webinar, you will:
    •See why the cyber trade-off decision is unavoidable with legacy and most next-gen prevention tools
    •Gain a servicable understanding of the differences between machine-learning and deep-learning prevention
    •Real world example of how this trade-off was significantly minimized with a deep learning-based solution
    •Live Q&A with Deep Instinct’s Security experts
  • See Live Demo of Deep Instinct Tackling Ransomware Head-On Recorded: May 27 2020 32 mins
    Brian Black & Stephen Salinas
    Ransomware is by far one of the most pervasive attacks faced by organizations big and small. If successful, a ransomware attack leaves the organization in shambles, struggling to recover days, weeks, even months after the attack.
    Deep Instinct, the pioneer in applying deep learning to cybersecurity, delivers a multi-layer approach to ransomware prevention, helping organizations avoid the pain caused by ransomware.
    In this webinar you will learn how with Deep Instinct your ransomware concerns can be a thing of the past.

    After this webinar you will know:
    1. How ransomware works
    2. Why ransomware can be so damaging
    3. How Deep Instinct prevents ransomware from damaging your organization
  • Best Practices to Manage an Effective Security Strategy in the Education Sector Recorded: May 20 2020 42 mins
    Steve Salinas & Matthew Fredrickson
    Teachers, students, admin, parents, the education sector has possibly the most diverse user base, each requiring its own user privileges, access requirements and with their own behavioral trends. Yet besides this, there are a number of unique challenges to securing an educational environment, be they ensuring broad attack surface protection, great flexibility with minimal false positives and all while maintaining a relatively flat and cost-effective security posture.

    Whether running a security team for a school district, college, or university, every solution added to the security stack must be fit for purpose and deliver on expectations.
    So, where to begin?

    Deep Instinct invites you to join us for an informative discussion with Matthew Frederickson, Director of Information Technology for Council Rock School District in Newton, PA, to hear about how he took a fresh approach to build out his security framework. Matthew will share best practices from the field in evaluating security technology as well as adopting a new approach to security.

    After this webinar, you will:

    •Understand common challenges experienced by IT security staff of securing an educational environment
    •Understand where AI technology is being used within educational environments to optimize security
    •Get a real-world example of Council Rock’s transformation from reactive to proactive security
    •Key tips for implementing a proactive security approach that will improve overall process
    •Live Q&A with Deep Instinct’s Security experts

    We will have plenty of time for questions so come ready to get your questions answered by the experts.
  • What is the Economic Value of Prevention in Cybersecurity? Recorded: Apr 30 2020 43 mins
    Dr. Larry Ponemon, Chairman and Founder of the Ponemon Institute & Steve Salinas, Head of Product Marketing at Deep Instinct
    In this webinar we address the results and implications of the groundbreaking research The Economic Value of Prevention in the Cybersecurity Lifecycle. Conducted by the Ponemon Institute and sponsored by Deep Instinct, the report analyzes the cost savings that can be taken in an efficient, zero-time prevention model. Results were sourced from over 600 IT and IT security practitioners who are knowledgeable about their organizations’ cybersecurity technologies and processes.
    Attend and you’ll gain:
    •An understanding of which areas of the cybersecurity lifecycle, that when effectively managed, can have the most direct impact on reducing costs
    •Learn which domains of cybersecurity are currently receiving the greatest focus and budget allocations
    •Get strategic insight on how companies can optimize their security budgets to achieve an optimal defense against even the most advanced attacks.
  • Cyber Attack Evasion Techniques Recorded: Mar 23 2020 51 mins
    Guy Propper, Eric Bruno
    When it comes to evasion techniques there’s a perpetual cat and mouse game between malware developers and solutions providers. By drawing on the latest in evasion techniques, malware developers not only go undetected on the compromised machine but more importantly, they hide their malicious indicators and behaviors from detection tools and automated threat analysis systems.

    From this session you will:

    > Learn how to identify the different evasion techniques that are being used by malware developers.
    > Hear about advanced malware that uses different evasion combinations.
    > Gain insight on how companies unwittingly contribute to the increased sophistication of evasion techniques.
    > Get actionable insights and techniques on how to impede their effectiveness
  • Developing and Managing an Endpoint Security Strategy for Your Enterprise Recorded: Jan 14 2020 62 mins
    Stacey Halota, Nadav Maman, Sara Peters
    Wireless devices. Mobile laptops that could be booted up from anywhere. Desktop systems loaded with sensitive information. Smartphones and smart TVs. For the IT security manager, the concept of “endpoint security” has evolved significantly over the past year or two.
    How is your enterprise approaching the endpoint security problem? In this webinar, experts offer advice and recommendations on how to build an endpoint security strategy that works across all of the devices that the end user might employ. You’ll also get insight on how to develop a consistent endpoint security strategy that works for all of your end users, no matter what their roles or applications

    Attend this webinar and you'll:
    Reassess how to define "endpoint"
    Identify strategies for defending those devices that cannot be secured with traditional endpoint protection tools
    Learn what security measures are most effective against ransomware and other leading threats to your endpoints
    Get tips for patching, monitoring and managing remote workers' devices
  • Is real-time threat prevention possible? Recorded: Dec 23 2019 28 mins
    Brian Black
    Deep Instinct is able to prevent threats in zero-time. Yet is that even possible? Brian Black, Senior Sales Engineer at Deep Instinct explains the deep learning technology that lies behind the prevention-focused cybersecurity solution and how it is unique from other machine learning-based security solutions in the market. Both subsets of Artificial Intelligence (AI) machine learning has its limitations, particularly that it relies on a human expert to extract and engineer features that the data will analyze. In contrast, Deep Learning entirely skips this human stage as it autonomously analyzes 100% of the raw data in a file. This ability to analyze more data without being subject to human error enables Deep Instinct's industry-leading detection rates.
  • Deep Instinct 2.3 Dashboard Demo and a Competitive Analysis Recorded: Nov 25 2019 29 mins
    Brian Black
    In this Deep Instinct product demo Brian Black, Senior Sales Engineer, demonstrates how Deep Instinct is able to detect and prevent threats that were not detected by comparable enterprise solutions. From VirusTotal he selects particularly evasive and very new ransomware threats that had not been detected by other vendors. He then tests it against Deep Instinct's 'brain' which had not been updated since August 2018, making it at least 15 months old, and yet Deep Instinct detects the threat, each and every time. Despite the late training and update of the artificial brain, Deep Instinct is able to detect brand new samples that had only been released into the wild in the last few days. The ability to do this lies in the solution's deep learning algorithm's predictive capabilities that make it so unique from anything else out there on the market.
  • We Prevent What Others Can't Find - Deep Instinct Overview Recorded: Nov 13 2019 42 mins
    Brian Black
    What makes Deep Instinct's deep learning-based cybersecurity solution unique? Brian Black, our Senior Sales Engineer provides an overview of Deep Instinct's zero time, preventative solution. He explains the value of having a deep learning framework dedicated to cybersecurity; As the deep learning algorithm is able to analyze files statically in pre-execution, it enables zero time prevention, meaning files are detected and prevented prior to executing and running. Furthermore, the 'intelligence' of the algorithm entails that higher detection rates can be achieved while producing industry-low levels of false positives.
  • Implementing an Effective Defense Against Ransomware Recorded: Nov 5 2019 60 mins
    Eldad Gal, John Pironti,Sara Peters
    Ransomware has become one of the fastest growing cyber threats faced by enterprises today, not to mention municipal governments, hospitals and schools. What are the most common ways that ransomware gets into systems, and how can you limit the possibility of infection? If you are infected, what steps should you take to mitigate the problem, and how should you deal with the perpetrators? This webinar answers these questions and more, providing expert advice on how to stop ransomware from infecting your critical systems and data, and what to do if your defenses fail.

    From this session you will:

    > Learn to apply security hygiene measures and endpoint protections that will make your systems far more resilient.
    > Find out what to do and what NOT to do with backups, to soothe the sting on having been infected.
    > Know the risk factors to assess when determining whether or not to pay out a ransom.
    > Learn to identify the early warning signs that an attacker is planning to deploy ransomware on your systems and stop them in their tracks.
  • AI vs AI: The Good, the Bad and the Ugly Recorded: Sep 10 2019 59 mins
    Nadav Maman, Bruno Mariano, and Peter Krass
    The day hackers start using AI and how to protect against it!

    Think about what would happen when hackers start using the power of AI for their malicious ends? With the dissemination of AI knowledge and resources, this has become not a theoretical question of if, but when. In this webinar we draw out the implications of this; the risks it holds to the retail sector and what organizations can do to ensure ongoing protection.

    From this session you will:

    > Understand the future cyber-threat landscape
    > Understand the role that advanced AI will play in the development of future malware
    > Hear deep learning experts provide a break-down of different types of AI attacks and how they will work
    > Gather valuable information that will be useful when planning your future focused security strategy
    > Hear recommendations from other cyber experts on how they protected their enterprise against advanced AI cyber threats
  • A Biological Perspective of Malware Recorded: May 16 2018 35 mins
    Guy Propper, Security researcher at Deep Instinct
    The term “virus” exists both in biology and in computers, but how deep are the similarities and differences between biological viruses and computer malware?

    The life cycle of biological viruses, which begins in infection of the host and execution of the viral payload, and leads to the immune response of the host and the evolution of both host and virus, has many surprising similarities with malware. Concepts such as code injection, evasion and obfuscation exist both in the biological and computer realms.

    This webinar provides an understanding of each stage in the life cycle of a biological virus, and compares it to the relevant stage in the life cycle of malware. Surprising differences between malware and virus actions will be shown, and some mechanisms which are used by viruses, but have not been adopted, or even attempted by malware, will be revealed.
  • Classifying Malware Using Deep Learning Recorded: May 2 2018 12 mins
    Yaniv Shechtman Director of Product Management at Deep Instinct
    With the increase of cybersecurity disasters and due to the lack of staff expertise, organizations are concerned for the state of their infrastructure’s security, leading many organizations to use third-party threat intelligence solutions.

    In order for SOC and IR teams to get a full understanding of an impending threat, they need to measure the threat severity - a task that requires time, resources and money.

    That being said, there is an ongoing need to respond to such cyberattacks in real-time with minimal human interaction using artificial intelligence, or to be more specific – deep learning.
  • Making Sense of Fileless Malware Recorded: Apr 25 2018 20 mins
    Guy Propper, Security researcher at Deep Instinct
    Threat actors are constantly searching for new and sophisticated ways in which to avoid detection in order to successfully perform malicious attacks.
    During the past year there has been an extreme increase in the amount of fileless malware attacks. Fileless malware attacks pose a threat to organizations and a challenge for security vendors, due to the use of various nonexecutable file formats for infection, and the ability to execute parts of the malicious logic of the attack in-memory only.

    This phenomenon has encouraged cyber criminals to more extensively adopt fileless attack techniques, which were once mostly used by nation-states, leading to a rise in the amount of fileless attacks.

    This webinar will present a comprehensive overview of fileless malware, enabling individuals and organizations to better understand and deal with the threat posed by fileless malware.
  • The Malware Battleground in 2017 Recorded: Feb 22 2017 56 mins
    Shimon Oren, Head of Cyber-Intelligence at Deep Instinct
    2016 has been yet another record breaking year in many aspects of the cyber security and malware world. We will look at some of the trends and vectors that have materialized or strengthened in 2016 and will carry into 2017.

    Join Shimon N. Oren, Deep Instinct’s Head of Cyber-Intelligence, to learn about the evolution of malware and cyber threats in the previous year. From ransomware, through cross platform campaigns, to file-less attacks we will review and give examples of the newest concepts and campaigns that will shape this year’s play ground between hackers and the cyber-industry.

    About the Presenter:
    Shimon Noam Oren is the head of Cyber-Intelligence at Deep Instinct. Prior to joining Deep Instinct Shimon served for 14 years as an officer in the Israel Defense Force's elite cyber unit. With a background that includes a wide range of cyber security and intelligence positions, Shimon successfully led multifunctional teams of engineers, analysts, hackers and security professionals in various settings and operations. Some of his other accomplishments during his tenure in the military include developing new methods and tools for researching and analyzing cyber-attacks and leading a product management team in charge of a series of innovative cyber collection products. Shimon has worked extensively with a variety of industry, defense and intelligence partners and agencies in North America and Europe, and was awarded the President of Israel Award for outstanding service.
  • Protect Against Cyber Attacks with Deep Learning Recorded: Nov 10 2016 46 mins
    Dr. Eli David, CTO of Deep Instinct
    Join this presentation and discover the latest developments in artificial intelligence. Dr. David, CTO of Deep Instinct, will explain deep learning and how it can help protect your organization against cyber attacks. The session will include a demo of deep learning’s first application to cybersecurity, showcasing the highest accuracy rates in detecting zero-day and APT attacks, offering real-time, proactive protection.
Before You Know It
Harnessing the power of deep learning, Deep Instinct is revolutionizing cyber security - Unleashing game-changing threat detection and prevention technology.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: On the Go: Achieving Consistent Security Whether Working from Home or the Office
  • Live at: Jun 30 2020 5:00 pm
  • Presented by: Steve Salinas of Deep Instinct and Chris Sherman of Forrester Research
  • From:
Your email has been sent.
or close