Hi [[ session.user.profile.firstName ]]

Anatomy of a Serverless Injection Attack - Step by Step

The OWASP Serverless top 10 project has launched. The upcoming report will evaluate the Top 10 for serverless environments, explaining and demonstrating the differences in attack vectors, defense techniques, and business impact.

Join us for this webinar to learn about what might be the biggest change...& the most concerning – injection attacks. Protego’s Head of Security Research will show you what a serverless injection attack really looks like using code regularly found in the wild.

Key Takeaways:
--See a Slack bot serverless injection attack in action
--View serverless attacks from attacker’s & defender’s points of view
--Learn about the goal of the ongoing OWASP Serverless top 10 project
Recorded Nov 7 2018 33 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Tal Melamed, Head of Security Research, Protego Labs
Presentation preview: Anatomy of a Serverless Injection Attack - Step by Step
  • Channel
  • Channel profile
  • Les bonnes pratiques de la sécurisation avec Microsoft Azure Jun 18 2020 8:00 am UTC 60 mins
    Gonzalo ROCAMADOR: Cloud Security Architect, Check Point & Pascal SAULIERE: Cloud Solution Architect for Partners, Microsoft
    Participez au Webinar Check Point Software & Microsoft le Jeudi 18 Juin à 10:00 : " Les bonnes pratiques de la sécurisation avec Microsoft Azure ".

    Pour adopter pleinement le cloud, les entreprises doivent comprendre où se situe l'équilibre des responsabilités entre la protection de l'infrastructure cloud (qui est la responsabilité du fournisseur) et la protection des données qui résident dans le cloud (qui est la responsabilité du client). C'est ce que les fournisseurs de services Cloud appellent le modèle de responsabilité partagée.
    Dans ce webinar, co-organisé par Check Point et Microsoft, découvrez les meilleures pratiques sur la façon de construire un déploiement Cloud sécurisé.

    Nous reviendrons en détails sur :

    -Les capacités de cloud Azure pour permettre aux entreprises et organisations d'aborder avec confiance les sujets de conformité, de sécurité et de l'identité dans le cloud.

    -Les recommandations de Microsoft et Check Point pour une migration sécurisée des produits et services Microsoft concernés par une fin de support en 2020.

    -Le plan de sécurité cloud Check Point, qui aide les clients à concevoir des architectures de cloud sécurisées, notamment avec les solutions de sécurité CloudGuard.

    A bientôt,

    Check Point Software France
  • Office 365 Webinar: Why you need more than your built-in email security Jun 16 2020 5:00 pm UTC 45 mins
    Ran Schwartz | Product Manager
    Did you know that over 90% of attacks on organizations start from a malicious email? Cloud mailboxes are the first link in the chain of attack, and since they more often than not involve the human factor, it is your organization’s weakest link. With email attacks rapidly evolving and outsmarting traditional and platform-provided security solutions, organizations need to reevaluate their email security architecture.

    Join us for our live webinar where we will explore the inherent weaknesses of traditional and platform-provided security and how to overcome them with the reborn and revamped CloudGuard SaaS

    Register to the EMEA/APAC session here: https://www.brighttalk.com/webcast/16731/411159
  • Office 365 Webinar: Why you need more than your built-in email security Jun 16 2020 8:00 am UTC 45 mins
    Ran Schwartz | Product Manager
    Did you know that over 90% of attacks on organizations start from a malicious email? Cloud mailboxes are the first link in the chain of attack, and since they more often than not involve the human factor, it is your organization’s weakest link. With email attacks rapidly evolving and outsmarting traditional and platform-provided security solutions, organizations need to reevaluate their email security architecture.

    Join us for our live webinar where we will explore the inherent weaknesses of traditional and platform-provided security and how to overcome them with the reborn and revamped CloudGuard SaaS
  • Best Practices for a Secure OCI Migration Jun 9 2020 6:00 pm UTC 60 mins
    Phil Griston, Sr. Principal Product Manager Oracle Cloud Infrastructure and Jeff Engel, Cloud Alliance Architect, Check Point
    Are you considering – or already in the process of – migrating to Oracle Cloud Infrastructure? Would you like to learn best practices for designing a secure cloud deployment? Do you need to provide scalable, secure remote access to your workforce?

    Join this webinar co-hosted by Check Point and Oracle for best practices on how to build a secure cloud deployment.
    Learn about:

    • Oracle Cloud Infrastructure key features and benefits
    • Scalable and secure remote access to corporate networks and resources
    • Check Point's cloud security blueprint, which helps customers design secure cloud architectures with CloudGuard cloud security solutions.

    11 AM PT | 2 PM ET
  • Best Practices for a Secure OCI Migration Jun 9 2020 1:00 pm UTC 60 mins
    Phil Griston, Sr. Principal Product Manager Oracle Cloud Infrastructure and Jeff Engel, Cloud Alliance Architect, Check Point
    Are you considering – or already in the process of – migrating to Oracle Cloud Infrastructure? Would you like to learn best practices for designing a secure cloud deployment? Do you need to provide scalable, secure remote access to your workforce?

    Join this webinar co-hosted by Check Point and Oracle for best practices on how to build a secure cloud deployment.

    Learn about:

    • Oracle Cloud Infrastructure key features and benefits
    • Scalable and secure remote access to corporate networks and resources
    • Check Point's cloud security blueprint, which helps customers design secure cloud architectures with CloudGuard cloud security solutions

    9am EST | 2pm UK | 4pm Moscow
  • Cyber Crime Trends during Coronavirus Jun 3 2020 3:00 pm UTC 45 mins
    Omer Dembinsky, Data Research Manager & Michael Abramzon, Threat Intelligence Analysis Team Leader
    This session will cover recent cyberattacks and some of the most crucial trends we witness during the last months, review activities by various APT groups, and dive into the Vicious Panda’s campaign against the Mongolian public sector.
  • Change Drivers: Impacts to Healthcare Cloud Security and Compliance Jun 2 2020 7:00 pm UTC 60 mins
    David Houlding, Director of Healthcare Experiences at Microsoft
    Coronavirus is driving major changes in healthcare with the introduction of newly created remote workstations, increased cloud application adoption, the launch new telemedicine services, and more.

    This has created a shift in the risk landscape, and healthcare must track this shift and ensure continuous security and compliance to thwart off new exploits from the pandemic.

    Learn how leading healthcare organizations are taking this issue head-on by leveraging cloud services, and seamlessly layering security and compliance solutions to ensure uninterrupted patient care, including,

    - Coronavirus impacts to the risk landscape, and emerging threats impacting healthcare organizations
    - Compliance strategies and to protect patient privacy
    - Security best practices to prevent threats
  • Meet the Experts – Ask Us Anything! Recorded: May 27 2020 46 mins
    Avi Rembaum | Vice President, Security Solutions, Check Point
    Meet our cloud security experts and evangelists, share your top cloud security challenges and hear their responses.
  • Cybersecurity in the Age of Cloud Recorded: May 27 2020 31 mins
    Sean Sweeney | Sr. Director & Chief Security Advisor, Microsoft
    Cloud is fundamentally changing how we need to be approaching cybersecurity. Digital transformation has pushed our organizations to adopt technologies that stretch beyond the traditional network boundaries and the attack techniques used against our organizations have transformed as well. Join Sean Sweeney, Microsoft Chief Security Advisor, in a review of the cybersecurity transformation that is occurring, the evolution of the threat landscape, and the new imperatives that allow organizations to operate in cloud securely.
  • SD-WAN Security: Best-of-Breed or Unified Approach? Recorded: May 27 2020 24 mins
    Chris Federico | Head of Global Telco/GSI Architecture and Services, Check Point
    As enterprises move their branch applications to the cloud, they are adopting Software Defined Wide Area Networking (SD-WAN) for better application performance by intelligently and efficiently routing traffic directly to the internet without passing it through the data center.

    But this needs to happen without compromising security. This talk will address how using both application performance and security can be assured without one compromising the other.
  • It ain't done till it's automated. Security at the speed of DevOps Recorded: May 27 2020 23 mins
    Tsion (TJ) Gonen | Head of Cloud Product Line, Check Point
    Amidst the growing buzz for shift-left developer centric security methods, this session will highlight the need for a common ground between security and DevOps and offer guidance on how to build in security without impeding agility.
  • Hybrid Cloud Blueprint: Best Practices for Designing Secure Cloud Deployments Recorded: May 27 2020 32 mins
    Rodrique Boutros | Cloud Security Architect, Check Point
    Protecting you from you is the #1 challenge in the age of SDE - Software Defined Everything. Using public clouds for enterprise data centers is now mainstream; the advantages are significant and the gained agility indisputable.

    However, the number of services and options being offered is daunting. And with these choices come consequences; one misconfiguration can put your entire organization at risk…or worse.

    Join this session to learn the best practices to providing advanced threat prevention security for applications and data in private, public, and hybrid clouds.
  • Your Journey to the Cloud – The Secure Way Recorded: May 27 2020 24 mins
    Avi Rembaum | Vice President, Security Solutions, Check Point
    In 2020 cloud-related attacks and breaches made even more headlines and companies realized they needed to get their act together.

    So they started to abandon homegrown open-source security tools and focused on consolidated cloud-based threat prevention frameworks offering complete coverage to cloud-related attacks. Going into 2020 & 2021, we're seeing this trend grow as more cloud-related technologies are gaining great security from the industry with specific answers to security challenges of containers, Kubernetes environments, and serverless workloads. In this session, we will cover recent trends and highlight some of the advancements made in fending off threats and turning security into an enabler force in enterprise digital transformation.
  • Best Practices for a Secure Google Cloud Design Recorded: May 27 2020 61 mins
    Bahul Harikumar, Google and John Michealson, Check Point
    With experts:
    Bahul Harikumar, Head of Infrastructure Security Partnerships at Google and John Michealson, Head of Partner and Integration Engineering, at Check Point

    Are you in the process of migrating to Google Cloud? Would you like to learn best practices for designing a secure cloud deployment? Do you need to provide secure remote access to your workforce?

    Join this webinar co-hosted by Check Point and Google Cloud for best practices on how to build a secure cloud deployment.

    Learn about:
    • Google cloud infrastructure capabilities
    • Scalable and secure remote access to corporate networks and resources
    • Check Point's cloud security blueprint, which helps customers design secure cloud architectures with CloudGuard cloud security solutions.
  • Cloud Threat Landscape: Recent findings from Check Point Research Recorded: May 27 2020 31 mins
    Maya Levine | Technical Marketing Engineer, Cloud Security, Check Point
    In the digital transformation era, cloud computing plays an integral role. Scalability, flexibility, agility and automation sound like magical words that make us more productive and innovative once we embrace cloud platforms and utilize cloud applications.

    But, how secure are these platforms and apps?

    This session reveals Check Point Research (CPR) latest cloud related findings. From a fraudulent wire transfer initiated through an email compromised on a cloud app to a vulnerability within a public cloud infrastructure, CPR analysis the latest risks and threat landscape of public cloud. The session will also include global threat intelligence stats related to COVID-19 and public cloud.
  • Mobile Threats to the Enterprise in 2020 Recorded: May 26 2020 37 mins
    Aviran Hazum, Analysis and Response Team Leader and Yael Macias, Product Marketing Manager
    In the past few months, Check Point Researchers have seen an enormous rise in the number of mobile attacks and data breaches happening from the mobile endpoint. They have uncovered Coronavirus-related malicious campaigns, sophisticated mobile ransomware attacks, and even Mobile Device Management (MDM) getting weaponized to attack organizations.

    Join this webinar with Check Point Research to learn first hand from the experts:

    - Why Mobile cyber attacks are skyrocketing
    - How malicious actors are breaching unsuspecting organizations via their mobile endpoints
    - How to effectively secure a mobile workforce
  • Mobile Threats to the Enterprise in 2020 Recorded: May 26 2020 37 mins
    Aviran Hazum, Analysis and Response Team Leader and Yael Macias, Product Marketing Manager
    In the past few months, Check Point Researchers have seen an enormous rise in the number of mobile attacks and data breaches happening from the mobile endpoint. They have uncovered Coronavirus-related malicious campaigns, sophisticated mobile ransomware attacks, and even Mobile Device Management (MDM) getting weaponized to attack organizations.

    Join this webinar with Check Point Research to learn first hand from the experts:

    - Why Mobile cyber attacks are skyrocketing
    - How malicious actors are breaching unsuspecting organizations via their mobile endpoints
    - How to effectively secure a mobile workforce
  • Check Point Partners with Silver Peak to Secure SD-WAN Connections to the Cloud Recorded: May 22 2020 55 mins
    Aviv Ambramovich, Head of Product Management, Security Services, Check Point & Jonathan Florian,Systems Engineer, Silver Peak
    Enterprises need a solution that can intelligently and securely optimize branch office SD-WAN internet connections to the cloud. Check Point and Silver Peak have partnered to create a joint solution that addresses the network security challenges of a cloud-first architecture, enabling enterprises to securely automate branch office Internet connections to the cloud, leveraging Silver Peak’s Unity EdgeConnect SD-WAN edge platform and Check Point CloudGuard Connect cloud-hosted security service.
  • Threat Intelligence and Forensics in CloudGuard Dome9 Recorded: May 19 2020 23 mins
    Maya Levine, Technical Marketing Engineer, Cloud Security
    Check Point CloudGuard Dome9 has provided you an efficient way to visualize and evaluate security posture, while enforcing golden standard policies and compliance measures in the cloud.

    As part of this webinar, we will highlight how incidence response and forensics can further enhance your security posture across your multi-cloud environments.

    Join the webinar and learn how to use special capabilities within CloudGuard Dome9 for threat hunting and intelligence.

    What you will gain:
    •advanced cloud security intelligence,
    •contextualized visualization of threats,
    •actionable security insights
  • Threat Intelligence and Forensics in CloudGuard Dome9 Recorded: May 19 2020 42 mins
    Chris Beckett, Cloud Security at Check Point
    Check Point CloudGuard Dome9 has provided you an efficient way to visualize and evaluate security posture, while enforcing golden standard policies and compliance measures in the cloud.

    As part of this webinar, we will highlight how incidence response and forensics can further enhance your security posture across your multi-cloud environments.

    Join the webinar and learn how to use special capabilities within CloudGuard Dome9 for threat hunting and intelligence.

    What you will gain:
    •advanced cloud security intelligence,
    •contextualized visualization of threats,
    •actionable security insights
Secure Your Everything
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to corporate enterprises and governments globally. Its solutions protect customers from 5th-generation cyber-attacks with an industry leading catch rate of malware, ransomware and other targeted attacks. Check Point offers a multilevel security architecture with our new Gen V advanced threat prevention that protects all networks, cloud and mobile operations of a business against all known attacks combined with the industry’s most comprehensive and intuitive single point of control management system. Check Point protects over 100,000 organizations of all sizes.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Anatomy of a Serverless Injection Attack - Step by Step
  • Live at: Nov 7 2018 4:00 pm
  • Presented by: Tal Melamed, Head of Security Research, Protego Labs
  • From:
Your email has been sent.
or close