Hi [[ session.user.profile.firstName ]]

Creative Hackers - the latest 'tricky' attack trends to watch for; ft James Rutt

Attackers never rest. They are always inventing new ways to sneak by the current generation of security solutions. We are processing hundreds of thousands of files and URLs "in the wild" - and a significant number deemed "clean" by the leading engines on VirusTotal are actually malicious content generated by creative hackers.

Learn about some of the latest techniques to watch out for in our monthly Creative Hackers program.

In this session, join us and our guest, James Rutt, CIO & CISO of The Dana Foundation, to hear about a recent barrage his company received and more...

Among the topics we will cover:

1. The latest creative hacking themes and their means of execution

2. Real life example of an attack escalation at the Dana Foundation

3. How you can ensure your systems are more resilient against common tricks
Recorded Aug 8 2018 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Michael Aminov: Founder & Chief Architect - Perception Point; James Rutt: CIO & CISO - Dana Foundation
Presentation preview: Creative Hackers - the latest 'tricky' attack trends to watch for; ft James Rutt

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • A new security nightmare: How drives, messaging, etc. are a risk we can’t ignore Aug 7 2019 2:00 pm UTC 48 mins
    Yoram Salinger: CEO - Perception Point, Michael Aminov: Founder & Chief Architect - Perception Point
    Wide adoption of new cloud collaboration apps (e.g. OneDrive, Slack, etc.) is creating many new security blindspots that are ripe for hackers to leverage. As more and more companies use these tools to communicate with customers, suppliers, and partners, and insider threats remain a challenge, IT decision makers should adapt and plan how to protect their organization from these new attack vectors.

    Join our CEO and Chief Architect to learn more about:

    1. How these tools are being adopted across the enterprise

    2. What are the specific security risks they pose

    3. How you can effectively manage this new level of complexity, and close the gaps
  • Securing Digital Transformation: How to Close Major Loopholes Jul 31 2019 2:00 pm UTC 46 mins
    Corie Chung - Chief Strategy Officer; Shlomi Levin - Co-founder and CTO; Michael Aminov Co-founder & Chief Architect
    Nearly 90% of businesses are pursuing a digital-first strategy as their processes become digitized as data-driven.

    However, with the promise of great leaps in growth and productivity, also come major security loopholes. From new communication channels to problematic security policies to legacy systems, there are many ways in which the digital-first business may be exposed - a risk brands simply can't afford to take.

    Join our founders to learn more about the digital transformation phenomena, its IT enablers, and how to close some of the major loopholes leaving organizations exposed.
  • BEC attack methods, and how to stop them Recorded: Jun 25 2019 32 mins
    Corie Chung, Chief Strategy Officer - Perception Point; Benny Reich, VP Products - Perception Point
    If you're in email security, you probably know that BEC is something to be worried about. It's very hard to detect and plays very well on human vulnerabilities. But do you really understand how this attack works? Did you know that BEC isn't just social-engineering but also relies on payload-based attacks? Did you know real-time prevention (and not detection) of BEC attacks is possible with the right techniques?

    Join our Chief Strategy Officer and VP Products to learn more about:
    1. What BEC really means
    2. How BEC attackers think and how they work their way into your organization
    3. Real-life examples of BEC attacks
    4. How you can better protect your company
  • 10 Minutes on OneDrive Threat Prevention. Closing Cloud Storage Loopholes. Recorded: May 7 2019 16 mins
    Corie, Chief Strategy Officer - Perception Point; Michael Aminov - Co-founder & Chief Architect
    In this short webinar, understand the security loopholes in Cloud Storage, and see a real case of an attempted attack we stopped on a Fortune 500 company's OneDrive.
    The webinar will also include a Q&A session for you to ask our experts about the security loopholes in other Cloud Storage platforms.
  • Transform G Suite Email Security in less than 10 minutes - 2nd try :) Recorded: Apr 2 2019 12 mins
    Corie Chung, Chief Strategy Officer - Perception Point; Michael Aminov, Chief Architect - Perception Point
    The built-in security for G Suite is insufficient against the modern threat landscape. In this short webinar, join our Chief Architect Michael Aminov to learn how to dramatically improve the prevention of APTs, phishing, malware, spam and BEC attacks with no disruption to existing business processes or IT overhead.
  • Transform G Suite Email Security in less than 10 minutes Recorded: Mar 26 2019 16 mins
    Michael Aminov, Chief Architect - Perception Point
    The built-in security for G Suite is insufficient against the modern threat landscape. In this short webinar, join our Chief Architect Michael Aminov to learn how to dramatically improve the prevention of APTs, phishing, malware, spam and BEC attacks with no disruption to existing business processes or IT overhead.
  • Transform Office 365 Email Security in less than 10 minutes Recorded: Mar 19 2019 15 mins
    Michael Aminov, Chief Architect - Perception Point
    According to Gartner, "Clients have found the email security capabilities of Office 365 to be lagging."

    In this short webinar, join our Chief Architect Michael Aminov to learn how to dramatically improve the prevention of APTs, phishing, malware, spam and BEC attacks with no disruption to existing business processes or IT overhead.
  • Addressing the Cyber Threats on the Horizon Recorded: Jan 29 2019 41 mins
    Mille Gandelsman, Yoram Salinger, Guy Dagan, Elad Schulman, Kenneth Schneider
    Cyber threats continue to rise as organizations are embarking on their digital transformation journeys. The continued rise in cyber attacks is a key concern for CISOs in their efforts to protect the enterprise from financially motivated cyber criminals, as well as insider threats.

    Join security experts as they discuss:
    - New on the threat landscape
    - Notable cyber attack methods and strategies and how to protect against them
    - Areas for improvement
    - Solutions for network visibility, breach detection and response
    - Recommendations for improving security and steps to take today

    Panellists
    Elad Schulman, CEO, Segasec
    Yoram Salinger, CEO, Perception Point
    Mille Gandelsman, CTO and co-founder, Indegy
    Guy Dagan, Cofounder and Partner, Consienta
    Kenneth Schneider, VP Fellow, Symantec
  • OneDrive, Dropbox, Box could be your weakest security link. How to close the gap Recorded: Nov 28 2018 33 mins
    Michael Aminov: Founder & Chief Architect - Perception Point; Corie Chung: Chief Strategy Officer - Perception Point
    Shared drive applications are essential productivity tools. Despite widespread adoption, OneDrive, Sharepoint, Dropbox, etc. lack the advanced security measures that have been instrumental in securing email, endpoints and networks, creating security blind spots that pose a significant cybersecurity risk. According to market research, 81% of IT decision makers consider shared drive apps to be vulnerable to cyberattacks.

    During this webinar, learn about how shared drives can be leveraged by attackers, why the built-in or CASB-provided security is not enough, and how to easily close vector of attack.
  • Email Security WTF?!: Escape the Nightmare Recorded: Oct 31 2018 43 mins
    Shlomi Levin: Founder & CTO - Perception Point; Corie Chung: Chief Strategy Officer - Perception Point
    From the producers of Email Security WTF?!, this webinar will shed light on the email security nightmares cybersecurity teams face: excessive costs, long update cycles, increasing risks of being compromised; and how to make them all go away.

    Join us to gain insights on the advanced attacks easily breaching existing solutions, and how cloud-based email security can help you sleep better at night.
  • Malware is a red herring. The real enemy is its source. Recorded: Sep 5 2018 64 mins
    Shlomi Levin: Founder & CTO - Perception Point; Michael Aminov: Founder & Chief Architect - Perception Point
    Malware is growing exponentially. Leaping +88% to 670 MM new variants in 2017 alone,
    the time, money and resources required to stay on top of this is unsustainable. It's time to stop
    fighting an un-winnable battle and focus on the real enemy, the source of malware - the exploit.
    Learn how by targeting the ~10 known exploit techniques, you can make chasing malware a
    thing of the past.

    Join our CTO and Cheif Architect to learn more about:

    1. What is an exploit technique and why you should care about it

    2. The different techniques attackers utilize to evade current solutions

    3. How to achieve visibility at the exploit-stage of the kill chain
  • Creative Hackers - the latest 'tricky' attack trends to watch for; ft James Rutt Recorded: Aug 8 2018 61 mins
    Michael Aminov: Founder & Chief Architect - Perception Point; James Rutt: CIO & CISO - Dana Foundation
    Attackers never rest. They are always inventing new ways to sneak by the current generation of security solutions. We are processing hundreds of thousands of files and URLs "in the wild" - and a significant number deemed "clean" by the leading engines on VirusTotal are actually malicious content generated by creative hackers.

    Learn about some of the latest techniques to watch out for in our monthly Creative Hackers program.

    In this session, join us and our guest, James Rutt, CIO & CISO of The Dana Foundation, to hear about a recent barrage his company received and more...

    Among the topics we will cover:

    1. The latest creative hacking themes and their means of execution

    2. Real life example of an attack escalation at the Dana Foundation

    3. How you can ensure your systems are more resilient against common tricks
  • Email Security WTF?!: Why your email is still being compromised, and what to do Recorded: Jun 26 2018 50 mins
    Yoram Salinger: CEO - Perception Point, Shlomi Levin: Co-founder & CTO - Perception Point
    Email is the most commonly targeted attack vector. While many solutions have been introduced over the years, the invention of new evasion techniques means companies are still highly exposed. A new approach is urgently needed in order to ensure this channel is fully fortified for today and the future.

    Join our CEO and CTO to learn more about:

    1. How hackers are now easily bypassing traditional solutions like AVs, sandboxes, and more

    2. How moving email to the cloud is an opportunity for much stronger, more efficient security

    3. How to finally end the cat-and-mouse game with attackers with future-ready prevention techniques
Next Generation Cybersecurity
Perception Point - Advanced collaboration security designed for the modern enterprise.

Perception Point is a next-gen Israeli cybersecurity company leading advanced threat prevention across enterprise collaboration channels.

We've built-in multiple scanning engines and comprehensive threat intelligence for enhanced protection against both advanced threats and known attacks (e.g. phishing and commodity malware). We’ve invented the first technology to combine hardware visibility with software agility to see what leading solutions miss. Our propriety software algorithms x-ray code at CPU-level to intercept advanced attacks at the earliest stage possible —the exploit—before malware is delivered. No sandbox required.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Creative Hackers - the latest 'tricky' attack trends to watch for; ft James Rutt
  • Live at: Aug 8 2018 2:00 pm
  • Presented by: Michael Aminov: Founder & Chief Architect - Perception Point; James Rutt: CIO & CISO - Dana Foundation
  • From:
Your email has been sent.
or close