Hi [[ session.user.profile.firstName ]]

A Hacker's Perspective: Where Do We Go From Here?

For 25 years or more we have fought the battle of passwords and patches while all around us, the world has developed, data has exponentially increased, attack surfaces are everywhere and technology had quite simply forced the human race to consider the evolution cycle in single lifespans as opposed to millennia. During the last 25 years we have done little to protect the charges we are responsible for, we have failed to secure systems, allowed financial attacks, infrastructure attacks, and now attacks directly against humans. At what point will we be able to stem the bleeding and actually take charge of our realm? Have we left it too late, or are we still able to claw back out of the abyss and face our adversary in a more asymmetrical defensive manner? Can we actually provide safety and security to our charges or will we continue to fail? And, critically, how do we communicate this, and educate a population that is content to watch from the sidelines, while they are being digitally eviscerated.
Recorded Jul 22 2019 62 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Chris Roberts, Chief Security Strategist and Hacker, and Tony Cole, CTO
Presentation preview: A Hacker's Perspective: Where Do We Go From Here?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • A Hacker's Perspective: Where Do We Go From Here? Recorded: Jul 22 2019 62 mins
    Chris Roberts, Chief Security Strategist and Hacker, and Tony Cole, CTO
    For 25 years or more we have fought the battle of passwords and patches while all around us, the world has developed, data has exponentially increased, attack surfaces are everywhere and technology had quite simply forced the human race to consider the evolution cycle in single lifespans as opposed to millennia. During the last 25 years we have done little to protect the charges we are responsible for, we have failed to secure systems, allowed financial attacks, infrastructure attacks, and now attacks directly against humans. At what point will we be able to stem the bleeding and actually take charge of our realm? Have we left it too late, or are we still able to claw back out of the abyss and face our adversary in a more asymmetrical defensive manner? Can we actually provide safety and security to our charges or will we continue to fail? And, critically, how do we communicate this, and educate a population that is content to watch from the sidelines, while they are being digitally eviscerated.
  • Modern Deception Technology: Advanced Methods for Reducing Cyber Risk Recorded: Jun 26 2019 61 mins
    Carolyn Crandall, Chief Deception Officer at Attivo Networks and Edward Amoroso, CEO of TAG Cyber
    Join host Carolyn Crandall, Chief Deception Officer at Attivo Networks, and special guest Edward Amoroso, CEO of TAG Cyber, to hear exclusive insights on how modern deception technology is being used for early and accurate threat detection, network visibility, and cyber risk reduction. Don't miss this interactive discussion based on a series of five articles that Ed created in order to help information technology professionals better understand modern deception technology.

    Key Takeaways:
    • Evolution and use of deception technology in the enterprise, with emphasis on practical cybersecurity requirements.
    • Insight into deceptive methods and how they are used to slow and create uncertainty for malicious actors.
    • How deception reduces the effectiveness of a cyberattack against network and system infrastructure.
    • Deployment and risk reduction in the modern enterprise.
    • A future vision for deception technology in the context of the evolving enterprise.
  • How to Use Deception to Defeat Your Adversaries Recorded: May 23 2019 61 mins
    Geoff Hancock, CEO of Advanced Cybersecurity Group; Tony Cole, CTO Attivo Networks
    Many organizations are still playing the slow game of chasing after the bad guys. They are trying to make the most of their budget, their tools, but unfortunately, the attacker still has the advantage.

    Times have changed and there is a better way. A better way to control what happens on your network- the way it should be.

    Deception-based cyber defenses are powerful tools. They are effective at decreasing dwell time, imposing costs, and otherwise distracting adversaries to give defenders the upper-hand.

    During this webinar, Geoff Hancock, CEO at the Advanced Cybersecurity Group, and Tony Cole, CTO at Attivo Networks, will discuss how using deception can get you inside the attacker's OODA loop, lead the adversary to make mistakes, and fortify your cybersecurity defenses.

    Key Takeaways:

    • Background of Denial and Deception and how it applies to the cyber realm
    • How the reverse OODA loop works
    • How cyber deception is implemented across the strategic, operational and tactical realms.
    • Use cases for Healthcare, Energy, IT, Telecom and more
    • What impact can deception have in changing the game for defenders long term
  • Deception Though the Eyes of a Forensic Researcher Recorded: Feb 21 2019 60 mins
    Dr. Peter Stephenson and Carolyn Crandall
    Dr. Peter Stephenson has 55 years of experience consulting and teaching in the cybersecurity space. He now spends his time researching and writing about cyber criminology, cyber jurisprudence, and cyber threat/intelligence analysis on large-scale computer networks. Join this webinar to learn more about his forensic research and why deception technology has proven to be instrumental within the security tool set he uses for forensic analysis and faster remediation to threats.

    This Q&A style webcast will be moderated by Carolyn Crandall, Chief Deception Officer at Attivo Networks and will dive deeper into advanced deception strategies for root cause analysis and faster response to threats. Don’t miss your chance to register now to find out why deception is not just about early detection but also arms the defender with automated attack analysis, endpoint forensics, and substantiated alerts for accelerated incident response.
  • Deception Technology: Fad or Fashion for 2019 and Beyond Recorded: Dec 10 2018 46 mins
    Carolyn Crandall, Attivo Networks, Chief Deception Officer
    Deception technology adoption soared in 2017 and 2018. Was this simply a fad or is deception coming into fashion as the de facto in-network detection security control?

    Carolyn Crandall, Chief Deception Officer at Attivo Networks will explore how deception has evolved, how it is impacting dwell times and how adversary intelligence gathering is being used to change the asymmetry of an attack and for more confident and automated incident response.

    During this informative speaking session attendees will learn:

    - How to differentiate deception solutions
    - Why and where to deploy deception
    - What the key factors fueling adoption are
    - What’s deception for Active Defense
    - What’s in store next for deception technology
Attivo Networks
Attivo Networks

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: A Hacker's Perspective: Where Do We Go From Here?
  • Live at: Jul 22 2019 5:00 pm
  • Presented by: Chris Roberts, Chief Security Strategist and Hacker, and Tony Cole, CTO
  • From:
Your email has been sent.
or close