Hi [[ session.user.profile.firstName ]]

Zero Trust Execution Strategy

The industry is quickly shifting to a Zero Trust Execution strategy. What does this term mean and how can you apply it to your Cloud Workload Protection strategy? Attend this session to learn more
Recorded Aug 5 2020 12 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Justin Bradly
Presentation preview: Zero Trust Execution Strategy

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • A Guide to the TTPs Matrix for Linux Cloud Servers Oct 14 2020 3:00 pm UTC 45 mins
    Justin Bradly
    There are nearly 100 ways an attacker can launch a cyber attack on your Linux cloud servers. This makes securing the infrastructure a formidable task even for the most adept security team. The question becomes: What risks can be prioritized?

    Intezer’s new TTPs matrix for Linux cloud servers is helping security personnel identify current gaps in their defenses’ coverage against the different threats that target this infrastructure. Among the TTPs listed, unauthorized code and commands at runtime are universal. Protecting the runtime environment is both an important last line of defense and one of the first steps you can take to reduce risk.

    This webinar will highlight key takeaways from the matrix and explain what steps you can take immediately to reduce risk and protect your organization from being the next victim of a high-profile breach.

    Topics covered:
    • Covering the basics of the TTPs matrix for Linux cloud servers.
    • How recent cloud attacks have emphasized the need for adopting a Zero Trust Execution approach to secure workloads against unauthorized code and commands.
    • What you can do tomorrow, with a focus on single controls, to mitigate many of the TTPs on the matrix.
  • Watch Your Containers: Doki Infecting Docker Servers in the Cloud Recorded: Aug 11 2020 55 mins
    Shaul Holtzman, Nicole Fishbein
    Doki is the latest high profile attack actively infecting misconfigured Docker servers in AWS, Azure, and other cloud platforms. Anyone with publicly open Docker API access is at high risk to be hacked due to the attackers’ continuous internet-wide scanning for vulnerable victims.

    The malware used in this attack is a fully undetected backdoor. It has managed to stay undetected for over six months despite being uploaded to VirusTotal several months ago.
    In this webinar, understand how this attack is being conducted and ways to prevent Doki from infecting your containerized environments in the cloud.

    You will learn:

    1. How this attack is using a previously undocumented technique
    2. Immediate action items required of container server owners
    3. Understand why the industry is adopting Zero Trust Execution to secure cloud workloads
  • Zero Trust Execution Strategy Recorded: Aug 5 2020 12 mins
    Justin Bradly
    The industry is quickly shifting to a Zero Trust Execution strategy. What does this term mean and how can you apply it to your Cloud Workload Protection strategy? Attend this session to learn more
  • Protecting Containerized Workloads against Kaiji and Emerging Threats Recorded: Jul 20 2020 45 mins
    Paul Litvak, Shaul Holtzman
    Kaiji is our researchers’ latest discovery, written from scratch using Go programming language to target IoT devices and Linux-based servers. Instead of relying on exploiting unpatched flaws, this botnet spreads exclusively through brute-force attacks against publicly accessible SSH servers.

    Kaiji has been in the news recently infecting unsecured Docker servers to then carry out DDoS attacks. Docker servers, which are a type of containerized workload, are relatively convenient to deploy in the cloud, making them an increasingly popular choice for enterprises but also an attractive target for attackers.

    In this webinar, we will present an analysis of the Kaiji malware and explain how to protect your containerized workloads against this botnet and other emerging Linux threats.

    You will learn:
    1. Why monitoring the runtime environment is the key to preventing most cyber attacks on your cloud infrastructure
    2. How to protect your cloud workloads against Kaiji and other emerging threats
  • DevOps and Security -Have We Shifted Too Far Left ? Recorded: Jun 30 2020 53 mins
    Itai Tevet, CEO of Intezer , Matt Hollcraft, CISO of Hellman & Friedman, Hussein Syed CISO of RWJBarnabas Health
    The “Shift Left” movement has redefined the roles and responsibilities of security teams, software development teams and infrastructure teams.

    Has this enormous change positively or negatively impacted security teams? Is it possible that we have shifted too far left?

    Join experts Matt Hollcraft, CISO of Hellman & Friedman, Hussein Syed CISO of RWJBarnabas Health, and Itai Tevet, CEO of Intezer in this webinar which will explore the DevOps/security relationship, discuss the need for creating independence and review potential solutions for security teams.
  • Genetic Analysis vs. Fully Undetected Linux Threat Recorded: Jun 25 2020 54 mins
    Paul Litvak, Shaul Holtzman
    The Linux operating system accounts for nearly 90 percent of all cloud servers. With companies increasingly storing their most sensitive information on the cloud, we expect that Linux threats will pose a significant risk to enterprise security in the near future. Attend this webinar to see how we apply code reuse analysis to the world of runtime Cloud Workload Protection and incident response
  • Build a Robust App Control Strategy for your Cloud Workloads Recorded: Jun 2 2020 58 mins
    Itai Tevet, CEO at Intezer
    The use of application control (also known as whitelisting) is considered to be a robust and essential Cloud Workload Protection strategy largely due to the high predictability of cloud environments.

    But it does not prevent all cyber attacks. Attackers can exploit vulnerabilities in trusted applications or utilize whitelisted apps for malicious intent—referred to as “Living off the Land.” App control also presents some operational headaches, requiring strict and often unrealistic policies.

    This webinar explains how to build a robust application control strategy that is informed by these challenges. Learn what capabilities you should consider when evaluating a Cloud Workload Protection Platform (CWPP).
  • Cyber Threat Spotlight Linux APTs Recorded: May 29 2020 9 mins
    Paul Litvak
    Malware analyst Paul Litvak discusses APTs targeting the Linux ecosystem and offers mitigation recommendations
  • Linux Threat Landscape Recorded: May 29 2020 60 mins
    Shaul Holtzman, Nacho Sanmillan
    The Linux threat ecosystem is crowded with IoT DDoS botnets and crypto-mining malware. With low detection rates in nearly all leading antivirus solutions, Linux threats pose new challenges to the information security community that have not been observed in other operating systems.
  • IoT Cyber Attacks and Proactive Security Recorded: Jan 29 2019 56 mins
    Moshe Shlisel, Udi Solomon, Ari Eitan, Guy Dagan
    The Internet of Things is set to reach 50 billion connected devices by 2020, according to a recent Cisco report, making them an attractive target for cyber criminals who can easily use them get inside networks of organizations worldwide. Once in, attackers can easily take over and control IP-enabled devices to extract data or implant malicious code.

    Join IoT and security experts to learn more about:
    - Unique challenges of securing IoT systems
    - IoT and AI: Threats, attack trends and recommendations for basic cyber hygiene
    - Proactive security strategies to stave off the threat of IoT cyber attacks

    Ari Eitan, VP of Research, Intezer
    Udi Solomon, CEO & Co-Founder, ShieldIoT
    Moshe Shlisel, CEO and Co-Founder, GuardKnox
    Guy Dagan, Cofounder and Partner, Consienta
Defend your cloud servers in runtime
Revealing the "genetic" origins of software, Intezer introduces a new way to detect and respond to cyber threats. Intezer offers enterprises an advanced solution to detect modern cyber attacks, with deep context for effective incident response. For more information, visit www.intezer.com or follow the company on Twitter at @IntezerLabs.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Zero Trust Execution Strategy
  • Live at: Aug 5 2020 3:00 pm
  • Presented by: Justin Bradly
  • From:
Your email has been sent.
or close