Hi [[ session.user.profile.firstName ]]

Is AI Being Weaponized by Cyber Criminals?

As security threats and their defenses evolve, the role of AI, ML and Big Data continue to be a debate among threat intelligence experts. Are hackers really using AI to enhance their attacks? If so, what does this mean for the companies that have adopted this technology?

In this security webinar, CyberProof’s CEO, Tony Velleca, and VP Bruce A. Roton, debate what advanced capabilities hackers have today, how — or if — it’s evolving with the AI landscape, and what enterprises can do to defend themselves.
Recorded Apr 14 2020 42 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Tony Velleca, CyberProof CEO and Bruce A. Roton, CyberProof VP/Global Head of Customer Success
Presentation preview: Is AI Being Weaponized by Cyber Criminals?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Visibility Into the Vulnerabilities That Matter Aug 26 2021 3:00 pm UTC 56 mins
    Sean Keef, Skybox Security North American Technical Director, Sinu Peter, CyberProof Principal Security Architect
    With the influx of vulnerability alerts, fatigue sets in and it’s near impossible to weed through what is important and what can be automated. SOCs need the ability to classify asset criticality with threat intelligence.

    Join this discussion to learn how utilizing a single pane of glass view with API architecture, automation & orchestration to leverage existing security investments can remediate threats quickly to reduce the workload for the SOC team and prioritize remediation.
  • Migrating from on-prem to Azure-based threat detection and response Jul 28 2021 4:00 pm UTC 63 mins
    Sinu Peter - Principal Security Architect, Ben Chant - Security Evangelist
    As organizations migrate their workloads to the cloud, security teams are evaluating how the Microsoft Security Stack can help them to establish a hybrid security monitoring, threat detection and response capabilities that can secure both on-premises and cloud environments. But migrating to cloud-native security operations can also bring about new challenges that need to be addressed.

    In this webinar, we’ll provide guidance on how to address these issues, as well as the key considerations when adopting a cloud-native SOC with Microsoft including:
    • Transitioning from a legacy/on-premises SIEM to Azure Sentinel.
    • Effectively migrating existing -and developing new- log sources, rules, use cases, reporting, queries, connectors, and more.
    • Maintaining visibility of on-prem infrastructure.
    • Reducing threat detection and response times in Azure.
  • Smarter Security Operations with a Hybrid SOC Recorded: Jul 16 2021 20 mins
    Jaimon Thomas, Global Head Security Solutions and Sinu Peter, Principal Security Architect
    The security skills shortage isn’t going away. Yet simply outsourcing your security operations without full transparency won’t allow you to improve your own capabilities or maintain control. At CyberProof, we’ve developed unique technologies and processes that enable our clients to adopt a Hybrid SOC – a co-sourced delivery model, which places our advanced cyber defense capabilities alongside those of our clients without them losing control or visibility into day-to-day activities. In this session, you will how organizations can effectively adopt a Hybrid SOC with:
    • A single platform for co-sourced security operations
    • Where BOT meets human intelligence
    • Use Case Kits for Agile Detection and Response
    • From SLA to KPI-driven reporting

    What you will learn from this session:
    1. Learn how why organizations are moving away from traditional MSSP contracts to a Hybrid SOC model to harness next-gen SOC capabilities on a continuous basis
    2. Learn how to leverage the latest SOC technologies without the investment usually required
    3. See how we\'re enabling customers to get transparency into day-to-day activities of our analysts
    4. Discover how to integrate and orchestrate multiple siloed SOC technologies
    5. Learn how to collaborate in real time with both internal and external SOC stakeholders

    For more insights and information visit https://www.cyberproof.com/
  • How to Detect and Respond to Ransomware Recorded: Jun 8 2021 63 mins
    Niv David Pur, Senior Cyber Threat Analyst; Rob Forde, Service Definition Manager; Ben Chant, Security Evangelist
    In 2021, there has been a notable increase in Ransomware attacks against businesses across all sectors but particularly in critical infrastructure (such as the recent Colonial Pipeline attack), healthcare and IT service providers. Threat groups are leveraging supply chain vulnerabilities and outdated monitoring to gain an entry into the network and evade detection.

    In this webinar, we’ll cover:
    • Key Ransomware groups and techniques to be aware of
    • Why businesses are struggling to respond efficiently
    • Guidance on how to improve detection and response including
    o Preparing for a Ransomware attack
    o Prioritizing the most likely ransomware use cases
    o Reducing the incident dwell time
    o Efficiently refining Endpoint Security policies
  • The Inner Workings of Cyber Defenders Recorded: May 25 2021 56 mins
    Nethaniel Ribco, Sr. Cyber Threat Intelligence Specialist, Mark Vaitzman, Sr. Analyst
    Security threats are on the rise, and your SOC team may need to adapt quickly to collaborate and communicate across multiple teams. In this webinar, we’ll take you through three attack campaigns from 2020 using real examples of how different teams within CyberProof and our customers worked together - including L1 and L2 analysts, security engineers, incident responders and threat intel analysts - to mitigate these attacks.

    In this webinar, Nethaniel Ribco, Sr. Cyber Threat Intelligence Specialist, Mark Vaitzman, Sr. Analyst, and Ben Chant, Product Marketing Manager explore:

    - How the techniques used by various teams differed based on the type of attack, such as data leakage, dark web monitoring, and detection on the endpoint.
    - How to capture relevant data from both internal and external sources for reinforced learning and tuning of detection and response capabilities
    - The most effective methods for communicating across teams, increasing visibility of operations and collaboratively remediating incidents
  • How to Get the most from your EDR technology Recorded: Apr 28 2021 67 mins
    Arik Day - EDR Lead, Nils Haza - Sr Solutions Architect, Benjamin Chant - Product Marketing Manager
    You’ve invested in EDR technology – now how do you get the most from it?

    EDR is a powerful technology, but it can also be overwhelming to manage given the depth of raw data it collects such as execution processes, operating system activities, registry keys, memory activity, command lines and more. This data needs to be analyzed and put into the context of an incident.

    So what can you do to make this easier on your team and start seeing continuous return on investment? In this webinar, we will cover:
    • Staying on top of attacker techniques and your own infrastructure changes to customize endpoint security policies
    • Why using EDR for ongoing threat hunting is essential and how to do it properly
    • The importance of tuning detection rules to keep up with the changing threat landscape
    • Utilizing automated responses to maximize EDR capabilities
  • Making Microsoft Azure Sentinel Work For Your Security Operations Recorded: Apr 20 2021 62 mins
    Cyril Voisin Microsoft EMEA's Chief Security Advisor and Jaimon Thomas, CyberProof's Global Head of Security Solutions
    As more workloads are being migrated to the cloud, SOC teams are increasingly adopting Microsoft security technologies such as Microsoft Azure Sentinel and Microsoft Defender for Endpoint to natively protect these workloads. But this also brings about new challenges that need to be addressed such as:
    • Effectively migrating on-premise security monitoring infrastructures and log sources.
    • Maintaining and continuously optimizing analytic rules, playbooks, workbooks, hunting queries and integrations for automated responses.
    • Managing the costs of data ingestion into the cloud once you realize the volume of data being analyzed.

    In this webinar, CISO, Security Business decision makers, Security analysts, and Security Directors will be given guidance on how to address these issues, as well as the key considerations when adopting a cloud-native SOC with Microsoft including:
    • Breaking down the people, process and technology fundamentals.
    • Addressing the four key layers of a cloud-native SOC architecture.
    • The metrics and measurement of ‘SOCcess’.
    • Example of how Microsoft and CyberProof modernized a customer’s SOC to be cloud-native.
  • CISO Talks: Security Operations in the Finance Sector Recorded: Apr 13 2021 62 mins
    Adam Drabik, CISO | Sion Hughes, vCISO & Enterprise Risk Consultant | Jaimon Thomas, Head of Security Solutions & Services
    Organizations in the Finance industry are transforming their digital systems at a staggering rate but as a result are facing targeted threats on a daily rate from banking trojans such as Emotet or Cereberus to ransomware threats like NetWalker and supply chain attacks from nation-state threat actors.

    Given the technological diversification and dispersal in this industry, how can Finance organizations maintain the efficacy of their day-to-day security operations while keeping costs down?

    In this webinar, we’ll be speaking with two CISOs with background in the Finance industry to get their insights on how to overcome some of the most persistent challenges facing Security Operations teams, including:
    • How security operations can demonstrate reduction in business risk
    • Prioritizing where to augment you existing SOC function
    • Finding the right balance between insourced and outsourced security support
    • Ensuring ongoing visibility into vulnerabilities

    This will be followed by a Q&A session with our expert panel.
  • Getting the most from your EDR technology Recorded: Mar 16 2021 67 mins
    Arik Day - EDR Lead, Nils Haza - Sr Solutions Architect, Benjamin Chant - Product Marketing Manager
    You’ve invested in EDR technology – now how do you get the most from it?

    EDR is a powerful technology, but it can also be overwhelming to manage given the depth of raw data it collects such as execution processes, operating system activities, registry keys, memory activity, command lines and more. This data needs to be analyzed and put into the context of an incident.

    So what can you do to make this easier on your team and start seeing continuous return on investment? In this webinar, we will cover:
    • Staying on top of attacker techniques and your own infrastructure changes to customize endpoint security policies
    • Why using EDR for ongoing threat hunting is essential and how to do it properly
    • The importance of tuning detection rules to keep up with the changing threat landscape
    • Utilizing automated responses to maximize EDR capabilities
  • Collaborating With the Right Skills at the Right Time Recorded: Dec 15 2020 57 mins
    Doug Saylors, ISG Cyber Security Director, Tony Velleca, CyberProof CEO
    Why choose between making the necessary investments in staff and training or handing control to a third-party provider? Adopting a hybrid engagement model that allows you to augment your existing team with those skills that are hard to come by without the capital investment or losing visibility of day-to-day security operations.
  • Continuously Identify Threat Detection Gaps and Optimize Response Actions Recorded: Dec 9 2020 56 mins
    Bruce Roton, VP/Global Head of Security Strategy, CyberProof Ben Chant, Product Marketing Manager, CyberProof
    This session breaks down how to adapt detection and response processes in line with a changing threat landscape while measurably reducing risk. Learn to define your business’ response window of acceptable loss and identify gaps in your security by leveraging the MITRE ATT&CK framework and using automation to deploy tailored use cases consisting of prevention, detection and response controls.
  • Modernizing and Scaling Your Security in the Cloud, For the Cloud Recorded: Nov 24 2020 41 mins
    Ann Johnson, Corporate VP of Microsoft Security & ComplianceYuval Wollman, CyberProof President
    Security teams are struggling to reduce the time to detect and respond due to complexity and volume of alerts being generated from multiple security technologies. Now that workloads are being migrated to the cloud, this brings an additional perimeter which requires constant vigilance for early signs of a cyber attack but is extremely difficult to maintain due to its elastic nature and the constant provisioning of new services.

    Yuval Wollman welcomes Ann Johnson, Corporate VP of Microsoft Security & Compliance to provide an overview of how CyberProof’s strategic partnership with Microsoft is helping organizations to modernize their security monitoring, detection and response across their entire IT estate and reduce time and money with a cloud-scalable approach.
  • Reality Check on Global Security in Uncertain Times Recorded: Nov 18 2020 38 mins
    Tamir Pardo, XM Cyber President and Former Mossad DirectorTony Velleca, CyberProof CEO
    The only certainty in 2020 has been uncertainty; from exploits using COVID as bait, to ransomware, security professionals are doing their best to navigate as we look towards the year ahead.

    This session provides an overview on maintaining SOC efficiency when working from home, metrics SOCs should provide, and how taking advantage of cloud and automation are the path to agility in unpredictable times.
  • The CISO Playbook for Measurably Reducing Cyber Risk Recorded: Nov 12 2020 43 mins
    Tony Velleca, CEO of CyberProof and Howard Silverman, Head of Marketing at CyberProof
    Organizations have been forced – practically overnight – into remote workforce business models, expanding attack surfaces, and the growing complexity of cyber-attack techniques.

    As CISOs, we need to turn the dial from investing in point prevention solutions and trying to articulate what the value is afterwards - to identifying the business risks we need to mitigate first and then focusing on the primary attack scenarios that could cause those risks to happen.

    For organizations to defend themselves against an ever-changing threat landscape requires leveraging an Agile detection and response framework as a preventative control, while leveraging readily available tools like MITRE ATT&CK, NIST, and others.

    While cyber threats are growing, the skills gap is getting worse, yet the average cyber-security budget is staying the same. So, how do organizations do more with less?

    What You Will Learn About

    · Demonstrating security KPIs instead of SLAs
    · Using the MITRE ATT&CK framework to improve cyber defense
    · Assessing your security portfolio from a risk perspective
    · Developing a use case factory that allows you to optimize detection & response
    · Implementing a hybrid model that improves flexibility in resource allocation
    · Applying an Agile methodology to stay ahead in a changing threat landscape
  • Pro-Active Intruder Hunting – Part 2 Recorded: Oct 29 2020 50 mins
    Bruce Roton: CISSP, CISA, CISM, CIPP/US, C|EH, C|CISO, CRISC, ISO-27001, CGEIT, CSSGB(IT), ITIL, CSMCP
    In the last decade, it has been a common axiom of cyber security that it is not a question of if an organization’s defenses will be breached, but only of when. And while cyber-attacks and data breaches are always business disrupting, they can also be very costly. Therefore, Time to Detection and Time to Effective Respond have become critical measurements for the success of any organization’s cyber security program.
    This is the second webinar in a 2-part series where we'll delve deeper into the issues and processes of intruder detection, from first response through intruder eviction and remediation.
  • Focusing time, money and effort on the vulnerabilities that matter most Recorded: Oct 29 2020 48 mins
    Skybox VP of Channels - Mike Heredia, CyberProof UK - Craig Saunderson, Moderated by Howard Silverman
    Multi-layered security tools can be expensive with many struggling to understand how, or if, these investments are properly managing vulnerabilities and improving security posture. A threat-centric approach can help provide an accurate and continuous view of risk exposure to organizations.

    In this webinar CyberProof's Director of Cyber Security Sales, Craig Saunderson and Skybox Security's VP of Integrator Channels, Mike Heredia will discuss:
    • Common mistakes when trying to understand high risk vulnerabilities
    • How to prioritize vulnerabilities and speed up remediation efforts
    • What good vulnerability management should look like
    • How a threat-centric approach can help you get an accurate and continuous view of your risk exposure
  • Building a Smarter SOC in The New Normal Recorded: Sep 15 2020 64 mins
    Cyril Voisin, Sinu Peter, Moderated by Benjamin Chant
    Speakers are:
    Cyril Voisin
    Sinu Peter
    Moderated by Benjamin Chant
  • Introduction to Pro-Active Intruder Hunting - Part 1 Recorded: Sep 8 2020 48 mins
    Bruce Roton, CISSP, CISA, CISM, CIPP/US, C|EH, C|CISO, CRISC, ISO-27001, CGEIT, CSSGB(IT), ITIL, CSMCP
    It is a common axiom of cyber security wisdom that it is not a question of if an organization’s defenses will be breached, but only a question of when. Further, while cyber-attacks and data breaches are always business disrupting, they can also be very costly. Therefore, Time to Detection and Time to Effective Respond have become critical measurements for the success of any organization’s cyber security program. An effective and proactive Intruder Hunting Program, combined with a well-planned cyber response, can help stop cyber-attacks before they become business disrupting events, and should be a cornerstone of any Enterprise Cyber Security Program.
  • Using Automation and Data Analytics to Combat Increasing Cyber Threats Recorded: Sep 2 2020 49 mins
    Richard Telleria, Anand Trivedi, Halim Santoso, Abbas Kudrati
    With cyber threats increasing in quantity and complexity, what strategy should CISOs adopt in order to be prepared and protected from constant and new-age attack tactics?

    In this webinar CyberProof and Microsoft Australia security leaders will team up to discuss how the cyber security landscape has been altered due to COVID-19 and how using automation and data analytics can combat increasing cyber threats.

    Hear from security experts:

    Richard Telleria - Managing Director, UST Global
    Anand Trivedi - Head of Cyber Security Business, CyberProof
    Halim Santoso - Head of Business Development, Microsoft Australia
    Abbas Kudrati - CISO,CISM,CPDSE,CSX-P, Chief Cyber Security Advisor, Microsoft APAC
  • Best Practices Using Attack Simulations To Improve SOC Efficiency Recorded: Aug 18 2020 53 mins
    Gus Evangelakos, XM Cyber Director of Field Engineering, and R. Teall Rist, CyberProof Principal Security Architect
    When it comes to cyber attacks the speed in which you are able to respond is of equal importance as time to detect. While SIEM solutions improve visibility into attack paths, security teams also need to be able to continuously refine their cyber defense.

    In this webinar CyberProof's Principal Security Architect, R. Teall Rist will be teaming up with XM Cyber's Director of Field Engineering, Gus Evangelakos, to discuss how you can improve SOC efficiency using attack simulations to:

    - Identify new attack paths
    - Optimize and automate playbooks
    - Rapidly contain and eradicate validated threats
    - Ensure potential threats are understood within the context of your business
    - Continuously validate the exposure of an asset as attacker techniques and patterns change

    Join R. Teall Rist and Gus Evangelakos on August 18th to discover how your organization can expand detection coverage and remediate risks as they emerge. Register today!
A Smarter SOC
CyberProof is a security services company that intelligently manages your incident detection and response. Our solution provides complete transparency and dramatically reduces the cost and time needed to respond to security threats and minimize business impact. SeeMo, our virtual analyst, together with our experts and your team automates and accelerates cyber operations by learning and adapting from endless sources of data and responds to requests by providing context and actionable information. This allows our nation-state cyber experts to prioritize the most urgent incidents and proactively identify and respond to potential threats. We collaborate with our global clients, academia and the technology ecosystem to continuously advance the art of cyber defense.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Is AI Being Weaponized by Cyber Criminals?
  • Live at: Apr 14 2020 4:00 pm
  • Presented by: Tony Velleca, CyberProof CEO and Bruce A. Roton, CyberProof VP/Global Head of Customer Success
  • From:
Your email has been sent.
or close