Hi [[ session.user.profile.firstName ]]

Anatomy of a Hack: Internet Age Criminals

As an InfoSec practitioner, you’ve chosen to use the light side of the “force”… But there is also a dark side…

The good news is, some people very successfully use that dark side to further InfoSec practices as ethical hackers.

Just like Anakin Skywalker tried to use the dark side of the force to keep Padme alive, except without being burned to a crisp or ending up in a suit with a breathing regulator.

Shhhh, Wooosh… Shhhh, Wooosh… OK, OK - I digress.

We’ve put together a live webinar on January 28 at 2:00pm EST with Kip Boyle, CISO for both technology and financial services companies and a cybersecurity consultant at Stanford Research Institute.

Boyle will explore what it’s like behind “Darth Vader’s mask”—and explain how you can turn those nefarious smarts to craft your own IT security defenses amidst the chaos brought about by the latest hackers.

Over the next couple of emails, we’re going to tell you some of Boyle’s mind-bending stories and show you why you should carve out time in your calendar for this live event.

Register today to claim your spot!
Recorded Jan 28 2020 56 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Kip Boyle, CISO for both technology and financial services companies and a cybersecurity consultant at Stanford Resear
Presentation preview: Anatomy of a Hack: Internet Age Criminals

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • How to Apply an Integrated Approach to Threat Detection Apr 16 2020 5:00 pm UTC 75 mins
    Jon Goldman, Check Point Software Technologies and Cade Colston, IRONSCALES
    This live talk will examine the evolution and current state of email security, provide real-world use cases, explore IRONSCALES and Check Point’s threat detection solutions and the advantages of our combined best line of defense capabilities to help solve the daily email security challenges faced by SOC teams.
  • One Phish. Two Phish. Red Phish. Blue Phish. Mar 31 2020 5:00 pm UTC 75 mins
    Elise Manna, Director of Threat Operations at Novacoast and Ian Baxter, Vice President of Pre-Sales Engineering at Ironscales
    This live talk examines the evolution of phishing and the ongoing challenges for security teams managing this #1 threat vector. Elise Manna, Director of Threat Operations at Novacoast and Ian Baxter, Vice President of Pre-Sales Engineering at Ironscales, dissect the true dangers of phishing, provide real-world current use cases and help InfoSec practitioners learn about practical solutions that provide mailbox-level BEC & anomaly detection, and more.
  • Compromise. Hijack. Impersonation. Phishing. Scams. Email Security. Oh my! Recorded: Mar 4 2020 55 mins
    Professor Steven Furnell, University of Plymouth, UK
    Email-based threats can now arrive in many guises, from the basic scam spam, to targeted approaches that involve technology compromise.

    This talk begins by looking at the range of related to which end-users are exposed, with a particular focus upon those linked to social engineering and behavioral manipulation.

    It then proceeds to consider the extent to which technology can provide a safeguard, drawing upon recent research findings focusing upon phishing and scam detection by webmail services.

    The results highlight the significant need for a more holistic approach, and the key role of user awareness and vigilance in preventing exploitation. Suggestions are consequently offered in relation to supporting users so that they don’t fall victim to scams or feel like victims of the attempts to help them.
  • Anatomy of a Hack: Internet Age Criminals Recorded: Jan 28 2020 56 mins
    Kip Boyle, CISO for both technology and financial services companies and a cybersecurity consultant at Stanford Resear
    As an InfoSec practitioner, you’ve chosen to use the light side of the “force”… But there is also a dark side…

    The good news is, some people very successfully use that dark side to further InfoSec practices as ethical hackers.

    Just like Anakin Skywalker tried to use the dark side of the force to keep Padme alive, except without being burned to a crisp or ending up in a suit with a breathing regulator.

    Shhhh, Wooosh… Shhhh, Wooosh… OK, OK - I digress.

    We’ve put together a live webinar on January 28 at 2:00pm EST with Kip Boyle, CISO for both technology and financial services companies and a cybersecurity consultant at Stanford Research Institute.

    Boyle will explore what it’s like behind “Darth Vader’s mask”—and explain how you can turn those nefarious smarts to craft your own IT security defenses amidst the chaos brought about by the latest hackers.

    Over the next couple of emails, we’re going to tell you some of Boyle’s mind-bending stories and show you why you should carve out time in your calendar for this live event.

    Register today to claim your spot!
  • An Arms Race for Cyber Superiority Recorded: Dec 18 2019 56 mins
    Peter Schawacker, Managed Detection & Response, Agio | Ray Hillen, CyberSecurity, Agio | Eric Favetta, Fordham University
    With thousands of successful ransomware attacks perpetrated across the globe every day, holding data for ransom has become a lucrative act for cybercriminals, and a major security concern for organizations… just ask Louisiana’s Office of Motor Vehicles.

    And considering damage related to cyber crime set to hit $6 trillion by 2021, according to Cybersecurity Ventures, it’s probably a good time to review your incident response program.

    Our panel of three leading cybersecurity experts will engage you in a lively discussion on 12/18 at 2:00pm EST for an in-depth strategy to improve your overall incident response program using real-world cases.

    • Peter Schawacker, CISSP, CISM and CISA, Managing Director, Managed Detection & Response, Agio
    • Ray Hillen, Managing Director of CyberSecurity, Agio
    • Eric Favetta, Fordham University

    This live broadcast is guaranteed to give you a fresh perspective on how you can improve your program around incident response because you never know who’s lurking on the other end of your keyboard.

    Let’s do this on Wednesday, December 18 at 2:00pm EST.

    Morgan, S. 2019. Cybercrime Damages $6 Trillion By 2021.Cybercrime magazine. November 21, 2019. https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/
  • Your Email Security is Ineffective and Getting Worse Recorded: Nov 5 2019 38 mins
    Derek E. Brink, CISSP, VP and Research Fellow at Aberdeen Group and Ian Baxter, Director of Engineering at IRONSCALES
    Cybersecurity isn’t fair.

    It’s generally understood that in their ongoing battles, highly focused and financially motivated attackers need to be successful only once, but enterprise defenders need to be successful every time.

    In email security, it’s even worse than that.

    Derek Brink, VP and Research Fellow at Aberdeen Group and Ian Baxter, Director of Engineering at IRONSCALES, analyze empirical data from leading email security solution provider, IRONSCALES, which illustrates the incredible leverage currently enjoyed by attackers.

    Tune in to this illuminating presentation on the email security landscape and see how you're systems compare.
  • Norman Marks: How to Avoid this Four-Letter Word Recorded: Oct 22 2019 61 mins
    Norman Marks, CPA, CRMA, OCEG Fellow, Author, Thought Leader, Honorary Fellow of the Institute of Risk Management
    Risk.

    The meaning of this four-letter word is extensive.

    And means something different to different IT Security practitioners.

    But there’s one common thread: taking a business-first approach to technology risk. If this is something you’re struggling with, grab a seat for our live webinar on October 22 at 2:00pm EDT with renowned GRC expert, author and though leader, Norman Marks leading the discussion.

    You might not be able to avoid using this four-letter word, but IT risk must be an ongoing business conversation.

    Are you in?
  • The Seven Essentials of a Modern Email Security Platform Recorded: Sep 18 2019 41 mins
    Ian Baxter, Director of Engineering, IRONSCALES
    Did you know that with the right machine learning and AI models built into a human-centric platform, your organization can now reduce the time from phishing attack detection to response from days to just seconds?

    While most businesses continue to rely on static secure email gateways (SEGs) or the baked-in security of email service providers, the evolution of the email threat landscape, the high-rate of micro-targeted attacks and the speed at which threat intelligence must be consumed, have significantly reduced the effectiveness of both types of solutions.

    Ian Baxter, DIrector of Engineering at an Israeli cybersecurity firm, IRONSCALES, will dive into the specifics of advanced threat protection that uniquely combines human intelligence with machine learning and AI to automatically prevent, detect and respond to advanced email threats and predict future attacks.
  • CISOs @ 2019 Black Hat Weigh In On What Trust Means Recorded: Aug 19 2019 3 mins
    David Spark, Producer and Co-host of the CISO/Security Vendor Relationship Series and owner of Spark Media Solutions
    David Spark, tech journalist, interviews CISOs at the world's leading information security event, Black Hat about what trust means to them.

    Watch this intriguing video sponsored by IRONSCALES and see who lines up with your thinking around trust.

    Who do you trust?
  • The Evolution of Email Security Video Series, Part 1 Recorded: Aug 16 2019 3 mins
    Eyal Benishti, CEO, IRONSCALES
    Israeli cybersecurity firm, IRONSCALES, takes a rare retrospective look into how the most common communication tool evolved since Invented by Ray Tomlinson in the 1960s.
The Power of Now
IRONSCALES is the future of phishing protection, incubated inside the world’s top venture program for cybersecurity and founded by alumni of the Israel Defense Forces’ elite Intelligence Technology unit. We offer security professionals and end users an AI-driven, self-learning email security platform that provides a comprehensive solution to stop tomorrow’s phishing attacks today.

Using the world’s most decentralized threat protection network, our platform accelerates the prevention, detection and remediation of phishing attacks already inside your email with threat removal times in seconds, not minutes or hours. We give organizations of all sizes complete anti-phishing protection against any type of phishing attack, right now. Visit www.ironscales.com to learn more about The Power of Now.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Anatomy of a Hack: Internet Age Criminals
  • Live at: Jan 28 2020 7:00 pm
  • Presented by: Kip Boyle, CISO for both technology and financial services companies and a cybersecurity consultant at Stanford Resear
  • From:
Your email has been sent.
or close