How Prepared Are You For The Current Threat Landscape?
Data analysis from Europe published by Cynet, reveals that this wide quarantine creates unique cyber risks that attackers forcefully seize to launch attacks on multiple organizations, especially targeting employees working from home.
Join Anthony Roberts, Security Engineer at Cynet, as he shares:
The cyber risks that mass working from home entails.
Live threat data, showing spike in specific attack vectors.
Best practices on how to be best prepared and maintain your organisation secure.
RecordedMay 26 202036 mins
Your place is confirmed, we'll send you email reminders
At any moment, day or night, your organisation can be victimized by devastating cybercrime. You can’t predict when cyberattacks will happen, but you can use proactive incident response to quickly mitigate its effects or prevent them altogether.
The increase in remote workforce is extending the corporate “edge” to include the homes of employees, adding personal devices and networks to an already complex environment.
In this webinar, you'll hear how enterprise security executives globally leverage the platform to:
Secure their remote extended networks
Continuously validate their cyber defences with zero on-site access
Focus remediation only on breachable vulnerabilities
Regularly challenge their network against the MITRE ATT&CK framework
There is a wealth of information available in the MITRE ATT&CK framework, all of which can provide valuable insight to analysts during investigations and guide remediation actions. The current integration available out of the box includes:
Technique Details: How attackers are attempting to compromise your environment.
Mitigations: The steps you should follow to combat the attack.
Associated Intrusions: Related adversaries known to have used these attack vectors
Once downloaded from the Siemplify Marketplace, creating a playbook that collects this data for every case is a snap. Check out this short video for a step-by-step walk-through of the process of connecting your Siemplify SOAR platform to the MITRE ATT&CK framework.
Incorporating the MITRE ATT&CK Framework into your Siemplify Security Operations Platform delivers value from CISO down to the junior SOC staff. Analysts will no longer need to context switch (move from one system to another) to gain the insights available in the framework. Those insights are displayed with the case automatically. From a management perspective, maintaining and monitoring MITRE ATT&CK trends in your environment can highlight gaps that might exist in your security architecture. With this information, managers can make data-driven decisions, proposing ways to improve the SOC’s overall approach.
More time is what we all need, and with Siemplify and MITRE ATT&CK framework, you’ll start feeling more on schedule – or even ahead.
Endpoint security controls are an integral layer is required for effective protection against malware and other sophisticated cyberattacks. Although the cyberthreat landscape and hackers’ tactics are constantly evolving, basic IT security principles remain largely unchanged– the focus remains on prevention and protection.
When implemented correctly, endpoint privilege management can dramatically reduce your organisation’s attack surface, while helping to enhance the prevention, protection, and detection capabilities of your existing endpoint security solutions.
Amar Singh, James Cunningham, David Willis and Andrew Mcardle
Join our NHS Guest Panel hosted, by Amar Singh and James Cunningham, where we will be discussing the steps made to improve patient care through the strengthening of Cyber Resilience. We will look at the journey taken by a number of trusts to enhance visibility across all attack Vectors (Including clinical devices and IoT).
Amar and James will be joined by David Willis from Greater Manchester Health & Social Care Partnership and Andrew McArdle from Blackpool Teaching Hospitals.
Areas of discussion will include…
NHS Trusts and cyber challenges in their current environment
Improving threat detection and investigation capabilities
Bridging the growing cyber-skills gap and reducing the workload
Why Vectra was the chosen cyber solution across the North West Region
What benefits it brings during these unprecedented times
How it compliments existing Cyber tools for Automating response
You have to fill in this 5-page form if you want to install this app" said the cybersecurity officer. Sound familiar?
Cybersecurity is seen as a blocker by the average business user. Whether it's the annoying message about not being allowed to surf a perfectly legitimate website or the essay you have to write to justify your business-critical.
This is NOT to say that Cybersecurity is in the wrong here.
Join Ron Rasin, Jonathan Hope and Amar Singh, Global CISO as they discuss how you can maintain the balance between happy business users (not a common term, that) and joyful cybersecurity teams (yes, it is possible to make security people happy).
Some points of discussion:
– Technology and configurations to ensure maximum and transparent security
- Monitoring controls and tactical actions to silently uplift the security posture and more
We are here to support you this during this time. We are closely monitoring global developments of the coronavirus (COVID-19) outbreak. For details of the Radware Business Continuity Plan as it relates to this outbreak please join us for this webinar.
Amar Singh, David Lomax, Tim Condello and Martin Barrett
Believe us. Criminals do take holidays. Albeit rarely but they are humans and they need to chillax too. Why do we bring this up? It's a serious topic. You need to understand your threat actors, your attacker profile before (repeat, before) you plan your detection and response strategies. There is no point in you going on holiday when the criminal is most active?
All of this and more boils down to situational awareness of your threats, the geopolitical environment (think about what is happening during the COVID19 crisis) and the threat actors that are after our critical systems, IP and data.
Join Amar Singh and guests as they have a candid and constructive discussion about
- Why you MUST identify your threat actors
- How some of the FAMOUS or rather infamous criminal gangs have operated in the past
– What you can do to mitigate the threat and how you can achieve this.
"CloudGuard Dome9 is an innovative service that allows enterprises to easily manage the security and compliance of their public cloud environments at any scale across. Visualize and assess security posture, detect misconfigurations, model and actively enforce gold standard policies, protect against attacks and insider threat and comply with regulatory requirements and best practices.
Join us for a deeper insight into our Dome9 Cloud offering"
Managing disparate security systems can put a tremendous strain on your security operations team and jeopardize your company’s ability to protect against threats. Without a way to streamline the process for managing alerts, performing investigations and mitigating malicious activity, actions within the SOC can become siloed and broken.
FedEx manages a global, multi-vendor security technology stack and needed a better way to functionally tie all their tools together. Thanks to security orchestration, automation and response (SOAR), the shipping giant is now able to put meaningful alerts in front of their analysts, allowing them to rapidly contain events and grow overall security operations maturity.
During this case study webinar, we will explore:
A situational analysis of what FedEx’s SecOps were like before SOAR.
How SOAR has impacted security operations.
How the company’s bottom line has benefited.
Amar Singh, Pascal Geenens, Steve Armstrong and Jon Garside
Put your hands up if you think scanning and protecting all your critical assets should be at the top of your critical to-do list? Now here is the challenge and opportunity.
We know that protecting critical assets is important. However, you know it's not an easy task. There are so many obstacles to getting it right, climbing mount Everest may be easier (all right not that easy to climb the Mount, but you get the point)
- Possibly found a major vulnerability, but hey, you are not allowed to fix it.
- Not enough licenses to scan or monitor the devices - Inability (or even incompatibility) to scan all the clouds (the AWS, Azure)
- Simply too much data - all the scanning and monitoring just creates more work There are many more but you get the point.
Join Amar Singh as he gets Steve Armstrong, Jon Garside and Pascal Geenens to share their insights on actionable steps you can take to solve the above-highlighted problems and deliver real value when it comes to monitoring and protecting critical assets
We will review the concept of automated penetration testing, seeing how it works and how it can prepare your business for the next malicious cyber attack.
Understand the true hacker’s perspective in hacking
A threat-based method of setting the right remediation priorities
How to avoid threat and vulnerabilities false-positives
The path to reaching consistent cybersecurity posture year-round
How to justify cyber security expenses and investment based on threats
Proper data security begins with a strong foundation. Find out what you’re standing on with a deep-dive into the security of your Structured and Unstructured Data, Active Directory, and Windows infrastructure.
Marcus Hatwig, John Mancini, Chris Morales and Tim Wade
Cloud paradigms bring new attacks and new data sources for threat hunting and forensics. Traditional tools are often ill-equipped to deal with the rapid changes in cloud deployments. This makes it impossible to address vital use cases that involve threat hunting, investigations, or custom tools and models. In this webcast, we will cover how modern security teams use machine learning to enrich both network traffic and logs with attributes specifically for cloud environments. Giving them the tools needed for comprehensive threat hunting.
In this webcast we will discuss:
How cloud telemetry differs from internal network
How attackers leverage new attack vectors in the cloud
Why traditional tools are unable to adapt to cloud deployments
How Vectra empowers security professionals and ties into their existing workflows
PROACTIVELY PROTECT YOUR MOBILE APPS TO PREVENT CUSTOMER DATA COMPROMISE
Apps have won mobile. Smartphone apps now represent 60% of all time spent online. However, while mobile apps bring new conveniences, such as mobile check deposits, they also introduce new risks in the form of mobile security threats such as mobile banking trojans that steal login credentials and jailbroken/rooted devices that leave them vulnerable to data compromise.
Leveraging data from our sensor network of over 170 million mobile devices worldwide, Lookout can detect security threats and risks with the potential to lead to a breach of customer data, and prevent access before customer data is compromised
There are no two ways about it when it comes to sophisticated attackers. Cybercriminals love free lodging. A good criminal (smart ones rather) seek the longest dwell time possible. Why? Simply put, the longer they stay in your laptops, in your networks and in your servers the more juicy and critical data they find.
Guess what - there are more than a 100 technical means for cyber-attackers to achieve theirs.
Join Amar Singh, Global CISO and security specialists Anthony Roberts and Burak Agca as they discuss how you should go about detecting and eradicating resident cybercriminals. Some talking points include
- Some recent examples of how criminals are achieving their target of longevity (a must-listen)
- What do you do is BAD is baselined - again a very important topic to get your head around.
DevOps and continuous delivery models result in agility and faster time-to-market. However, development, QA, and operations teams face challenges when it comes to incorporating security into the product life-cycle. They are afraid of slowing things down, entering the need for integrated DevSecOps best practices. Security approaches that worked in the past do not work with modern DevOps development and deployment models. As an example, any security risks or issues mostly involved manual review processes at the end of the product development and QA. Any security risks or issues identified were then sent back to development, causing significant delays. This approach does not scale with modern day applications.
Deploy new applications at the speed of business without jeopardizing your security posture. Only Check Point offers you automated full lifecycle security for your modern day applications.
Here are some myths we hear about the Cloud everyday Myth
1 - The Cloud is deeply insecure
Myth 2 - The Cloud offers amazing security (yes, we hear both of these)
Myth 3 - The Cloud makes it easier for users to steal sensitive data (email, file shares) as they can access it from anywhere
Myth 4 - Public Cloud is like the wild-west where developers play and leave their expensive toys behind The reality is that today's advanced technologies allow us to rewrite the above statements to ensure that any cloud journey, whether it’s an organisation migrating to Office 365, One-drive and or adopting the likes of AWS cloud infrastructure to optimise their expenditure on servers and database infrastructure.
All of these journeys can be safe and secure.
Join Amar Singh, Global CISO, Stuart Green and Richard Walters as they redefine the myths and share some real live examples of the art of the possible.
At Core to Cloud we pride ourselves on being a different type of solutions provider. We have in-depth industry experience, with a strong focus on security, compliance and the cloud. This channel is for anyone who is passionate about Cyber Security and how we can better equip ourselves.
Whether you’re looking at ways intruders can get into your network, the security of your devices, the safety of your data or offering training to make your team a stronger line of defence – we’ve trialled the best technologies on the market in a variety of environments.
Our channel will include educational panel debates, industry expert speakers, our customer reviews, technology demos and much more. We hope you enjoy our channel - a place for us all to learn from each other.