Hi [[ session.user.profile.firstName ]]

Seeing the Attacker’s View: A People-Centric Approach to Security Discussion

It’s no secret that modern attackers have pivoted to targeting people, largely via simple phishing emails. A simple internet search can tell them all they need to know about who has access to the system or data they are targeting.

You likely know that email fraud, or BEC, is costing organizations billions of dollars. But do you know why these attacks continue to reach new levels of success?

Join this session as we discuss how you can identify your most attacked and riskiest users, understand how they are being attacked and design better strategies and protections to prevent these attacks being successful and minimise your cybersecurity risk.
Recorded May 18 2021 48 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Richard Davis, Cyber Security Strategist, Proofpoint & Dominic Trott, UK Product Manager, Orange Cyberdefense
Presentation preview: Seeing the Attacker’s View: A People-Centric Approach to Security Discussion

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Simplifying Data Security in the Cloud Jul 8 2021 7:30 am UTC 45 mins
    Cunal Anand, CTO, Imperva, Dominic Trott, Product Manager, Orange Cyberdefense UK
    The cloud has revolutionized IT, offering organizations strategic opportunities to rapidly pursue new market initiatives and adapt their operations in the face of new business challenges. However, concerns about security risks and regulatory compliance are major issues that slow progress towards cloud transformation. Organizations struggle to maintain security posture across their growing database ecosystem as it expands to database as a service (DBaaS), infrastructure as a service (IaaS) and multi- and hybrid-cloud environments.

    Please join us in a discussion about how Imperva helps organisations overcome these barriers to more fully realize the transformational potential of the cloud. In this webinar, you’ll learn:

    • How organisations struggle to maintain security while trying to embrace the benefits of the cloud
    • Limitations of traditional database security techniques within a diverse modern data environment
    • How Imperva’s data-centric security platform provides unified security and compliance management across an organisation’s full database landscape
    • Best ways to leverage existing investments in traditional database security technologies as organisations move forward into the cloud
  • Seeing the Attacker’s View: A People-Centric Approach to Security Discussion Recorded: May 18 2021 48 mins
    Richard Davis, Cyber Security Strategist, Proofpoint & Dominic Trott, UK Product Manager, Orange Cyberdefense
    It’s no secret that modern attackers have pivoted to targeting people, largely via simple phishing emails. A simple internet search can tell them all they need to know about who has access to the system or data they are targeting.

    You likely know that email fraud, or BEC, is costing organizations billions of dollars. But do you know why these attacks continue to reach new levels of success?

    Join this session as we discuss how you can identify your most attacked and riskiest users, understand how they are being attacked and design better strategies and protections to prevent these attacks being successful and minimise your cybersecurity risk.
  • Security Navigator 2021 Recorded: May 18 2021 63 mins
    Charl van der Walt, Diana Selck-Paulsson, Wicus Ross - Threat Researchers
    Have you downloaded your copy of the Security Navigator? Would you like to better understand the data and get your most burning questions answered by our researchers and on the ground experts?

    In this session, the Orange Cyberdefense UK Product and Marketing Director, Stuart Reed, will moderate a panel of “threat” experts to deep dive into the most intricate findings of our recently published report.

    Charl van der Walt, Head of our Security Research Center, together with members of his team, Wicus Ross and Diana Selck-Paulsson will take you through the research and the threat model which they, together with colleagues from other countries have developed thanks to 100% first-hand intelligence obtained from the 17 global SOCs and CyberSOCs of Orange Cyberdefense globally.

    You’ll also be able to learn more about the attack patterns and statistics for your business size and vertical, as well as what the disruption events were for 2020 and how they may project into the future.
  • SolarWinds: when faced with the inevitable, embrace a new way of thinking Recorded: May 13 2021 60 mins
    Charl van der Walt, Nicolas Arpagian
    SolarWinds did not come out of the blue and should not be regarded as such. SolarWinds is the inevitable consequence of a powerful set of systemic factors that collectively produce a climate that is inherently volatile but can still be predicted.

    So, what is the real cost of this incident? Who is the real victim?

    In this session, Charl van der Walt, Head of Security Research and Nicolas Arpagian, Director of Strategy & Public Affairs, will explore the real causes and implications of this incident and why businesses, who don’t know if they have been impacted, should not ignore the signals and instead embrace a new way of thinking and approaching security.
  • Automation Isn't Rocket Science Recorded: May 12 2021 58 mins
    Matt Rhodes, Patrick Bayle, Alex Shearer, Dominic Trott
    This cyber panel session is focussed on discussing the true business benefits of Cortex XSOAR including a deeper discussion around:

    - How businesses are operationalising security automation - real world examples
    - How automation helps leverage existing infrastructure & tools
    - Methods to help investment justification for automation platforms



    This cyber panel session is focussed on discussing the true business benefits of Cortex XSOAR including a deeper discussion around:

    How businesses are operationalising security automation - real world examples
    How automation helps leverage existing infrastructure & tools
    Methods to help investment justification for automation platforms

    Speakers:
    Matt Rhodes, Regional Sales Manager - Cortex, Palo Alto Networks

    Patrick Bayle, Systems Engineer Specialist - Cortex, Palo Alto Networks

    Alex Shearer, Sales Manager - Major Accounts, Orange CyberDefense

    Dominic Trott, UK Product Manager, Orange CyberDefense
  • How to manage identity in a multi-cloud journey Recorded: May 12 2021 17 mins
    Cyril Alcover
    Let's examines the main challenges when it comes to use hybrid cloud environments, especially the paradigm evolution that forces to go beyond the traditional security layers and build a modern zero trust security architecture. Here is why the capabilities to face advanced identity threats becomes a hotspot for business continuity, and how such approach can give a significant advantage through faster decisions and better attack understanding.
  • SASE - Simplifying your network security architecture for the future Recorded: Apr 20 2021 19 mins
    Peter Mesker
    Organisations are shifting more and more services to the cloud; their workforce is dispersed, and the complexity of the current network centric security architecture becomes the inhibitor for the digital business needs.
    Let’s state that “The internet is the new corporate network”. What does that mean for the required network security architecture?

    Peter Mesker will give his opinion and advice on creating the network security architecture for the future based on his many years of experience in this field and combined with frameworks and methodologies from analyst and the market.

    The realisation of an adaptive network security architecture of the future is a process of evolution that starts with understanding and commitment of all involved parties within an organization and define the desired architecture blueprint. The goal should be to reach a superb user experience, operational efficiency, uniform security policies and a continuous improvement to get a bit safer every day. There is no one-size fits all architecture to consume off the shelf.
  • The journey to secure your IT/OT convergence Recorded: Apr 19 2021 62 mins
    Jean Christophe Mathieu, Anastasiya Kornitska, Oscar Gumaelius, Stephane Desmyter
    The increased dependence on digital connectivity across an operating environment is pushing the need for organizations to define a strategy for Information Technology (IT) and Operational Technology (OT) convergence and of course of its security.

    Due to separate functions, IT and OT worlds have historically existed in siloes – OT is about control and command of industrial assets, while IT is steeped in enterprise systems. From a governance perspective more and more C-levels require IT staff to secure OT systems. Alignment between these two worlds, using entirely different sets of technologies and tools without any appropriate communication, remains a main challenge to ensure a successful cybersecurity transformation.

    Hear different perspectives on how to drive IT-OT alignment in your cybersecurity projects by using concrete tools and methodologies for both and by implementing best practices and establishing the lines of communication between the two worlds.

    An overview of the OT/IT convergence environment
    How to assess the risk of your OT environment
    Find out where your assets are and how they are interconnected
  • Network Security in the Age of Remote Working Recorded: Apr 15 2021 64 mins
    Kalani Enos, Kenos Technologies | Mike Ichiriu, Zentera | Mike Grimshaw, Moovweb | Robinson Delaugerre, Orange Cyberdefense
    The pandemic and the shift to remote working has strained networks and pushed organizations to speed up their digital transformation journeys. With more users on the network than ever before, security has become a key priority.

    Discover how organizations are addressing the security challenges of remote working and the latest trends in network security.

    Join this panel of security experts and industry leaders to learn more about:
    - The impact of COVID on networks and security
    - The emergence of secure access service edge (SASE)
    - The need for smart network monitoring technology
    - New and old threats, and common vulnerabilities
    - Lessons from the SolarWinds hack
    - Best practices and recommendations for strengthening security in 2021


    Kalani Enos, Kenos Technologies
    Mike Ichiriu, VP, Zentera
    Mike Grimshaw, Sre & Security Manager, Moovweb
    Robinson Delaugerre, Investigations Manager (Computer Security Incident Response Team), Orange Cyberdefense
  • Building a Threat Detection Framework for the future Recorded: Apr 15 2021 43 mins
    Grant Paling, Product Manager, Orange Cyberdefense
    When it comes to building or updating your strategy for detecting threats to your business, it is important to know the direction you are headed in.

    Many Managed Detection and Response providers align themselves to a very short term strategy that would appear to solve all of your problems, when in fact what is needed is a more pragmatic approach that helps model out the different options you have for gaining visibility and also allowing for an understanding of the impact of limitations specific to your environment (for example a missing data or security event types).

    Join our Global Service Area Owner for Managed Detection and Response, Grant Paling, for an insight into how to build a strategic plan for improvements in security monitoring.

    Key takeaways:

    • Understand the different options for getting started with detection and response (including endpoint, log and network-based approaches).

    • Learn how they differ and the pros and cons of different approaches.

    • Find out how to model the impacts on visibility when choosing different approaches, and balancing that out against the time to value

    • See examples of where we’ve used our Threat Detection Framework to build business cases for expansion and to illustrate the impact caused by challenges from non-security parts of the business.
  • Understanding the nuts and bolts of Microsoft 365 security - World 2020 Recorded: Apr 14 2021 22 mins
    Gregory Scola-Grimaldi
    Grégory Scola-Grimaldi and Rodrigue LeBayon will talk about Orange Cyberdefense's market vision and more specifically about Microsoft's security strategy on its flagship tool Microsoft 365.
    During the coronavirus crisis many customers decided to migrate thousands of mailboxes to Office 365 without worrying about security.
    During this presentation, we propose to remind you of the security solutions included in Microsoft 365 with a focus on Sentinel.
  • COVID-19 A biological hazard goes digital Recorded: Feb 22 2021 67 mins
    Charl van der Walt
    As the COVID-19 coronavirus pandemic continues to spread worldwide, cyber threat actors are trying to capitalize on the global health crisis by creating malware or launching attacks with a COVID-19 theme.

    However, this kind of exploitative behaviour by the cybercrime ecosystem is only one part of a bigger cybersecurity picture. Orange Cyberdefense published a paper and recorded a webinar about it in order to draw attention to a diverse set of considerations that should be made now.
  • How to manage identity in a multi-cloud journey Recorded: Feb 19 2021 17 mins
    Cyril Alcover
    Let's examines the main challenges when it comes to use hybrid cloud environments, especially the paradigm evolution that forces to go beyond the traditional security layers and build a modern zero trust security architecture. Here is why the capabilities to face advanced identity threats becomes a hotspot for business continuity, and how such approach can give a significant advantage through faster decisions and better attack understanding.
  • Climate vs weather signals: The path to intelligence-led security Recorded: Feb 19 2021 36 mins
    Charl van der Walt
    Everything starts with The Threat! If we do not understand the Threat, we cannot understand how to identify the threat, nor how to detect the threats in your infrastructure or how to effectively build protections against the threats. But the threat isn’t everything. Real Intelligence-led security requires us to view the security environment through multiple lenses, and also to understand our own environment – our attack surface, IT assets, vulnerabilities and more.

    Charl and Stefan will talk through concept of Intelligence-led security to protect your business and give concrete examples of how this paradigm is helping our customers to understand and respond to current and emerging threats
Orange Cyberdefense
Orange Cyberdefense

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Seeing the Attacker’s View: A People-Centric Approach to Security Discussion
  • Live at: May 18 2021 1:00 pm
  • Presented by: Richard Davis, Cyber Security Strategist, Proofpoint & Dominic Trott, UK Product Manager, Orange Cyberdefense
  • From:
Your email has been sent.
or close