A Proactive Approach to Modern Malware using Forensics & Sandboxing
CISOs around the world are telling analysts that the majority of today’s emerging threats are bypassing their anti-virus, firewalls, and intrusion prevention solutions. In response, analysts suggest that IT needs to assume a more proactive stance. Such a shift can involve more tightly integrated defenses, strengthening in-house IT resources, and leveraging appropriate outside resources. In this webinar, Websense will discuss ways to begin this shift today including:
- Expanding ‘inbound’ defenses to include ‘outbound’ controls
- Options for enhancing in-house IT security expertise
- Leveraging research-grade forensic tools such as Websense ThreatScope™
Real-world context will be provided as an actual malware sample undergoes forensic dissection and the Websense CyberSecurity Intelligence™ service is reviewed as a concrete example of the capabilities of today’s threat intelligence marketplace.
Watch a cyber-attack unfold live to show you how your vendors can unwittingly leave the door open to your network and understand how to prevent these by managing, controlling and auditing all vendor access This webcast will offer best practice recommendations on how to secure vendor access to your organization. Hear top tips on how to protect your company and customer data, infrastructure and assets from cyber-attacks by securing vendor access while improving productivity.
This webinar will offer best practice recommendations on how to secure vendor access to your organisation. Hear top tips to protect your company and customer data, infrastructure and assets from cyber-attacks by securing vendor access whilst improving productivity.
Barry Fisher, Sr. Product Marketing Manager OpenDNS, now part of Cisco
Next-generation firewalls and sandboxes stop attacks at various steps, but they only react to malicious communications and code after attacks have launched.
There’s another way—observing where attacks are ‘staged’.
We’re going to demonstrate how we can visualize Internet infrastructures for visibility into where attacks will emerge. Then, we’ll know where advanced malware will be downloaded and where compromised systems will callback—before attacks launch.
In this live session, you’ll learn:
7 steps of an attack and how you can use this data to get ahead of new security events.
3 ways to uncover malicious activity by looking at domain names, IP addresses, and autonomous system numbers (ASNs).
How to apply this intelligence to your current defenses.
Every day, your organization is creating more data that is critical to the operational success of your company. Making sure that you have a proper backup solution to recover data is not only important, it’s vital to the long term success of your business.
Even though users are creating more mission critical data than we have ever seen in the past, that doesn’t mean your backup solution has to be expensive. In this webinar we cover a wide range of options about how you can effectively backup your content without breaking the bank.
The solutions we will cover will take into account being highly fault-tolerant, mindful of high performance, and assurance that your data will be available when you need it.
Ginny Turley, Director of North American Marketing
While network security encompasses both the physical and software preventative measures to prevent and monitor unauthorized accesses or misuse of a computer network, the adoption of a password management policy and strategy can be foundational to the prevention of unauthorized uses of network resources. In many cases, simple password management is the weakest link. In this webcast, we'll explore what needs to be done to strengthen this important and oft overlooked aspect of network security and discuss password synchronization, and self-reset functions that can save time and money - and a lot of post-it notes as well.
Diana Garcia, Customer Onboarding and Training Manager, PhishMe
As spear phishing continues to be one of the top security threats, enterprises have looked to user training programs to bolster their defenses. One of the main challenges security awareness professionals face is implementing a phishing training program which shows continuous improvement and value to their organization. How do you start and build upon a training program to showcase continuous success?
The key to implementing an effective program is to focus on the biggest threats and leverage behavioral metrics to drive your program. During this webinar, Diana Garcia, Manager, Customer Onboarding and Training, will cover:
-How do you implement a phishing awareness program and run it continuously?
-What are the key elements of a successful program and what does it look like?
-How do you show the value this program and your trained users add to the security organization?
Araldo Menegon, Global Managing Director, Financial Services, Fortinet and John Bryant, CTO of Options
Fortinet protects the most valuable assets of the largest financial services institutions across the globe. Learn how they provide high-performance protection against cyber-threats by hearing from security experts and key customers.
David Dufour | Senior Director of Security Architecture
Traditional cybersecurity approaches aren’t effective in the world of IoT with the vast disparity in device capabilities, resource constraints and architectural designs. This diversity has created an environment where attacking the IoT infrastructure of an organization will become more common place. This presentation will discuss what can be done in the near term to help protect against attacks on the varying device types and their ecosystems.
Andrew Hay, Director of Security Research, OpenDNS & Meg Diaz, Product Marketing Manager, OpenDNS
Many have hypothesized about the security impact of the “Internet of Things” (IoT) for enterprises, but for the first time, we have actual data on the potential security risks introduced by these devices—and the results may surprise you!
Andrew Hay, Director of Security Research at OpenDNS, conducted a multi-month study on the prevalence of IoT devices in enterprise networks. In this webcast, Andrew will walk through the key findings, including:
The prevalence of IoT devices—even in the most regulated industries—and which devices are most commonly found
Where IoT hosting infrastructure is located on the internet
Vulnerabilities found in IoT hosting infrastructure
Implications to consider for your security program
How to gain IoT visibility in your enterprise network
- See more at: https://www.opendns.com/enterprise-security/resources/webcasts/internet-of-things-in-the-enterprise-the-data-behind-the-risks/#sthash.INikZJu0.dpuf
In this cloud DLP webcast, “Cloud Security Alliance and Elastica: Revealing Shadow Data”, Jim Reavis, CEO of CSA, and Elastica delve deeply into the Elastica Q2 2015 Shadow Data Report and share insights into how organizations can unlock the full business potential of cloud apps and the sensitive corporate data stored in them, while staying secure and compliant.
In addition, Ben Munroe from Cisco shares his insights into how Cisco is addressing the cloud data loss prevention problem.
Looking beyond Shadow IT, this webcast examines:
• What types of sensitive data are typically found in cloud sharing apps (PHI, PCE, and PII)
• Which vertical industries have the riskiest exposures (Hint: its healthcare) and what steps can be taken to mitigate the these risks.
• Why managing Shadow Data is the next critical step in protecting cloud apps beyond just controlling Shadow IT.
• How to build an effective cloud app security architecture that provides visibility, control, and remediation.
You can’t defend against something you don’t understand. Most network attacks are actually easy to understand if you have the right background. Join SolarWinds’ Mav Turner to review the basics of network security. He will discuss key concepts and core networking technology necessary for a solid foundation to secure your infrastructure.
Richio Aikawa - Senior Marketing Manager, Partner & Solutions | Adam Darby - International Technical Sales Manager
MIFID II requires a company to keep electronic transaction logs with greater resolution/accuracy than previously. This webinar examines how Solarflare helps fulfill these requirements with PTP, Hardware time stamping and Capture.
Technology trends such as cloud, mobile, and collaboration help businesses boost growth and competitiveness but each brings it own set of security gaps that give attackers a clear path to slip malware into the network, evade detection, and steal valuable information.
In 2014, global malware attacks increased by 136%. Attackers launch twice as many unique attacks. These are trying times for every organization as it faces elevated risk from the latest threats and cyber-criminals bent of greed and nefarious deed. Join us as security experts look at some of the latest security challenges and discusses the building block of developing a resilient security defense system to help you effectively combat evolving threats as they emerge.
You will learn how to better protect your networks as well as yourself with solutions that reduce work for IT and security teams.
In this webinar, you will:
1. get up to speed on the current threat landscape
2. discover ways to take advantage of modern-day network security tools and services for ongoing protection against new threats
3. learn why it truly counts to have a nimble threat research and response team working for you
4. and why it truly makes a big difference to have multiple layers of threat protection to bolster your security posture
Mark Allen, Technical Sales Engineer and Bjorn Hovd, Technical Sales Engineer
They may be the oldest tricks in the book, but SQL injection and cross-site scripting (XSS) attacks still put a hurt on thousands of web applications every year, impacting millions of users—your users and customers. SIEM solutions are essential in finding these exposures quickly, by collecting and correlating data to spot patterns and alert you of an attack. Join us for this demo to learn more about how these attacks work and how AlienVault USM gives you the built-in intelligence you need to spot trouble quickly.
How these attacks work and what you can do to protect your network
What data you need to collect to identify the warning signs of an attack
How to identify impacted assets so you can quickly limit the damage
How AlienVault USM simplifies detection with built-in correlation rules & threat intelligence
Its taken decades for the leading financial services firms to establish trusted relationships with their customers - but that trust can be shattered in seconds with the click of a fraudulent email. Don't let cybercriminals misuse your brand, creating spoofed emails purporting to be from you, attacking your customers.
Learn to identify how fraudsters are impersonating financial services communications and what you can do to take back control of your email communications - so that the only emails your customers receive are the ones you are legitimately sending.
Mike Woodward, Program Director of Data, BitSight Technologies
Some cyber security analysts called 2014 “the year of the retail breach” due to major breaches affecting major American retailers and leading to millions of compromised customer records. Cyber security has continued to grab the headlines over the past year, as major breaches have affected companies across all industry sectors, from healthcare to finance.
Join this webinar to learn more about the security performance of six major industry sectors: finance, government, retail, utilities/energy, healthcare and education. Mike Woodward, Program Director of Data will reveal interesting insights into the performance of each industry based on BitSight’s proprietary Security Ratings data.
Attendees will learn:
- What are Security Ratings and how are they developed
- How and why does security performance vary across different industries
- Which industry sectors are still vulnerable to Heartbleed, POODLE and FREAK
- What botnets are trending across different industry segments
Michael Osterman, President, Osterman Research, Inc.
File sharing is the single most common activity on corporate networks and between companies, and email is still the most-used channel for file sharing. It’s easy, it’s ubiquitous, and it gets the information to its destination with a single click. So what’s the problem with sharing files via email?
Register today to hear Michael Osterman, President of Osterman Research, and Peter Brown, Director of Product Marketing, Intralinks, review:
•The drawbacks and costs of relying on email for file sharing
•The problems organizations face when employees turn to consumer-grade file sharing tools as a solution
•The steps that organizations should consider for enterprise collaboration
All registrants will receive a complimentary copy of the Osterman Research report “The Critical Need for Enterprise-Grade File Sync and Share Solutions,” including data from an in-depth survey on file sharing practices.
Matt Johansen, Director of Security Services & Research, WhiteHat and Jonathan Kuskos, Manager TRC Europe Ltd, WhiteHat Secur
Every year, our adversaries gain more intelligence and the number of attacks on our applications increase. The damage of these attacks are costly to organizations, reaching millions of dollars a year. The Top 10 Web Hacks Webinar, now in its ninth year, represents exhaustive research conducted by a panel of experienced security industry professionals.
In this webinar, you will learn:
•The top web hacks, ranked by your peers and a panel of industry experts
•How to protect your organization against these attacks
•Industry wide research on new advanced attack techniques
Files and emails are business necessities, but many companies struggle to stay productive, secure, and cost-efficient in the face of so much data.
Join our webinar to learn how connecting the data dots will help you:
* Find and access data faster, no matter where you are
* Be secure and compliant, because you’ll discover and eliminate vulnerabilities you never knew you had
* Automate manual tasks so you can reallocate your time to more important projects
* Save on storage costs by identifying and eliminating stale data
John Kindervag, Forrester Research and Seth Goldhammer, LogRhythm
60% of breached organizations included in the 2015 Verizon DBIR were initially compromised within minutes, and yet for most of those organizations it took hundreds of days to detect the intruders.
Fortunately, an intrusion does not equal a breach. In fact, there are usually several steps that typically follow an initial compromise before the bad guys get away with the goods or disrupt a critical service.
Detecting early warning signs such as an initial system compromise, command and control activity or suspicious lateral movement of intruders can provide the necessary lead time to respond and neutralize a threat before the intrusion leads to a material breach.
In this webinar, our guest speaker John Kindervag, Vice President, Principal Analyst at Forrester Research, and Seth Goldhammer, Director of Product Management at LogRhythm, will discuss how pervasive visibility and big data security analytics, when coupled with intelligent automated response, can substantially reduce an organization’s risk of experiencing a material breach or cyber incident.
Attend this webinar if you:
1. Are seeking to reduce your organizations meantime-to-detect (MTTR) and meantime-to-respond (MTTR) to cyber threats
2. Struggle to find the needle in the haystack of security events
3. Believe your current incident response process lacks adequate automation and efficiency
4. You have a first-gen SIEM platform deployed and are frustrated by its complexity or feel that you still have significant blind spots
“I just write the code and throw it over the wall. It’s up to Ops to make it work” -- when Devs care only about coding, Ops and customers suffer.
“It’s not my job to test code. If there’s a problem, talk to QA.” -- when Ops care only about stability, innovation and customers suffer.
DevOps represents cultural change. Whether it’s the change of resistant engineers that don’t want to be on-call or the change of Operations teams to have more empathy towards their counterparts writing code, to the willingness of executives to embrace a culture of automation, measurement and sharing. Organizations must overcome the culture war to be able to approach the agility and productivity that organizations following a DevOps model gain. The faster they can get there, the faster these organizations can take the competitive edge away from traditional enterprises.
In this webinar, featuring guest Forrester Research principal analyst Kurt Bittner, we will look at:
- The current state of organizations - a separation of Devs and Ops
- The how of DevOps - DevOps is a culture, not a product
- The benefits of DevOps - happier customers
As part of our panel discussion, we will answer the following questions to help you get started building a DevOps culture within your organization:
- Why change the status quo?
- How do I align two disparate groups?
- How do I remove the obstacles that separate Dev and Ops teams?
- Will customers see a difference if devs are on call?
- Can IT start to think differently?
Increasing expectations for good governance, effective risk management and complex demands for legislative and regulatory compliance are presenting a growing challenge for organizations of all sizes. Tune in to live and recorded presentations by respected luminaries in the fields of governance, risk and compliance. Their thought leadership will provide you with practical advice on how to implement successful GRC strategies and processes for your organization.