Hi [[ session.user.profile.firstName ]]

Leveraging Threat Intelligence in Security Monitoring

With today's advanced threats and malware evading traditional security controls at an alarming rate, the role of security monitoring has become more important than ever.

While SIEM and big data security analytics solutions excel at the collection and analysis of an organization's internal data, enrichment of the data with external threat intelligence has proven to be a powerful solution for enabling the rapid detection of advanced malware and breaches and improving the incident response process.

Join us for the webinar "Leveraging Threat Intelligence in Security Monitoring", featuring Mike Rothman, President and Analyst at Securosis and Jeff Harrell, Senior Director-Product Marketing of Norse, to learn about the security monitoring process and how to leverage threat intelligence for the rapid detection of advanced malware threats and improvement of the incident response process.

In this webinar you will learn:

* How to update your security monitoring process to integrate threat intelligence and malware analysis
* The value of the different types and sources of both internal and external threat intelligence
* How to score quick wins with threat intelligence, as well as creating longer term sustainable advantages
Recorded Aug 21 2014 54 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Mike Rothman at Securosis; Jeff Harrell at Norse
Presentation preview: Leveraging Threat Intelligence in Security Monitoring

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Seeing the Forest and the Trees – Unique Security Challenges of Financial Data Jan 25 2017 4:00 pm UTC 60 mins
    Kim Ellery, Director, Product Marketing, Absolute
    Financial organizations are entrusted with the some of the most sensitive data and face a constant onslaught of attempts by insiders and hackers to steal incredibly valuable and easily monetized data. In this informative webinar, Kim Ellery, Director Product Marketing at Absolute, will discuss the increasing risk from both advanced attacks and insider threats. Attendees will gain actionable insights on how to balance the emphasis between detecting threats and preventing them in the first place, starting with visibility and actionable intelligence, to gain complete visibility and control of every endpoint device … no matter if they’re on or off the network.

    Join the Absolute team on January 25th for an informative webinar on improving your visibility, get actionable insights and strategies to help you detect threats faster or prevent them entirely
  • Ready for GDPR? Learn about challenges and ways to comply Jan 25 2017 3:00 pm UTC 45 mins
    CEO Richard Hibbert & Head of Products, Oliver Vistisen
    The GDPR comes into force 25 May 2018 and this will have a significant impact on the way in which organisations collect, process and share data. Companies that fail to prepare for the GDPR risk incurring hefty fines of 20m euros or 4% of world-wide revenues, whichever is greatest. As such all organisations need a strategy for GDPR. By implementing a structured approach through the use of cloud-based applications, organisations will be able to effectively achieve and maintain compliance.

    In this webinar we will: explore the key provisions of GDPR, examine the challenges organisations are facing with the new rules, provide guidance for Risk Managers, Compliance Leaders and other IT Professionals on how to approach these challenges, then demonstrate how our cloud-based GDPR Applications Suite can provide effective solutions that ensure your business can achieve and maintain compliance
  • Advancing Business Performance: Align IT Vendor Risk to ERM Jan 24 2017 6:00 pm UTC 60 mins
    Scott Roller 3WP; Yo Delmar, MetricStream, Albert Biketi, HPE Security -Data Security, Riskonnect
    Growing exposure to IT risks has made organizations across industries volatile. Recent IT vendor incidents like data and security beaches, violation of privacy guidelines, which caused substantial fines, penalties, brand value, highlight that IT vendor risks are business risks and require focus from the leadership. An immature ITVRM programs limits the insights which are necessary for strengthening vendor relationships and building a robust ERM program. Rather than treating each risk in isolation, organizations need to have an integrated approach to manage risks holistically and in line with their business operations and objectives. With the growing dependency on IT and IT vendors, organizations need to align enterprise and IT VRM objectives to build a resilient framework suitable for today’s environment.

    During the session, panelists will discuss how organizations can strengthen vendor management in the current landscape and improve business performance.

    - Causes of Vendor Risks incidents and the impact on the enterprise
    - Best approach to align IT vendor risk to enterprise risk
    - Building mature VRM Program
    - Role of technology in integrating Vendor risk to Enterprise risk management
  • I Heart Security: Developing Enterprise Security Programs for Millennials Jan 19 2017 6:00 pm UTC 45 mins
    Mary Jane Kelly, Security Consultant at NCC Group
    Open-minded, collaborative, and engaged, Millennials embrace values that can be effectively directed to reduce risk across an organization. While some may view the Millennial spirit as a security liability, with the right support, their views and priorities can actually help cultivate a stronger security mindset within their teams.

    In this talk, MJ Kelly explores how to develop security programs that resonate with Millennials. She presents practical approaches that incorporate deeply held priorities of the new generation, while ensuring that experienced team members remain included and engaged. Strategies include determining appropriate incentives, varying motivational focus, and testing new tactics such as gamification and novel information distribution channels to foster a strong security culture throughout the entire organization.
  • Hacked Elections? Facts & Predictions for 2017 Jan 18 2017 10:00 pm UTC 45 mins
    John Bambenek, Manager, Threat Systems at Fidelis Cybersecurity
    The US intelligence community has released their summary of the DNC breach and the election-related hacking and there have been additional disclosures about the attacks.

    This webinar will be the latest on what we know, what we don’t know and what many are merely speculating about. We’ll take a look forward for upcoming European elections to get a perspective on what can be expected there in the coming months.
  • What Did Russians Really Hack? Live 60 mins
    Alex Holden, Founder & CISO of Hold Security, LLC
    Almost every news story about cyber security today starts with “the Russians did it!” Did the Russians hack the US elections? Do they regularly steal our data? Who is behind of all the hacking? We will take an insider look at the Russian hackers and try to delineate their ill gains and techniques. Most importantly, what will they do next?
  • Auditing Neglected Critical Infrastructure Recorded: Jan 18 2017 33 mins
    Ian Whiting - CEO Titania Group
    Key network infrastructure devices are overlooked yet they provide critical functionality. Exploiting web application weaknesses and service buffer overflows is exciting, but the housekeeping of network infrastructure is not. Issues in network infrastructure devices can lead to network wide problems that would cause system admininstration nightmares. This presentation provides a review of key security devices, often side-lined when looking at security. It covers the value of these devices to "Blue Teams", issues "Red Teams" can highlight, desired outcomes and auditing practices.
  • How the Heck Did They Miss It? Lessons to Learn from the Yahoo Breach Recorded: Jan 13 2017 49 mins
    Chris Roberts, Chief Security Architect at Acalvio Technologies
    With 2016 behind us, is this the last Yahoo breach we’ll hear about? Join Chris Roberts, Chief Security Architect at Acalvio Technologies as he discusses the lessons to be learned from the recently disclosed Yahoo breaches, and the nagging questions infosecurity professionals will try to answer in 2017.
  • IT Operations and Real-Time Performance Monitoring: Keys to Efficient Healthcare Recorded: Jan 12 2017 49 mins
    John Smith, Principle Solutions Architect from ExtraHop, Darren Carr, Sr. Technology Architect, from Cerner
    Modern Healthcare IT infrastructures are a complex blend of technologies, from mission-critical Electronic Health Record (EHR) applications to the security solutions protecting patient data from ransomware and other threats. Overseeing an entire healthcare system's networks and infrastructure, as well as managing patient data in a private cloud, can be time consuming, costly and pose potential cybersecurity threats and data breaches. That’s why fast, reliable IT is crucial to every step of the patient’s journey through your organization—and why you need a new approach to IT operations and monitoring.

    Learn where your visibility gaps lie, and how closing those gaps with real-time performance monitoring will dramatically improve the quality of care and IT security that your organization provides.
  • What Does the Massive Yahoo Hack Mean for Your Company? Recorded: Jan 12 2017 37 mins
    Dr. Christopher Pierson, EVP, Chief Security Officer & General Counsel, Viewpost
    With over 1 billion user accounts stolen, the recently disclosed Yahoo breach is the biggest one to date. What does this mean for your organization? Join Chris Pierson, General Counsel and Chief Security Officer at Viewpost as he discusses the Yahoo breaches and the cybersecurity and privacy implications for organizations worldwide.

    About the presenter:
    Dr. Chris Pierson is the EVP, Chief Security Officer & General Counsel for Viewpost - a Fintech payments company. He is a globally recognized cybersecurity expert and entrepreneur who holds several cybersecurity and technology patents. Dr. Pierson serves on the Department of Homeland Security’s Data Privacy and Integrity Advisory Committee and Cybersecurity Subcommittee and is a Distinguished Fellow of the Ponemon Institute. Previously, Chris was the first Chief Privacy Officer, SVP for the Royal Bank of Scotland’s U.S. banking operations leading its privacy and data protection program. Chris was also a corporate attorney for Lewis and Roca where he established its Cybersecurity Practice representing companies on security and data breach matters.
  • Double Yahoo Breach: Nothing You Can Do About It, But Learn Recorded: Jan 11 2017 52 mins
    Morey Haber, VP Technology, BeyondTrust | Sean Martin, CISSP, Editor in Chief, ITSPmagazine
    It's time to stop pretending this is not going to happen to you. At work, or in your everyday life, we need to learn how to live with cybersecurity. If we want to play in an IoT and Internet-connected world, we need to learn how to play by the rules.

    Sure, not all of the rules have been set for every situation, but there are plenty that have been defined that continue to be ignored. Either nobody has taught you what these rules are. Or, it may seem the rules don't apply to you or your business. Either way, it's time to stop being numb to the news of the next new breach and start paying attention. It's time to understand the rules and being to follow them - they apply to everyone.

    In this ITSPmagazine Experts Corner interview with Morey Haber, VP of Technology at BeyondTrust, we will explore some of the core questions to ask yourself given the recent announcement of the second Yahoo breach of 1 billion accounts:
    - What is the value of password management?
    - What are the risks associated with password re-use?
    - What are the keys to successfully controlling access to critical assets?
    - Why is managing privileged access so important?
    - How can two-factor authentication be your best friend?

    We look forward to having a great conversation with Morey as he discusses the details of the two Yahoo breaches and what they mean to us as individuals, as businesses, and as a society. We hope you will join us and join in on the conversation.
  • Stop Malicious Activity by Analyzing Network Behavior Recorded: Jan 10 2017 33 mins
    Chris Matthieu, Director of IoT Engineering, Citrix, John Smith, Principal Solutions Architect, ExtraHop Networks
    In the ever-evolving world of persistent threats to your environment the only way to keep up with malicious actors is by utilizing behavior based profiling. In this webinar, we will show how you can rethink the network to detect and remediate threats in real time. When wire data visibility from ExtraHop meets automated response from Citrix Octoblu you're able to protect your environment without having to spend all your time wading through alerts.

    This webinar is perfect for any network or security professionals who are keen to maintain optimum visibility accross their entire network, allowing them to neutralise threats and reduce vulnerabilities.

    About the presenters:

    John Smith is Solutions Architect at ExtraHop and author of the wiredata.net blog. He is a Citrix Technology Professional and 16-year IT veteran specializing in application delivery, event correlation, security, web applications, and application virtualization. John’s background gives him an invaluable perspective on the challenges facing IT, and creating new approaches to deal with them. Follow him on Twitter: @jmsazboy

    Chris was the co-founder and CTO of Octoblu, a revolutionary real-time IoT platform recently acquired by Citrix. Octoblu connects things, systems, people and clouds to a global mesh network allowing users to automate and control design flows, processes and sensor data, and analyze/react to real-time events and messages as well as big data trends and anomalies.
    Follow him on Twitter: @ChrisMatthieu
  • Biggest Hack of All Time - Yahoo Breach Hits 1 Billion Accounts Recorded: Jan 6 2017 42 mins
    Chris Webber, Security Strategist at Centrify
    In September 2016, Yahoo disclosed that the company lost access control for over 500 million accounts. Turns out the largest breach in history of 500M Yahoo accounts in 2014 is only half as much as the latest and largest hack ever discovered – 1B Yahoo accounts lost in 2013.

    Join Chris Webber, Security Strategist at Centrify, as he examines the Yahoo breach incidents, the causes behind them, the damage they caused, and how they could have been avoided.
  • Threat intelligence and predictions for 2017 with Kaspersky Lab Recorded: Jan 6 2017 60 mins
    Amar Singh
    Join us to learn about the top predictions for 2017, as identified by Kaspersky Lab's Global Research & Analysis Team (GReAT). Gain the latest intelligence on the threat landscape and our predictions for 2017

    We face a future of increasingly subtle and sophisticated threat factors; a world where traditional clues and indicators are no longer enough on their own to identify and block attacks; where information is wielded as a weapon, misdirection is king, and global networks of connected devices can be used to paralyse the Internet. What does this mean for business in 2017?

    Kaspersky Lab UK's Principal Security Researcher, David Emm, shall present the Who, What, How and Why in Kaspersky Lab's predictions for 2017 and explain how they will affect the cyber-security landscape throughout the year.

    - Who: The business sectors we predict will be particularly targeted in 2017 and who will attack them.

    - What: The data, behaviour and habits that will expose businesses to increasingly sophisticated threat factors.

    - How: The technical methods through which businesses will be targeted.

    - Why: What Kaspersky predict to be the endgame of 2017's cyber-criminals.

    Hosted by Amar Singh
  • Yahoo Breach #2 - Should You Be Worried? Yes, You Should Recorded: Jan 5 2017 47 mins
    Pravin Kothari, CEO, CipherCloud | Willy Leichter, VP of Cloud Security, CIpherCloud | Sean Martin, ITSPmagazine
    Yahoo just broke its own recent record for the largest customer data breach in history and the implications are troubling on many levels. Hackers have apparently amassed names, email addresses, phone numbers, birth dates, and more for over 1 billion accounts. Even worse is that breach may have included unencrypted security questions, and passwords encoded with out-of-data and vulnerable techniques.

    But rather than just being worried, what concrete steps should individuals and businesses take to manage security and protect their most sensitive data? Join security technology experts from CipherCloud for an interactive webinar discussing how to balance cloud usage, mobility and data protection in today’s perilous environment, and steps you can take today to limit your risk.

    Featured Speakers
    Pravin Kothari, founder and CEO of CipherCloud
    A security industry pioneer, Pravin led CipherCloud to become an industry leader in cloud security and data protection. Pravin is a security visionary with more than 20 years of experience bringing innovative products to market. Previously he was the Founder & CTO of Agiliance, a leading Security Risk Management company, and Co-founder & VP Engineering of ArcSight, a leading security company, which was acquired by HP for $1.6 billion. Pravin holds over a dozen patents in security technologies and is the inventor behind CipherCloud’s groundbreaking cloud encryption technology.

    Willy Leichter, VP of Cloud Security
    With over 20 years of experience helping Global 1000 companies meet security and compliance challenges, Willy has expertise in cloud platforms, global data privacy laws, network security, data loss prevention, and access control, and has led product and marketing teams in the US and Europe.
  • Yahoo! Breaches Continue - What to Expect Next from Yahoo Recorded: Jan 3 2017 47 mins
    Alex Holden, Founder & CISO of Hold Security, LLC
    Yahoo closed 2016 with another revelation about their poor state of security. This time they admitted of losing all their user credentials in 2013.
    Adding to Hold Security's previous intelligence from the 2014 breach, Alex Holden, CISO will discuss exclusive details about situation with Yahoo.

    Join the interactive Q&A and learn:
    - Where is the stolen data?
    - Who is behind this breach?
    - What to expect next from Yahoo.
  • The State of Global Data Protection in 2016 Recorded: Dec 28 2016 34 mins
    Michael Wilke, Senior Director of Product Marketing, Dell EMC
    With cyber attacks on the rise, data protection and downtime are becoming increasingly expensive. How are businesses worldwide copying? Are they confident their data protection solutions are meeting security requirements?

    Viewers will learn about:
    - How the shift to the cloud is changing the IT landscape and affecting cyber risk
    - The impact of data loss and downtime
    - The current state of data protection and how it needs to transform to keep pace with a rapidly shifting IT landscape
  • Part 2: How Is This Yahoo! Breach Different from Their Other Breach? Recorded: Dec 22 2016 35 mins
    John Bambenek, Manager, Threat Systems at Fidelis Cybersecurity
    On December 14 Yahoo revealed a new breach affecting more than 1 billion users’ data. This breach is separate to the hack it disclosed earlier this year, which was the biggest data breach on record. Join John Bambenek, Threat Systems Manager at Fidelis Cybersecurity on the latest developments in the Yahoo breaches, what it means for you and steps to take today.
  • Can Good Security Help Drive Greater Business Agility? On-demand Panel debate! Recorded: Dec 19 2016 61 mins
    Stephen Pritchard - InfoSecurity Magazine, Bob Tarzey - Quocirca, Nathan Dornbrook - ECS, Tom Salmon - LogRhythm
    Good security operations have never been more critical for a business than today. More and more businesses are suffering damaging breaches. Outdated or overly complex security measures are a barrier to productivity, and to adopting new technologies.

    Plus, manual processes and a lack of visibility into unusual network behaviour by a user, machine or network device, can slow a security team down.

    How can advancements in security technology help to connect, unite and enable better processes to help drive greater business agility?

    In this webinar we will address:
    • SIEM’s role in enabling fast detection and response to modern-day threats
    • Implementing a security strategy that protects company assets and aligns to business objectives
    • How having faster access to the right data at the right time, enables better decision making and increased productivity
    • How to modernise your operations with real-time visibility and actionable intelligence
  • How to Enable Data Protection on Your Journey to the Cloud Recorded: Dec 16 2016 27 mins
    David Robinson and Mat Hamlin
    As more systems, applications and data are moved into cloud provider environments, data protection is critical. Join David Robinson and Mat Hamlin to learn about the use cases to help you map your journey to the cloud while ensuring data security.

    Viewers will learn about:
    - The Modern Data Center
    - Cloud Strategy
    - Cloud Data Protection Everywhere
    - Journey to the Cloud
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Leveraging Threat Intelligence in Security Monitoring
  • Live at: Aug 21 2014 5:00 pm
  • Presented by: Mike Rothman at Securosis; Jeff Harrell at Norse
  • From:
Your email has been sent.
or close