Hi [[ session.user.profile.firstName ]]

Key Security Insights: Examining 2014 to predict what's coming in 2015

It’s clear that cyber-crimes are alive and well on the global stage and will only continue to be pervasive as long as organizations prolong taking the necessary defense measures to stop threats from slipping through the cracks. In this Dell Security Annual Threat webcast, we’ll present the most common attacks Dell SonicWALL observed in 2014 and the ways we expect emergent threats to affect small and medium businesses, as well as large enterprises, throughout 2015. Our goal is not to frighten, but to inform and provide organizations of all sizes with practical advice that will help them adjust their practices to more effectively prepare for and prevent attacks, even from threat sources that have yet to emerge.
Recorded May 14 2015 52 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ken Dang, Product Marketing Manager, Dell Security
Presentation preview: Key Security Insights: Examining 2014 to predict what's coming in 2015

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • [Video Interview] RSA 2017 - Troels Oerting, CISO, Barclays Feb 28 2017 2:00 pm UTC 45 mins
    Josh Downs, Community Manager, BrightTALK & Troels Oerting, CISO, Barclays
    BrightTALK will be broadcasting its in-depth interview with Troels Oerting, CISO of Barclays and Josh Downs, Community Manager of the BrightTALK Information Security Community.

    Topics up for discussion will include:

    - The new political climate and it's effect on Cyber Security and global cyber warfare

    - The supposed Russian hack on the 2016 US election

    - GDPR and what companies need to be doing to prepare for 2018

    - Equal opportunities in the information security industry

    - The rise of AI & Machine learning and how it'll influence the cyber world

    - IoT and how to keep connected devices all safe and secure

    - Incident response and steps to take if you've been breached!

    - The 2017 threatscape and what you shoud be concentrating on

    All this and much more - join us for the broadcast.
  • Machine Learning Can Address the Most Pressing Security Challenge Feb 24 2017 5:00 pm UTC 60 mins
    Jason Matlof, EVP at LightCyber
    Noise is the enemy of breach detection and response. After a major data breach it is often the case that signs of an attacker existed, but were buried in thousands of other security alerts that were mainly false positives.

    With machine learning, meaningful signs of an attack are more easily detected and isolated, so a security operator can focus on precisely the right issue.

    This session will examine:
    - The problem of noise
    - The role of machine learning in sifting through vast amounts of data to get to the fidelity needed to detect an attacker
    - Best practices for including machine learning in your security operations
  • [Video Interview] RSA 2017 - Ian Glover, President, CREST Feb 24 2017 2:00 pm UTC 45 mins
    Josh Downs, Community Manager, BrightTALK; Ian Glover, President, CREST & Rowland Johnson, MD, Nettitude
    BrightTALK will be broadcasting its in-depth interview with CREST President Ian Glover and Nettitude MD Rowland Johnson jointly in conversation.

    Topics up for discussion will include:

    - The new political climate and it's effect on Cyber Security and global cyber warfare

    - The supposed Russian hack on the 2016 US election

    - GDPR and what companies need to be doing to prepare for 2018

    - Equal opportunities in the information security industry

    - The rise of AI & Machine learning and how it'll influence the cyber world

    - IoT and how to keep connected devices all safe and secure

    - Incident response and steps to take if you've been breached!

    - The 2017 threatscape and what you shoud be concentrating on

    All this and much more - join us for the broadcast.
  • SECOPS Automation on the Rise: Challenges, Directions, Futures Feb 23 2017 10:00 pm UTC 60 mins
    Tom Gorup, Director of Security Operations at Rook Security
    With the growing number of newly-released, longtime-funded automation tools and platforms, it’s clear that network security operations automation has reached an inflection point. While automation promises to provide significant value to security and network operations teams, along with hopes and promises comes concerns about limitations, potential failures, and critical oversights—especially when it comes to automating incident response. These limitations don’t stem from a lack of APIs, compute power, or the advancement of machine learning or artificial intelligence, but rather from the tools that are doing the detection, notification, and remediation.

    Security operations expert Tom Gorup addresses short- and long-term automation challenges and provides analysis on why investments should be focused on arming people with more assistive technology, rather than attempting to remove humans from the equation entirely.

    About the Presenter:
    As Director of Security Operations for Rook Security, Tom Gorup oversees Managed Security Services and develops proprietary security operations management tools and services for organizations ranging from Fortune 100 firms to fast-growing startups. Prior to joining Rook, Tom served 6 years in the U.S. Army. As an Infantry Squad Leader, Tom served two tours in Iraq and Afghanistan, where he received a Purple Heart alongside several other awards for actions on the battlefield. Tom is GCIA certified, a participant in the GIAC mentor program and advisory board, Indiana Infragard Sector Specialist, and on the NexTech advisory board.
  • The Promise and the Perils of Machine Learning and Automating Cybersecurity Feb 23 2017 4:00 pm UTC 60 mins
    John Bambenek, Threat Systems Manager, Fidelis Cybersecurity
    Those defending against cyberattacks are overwhelmed by the shear volume of incidents to respond to. It is so bad that it has been said there may be as many as 1 million unfilled cybersecurity jobs. Machine learning and automation is often heralded as a way to deal with this problem so that many incidents can be dealt with requiring pressing a button. While there is much promise is machine learning there are also many perils that need to be considered. Attackers know how we defend ourselves and they do use our defenses against us.

    This talk will cover some of the open-source tools and techniques available for organizations to use to defend themselves while keeping in mind how attackers could undermine our efforts.
  • [VIDEO Panel] Securing the Cloud and Driving Digital Transformation Feb 23 2017 3:00 pm UTC 75 mins
    Josh Downs, BrightTALK (moderator); Dan Webb, James Brown, Oliver Pinson-Roxburgh & David Howorth, Alert Logic
    Digital transformation is changing the business landscape for every organisation, with the way new technologies can unlock competitive advantage, enable efficiently, agility and enhance customer experiences. The cloud is where this innovation is happening and enabling this transformation, but when you take advantage of its possibilities, it’s crucial that you secure your cloud applications and workloads.

    If you’re building applications or migrating workloads to the cloud, you’re probably like most organisations – trying to determine what security controls are needed, and how to integrate workload security without slowing down innovation or needing to add dedicated security staff – which these days is harder to find and more expensive to keep.

    During this panel discussion you will hear from industry experts as they discuss what steps and considerations should be taken when moving to any cloud. Where are the responsibilities of security and how do you maintain visibility and control over your data, including:

    - Why when moving business critical applications to the cloud you require a different approach to security?
    - Best Practices for minimizing risk in your cloud adoption
    - Filling the Cloud Security IT Skills Gap
    - Managing the Challenges of the Cloud under EU GDPR
  • [Video Interview] RSA 2017 - Raj Samani, Intel Security Feb 23 2017 2:00 pm UTC 45 mins
    Josh Downs, Community Manager, BrightTALK & Raj Samani, EMEA CTO, Intel Security
    BrightTALK will be broadcasting an in-depth interview with Raj Samani, CTO EMEA, Intel Security and Josh Downs, Community Manager at BrightTALK.

    Topics up for discussion will include:

    - The new political climate and it's effect on Cyber Security and global cyber warfare

    - The supposed Russian hack on the 2016 US election

    - GDPR and what companies need to be doing to prepare for 2018

    - Equal opportunities in the information security industry

    - The rise of AI & Machine learning and how it'll influence the cyber world

    - IoT and how to keep connected devices all safe and secure

    - Incident response and steps to take if you've been breached!

    - The 2017 threatscape and what you shoud be concentrating on

    All this and much more - join us for the broadcast.
  • [Video Interview] Threat Management and the Keys to Avoiding a Major Data Breach Feb 23 2017 1:00 pm UTC 45 mins
    Ross Brewer, VP & MD, LogRhythm & Josh Downs, Community Manager, BrightTALK
    Research shows that 76% of companies suffered a data breach in 2016, so it’s now almost inevitable that hackers will gain access to your company and your sensitive data.

    Security professionals are now looking to deal with breaches faster, to keep their company off the front page and with heavy GDPR fines on the horizon, they’re wise to do so…

    Organisations are fearful of damaging data breaches but unsure of the best course of action to protect themselves from major cyber incidents. Whilst a large per cent of businesses focus on building up perimeter defences, not enough are concentrating on monitoring their own network for the best chance to detect threats and mitigate them before significant damage is done.

    Tune into this in-depth one-on-one interview to learn:

    - More about the threatscape and the dangers to your organisation

    - The influence that GDPR will have and steps you need to take

    - Processes for responding to a breach

    - The workflow for effective threat management
  • The Role of Orchestration in Incident Response Feb 23 2017 12:00 pm UTC 45 mins
    Ted Julian, VP of Product Management, IBM Resilient
    Faced with an avalanche of alerts, insufficient staffing, and a bewildering regulatory environment it's no wonder that most organizations struggle to respond effectively to cyber attacks. Successfully resolving attacks requires fast, intelligent, and decisive action - organizations need to have an orchestrated plan in place before an attack occurs. Indeed, the best organizations leverage an orchestrated response capability to achieve cyber resilience, the ability to weather the inevitable cyber attacks as just another part of doing business.

    Join IBM Resilient’s Ted Julian, VP of Product Management to explore the latest incident response methodology and technology. Can automation really save the day? Or are the naysayers correct that the automation cure is worse than the disease itself? From instant escalation, to automatic enrichment, to guided mitigation, Ted will explore the latest incident response techniques and share what works and what doesn't. Attendees will gain a framework for understanding their incident response capability and a maturity model for evaluating opportunities for orchestration / automation.
  • Protecting Your Data with Effective Incident Response, Monitoring & Threat Intel Feb 23 2017 11:30 am UTC 45 mins
    Stuart Davis, Director, Mandiant & David Grout, Systems Engineering Director, FireEye
    Protecting against data loss is a key focus of any organisation’s information security program. However it is not always that easy to put long term initiatives in place with consistent monitoring and response effectiveness to mitigate against advanced attacks where intellectual property may be the target.

    In this webinar Stuart and David will explain how effective incident response, long term monitoring and threat intelligence can help deal with data protection against advanced persistent threats (APTs) in this modern age of cyber warfare.
  • How to Gate, Watch and Guard your Sensitive Data Everywhere Feb 23 2017 11:00 am UTC 60 mins
    Sunil Choudrie
    The sad truth is that Invaders are trying to breach your defenses every day. With five out of every six large organizations being targeted by advanced attackers, protecting your data is a smart way to keep you from becoming tomorrow’s headline.

    So what does data protection mean? A comprehensive approach allows the right people to access the right data, anywhere, by controlling access, monitoring its flow, and keeping it out of the wrong hands.

    We will explain how Symantec technology addresses this approach and how you will benefit from:

    •Grant and ensure access only for authorized users with strong, multi-factor authentication, on any device, including BYOD.

    •Watching over data wherever it lives—in the cloud, on premise, in motion, and at rest.

    •Preventing data loss with unified policy controls to encrypt or block vulnerable information before it leaves the gate.
  • Incident Response and GDPR. What You Need To Know. Feb 23 2017 9:00 am UTC 60 mins
    Amar Singh
    Warning - this is not just another GDPR webinar. Join Amar Singh in his popular and interactive webinars and deep-dive into this special Cyber Incident Planning & Response webinar where we share and discuss the following:

    * - What are the key components to automate in incident management to enable GDPR compliance.

    * - Four important questions a CISO or Manager must ask to manage an incident successfully.

    * - Understand Process Automation for Incident Orchestration.

    * - How you can, using the technology and processes, build a lean, effective and knowledge Security team with or without a Security Operations Centre.

    * - Data Protection and Incident Response for the non-technical manager.

    * - How and why it's critical that middle and senior management, working with technical teams, get involved in delivering effective cyber incident planning & response.
  • Real-Time Contextual Learning and Adaptation in an Era of Targeted Attacks Feb 22 2017 10:00 pm UTC 60 mins
    Simon Crosby, Co-Founder & CTO of Bromium
    You’ve heard a lot about using artificial intelligence and machine learning to change the odds in your favor in cyber-attacks. Unfortunately it turns out that the bad-guys have great AI too, and with each click they can stealthily adapt, morphing into a new hard-to-detect form. But what if we apply learning in real time, on every endpoint, and allow the endpoints to collaborate to identify the threat?

    In this talk Simon Crosby, co-founder and CTO of Bromium, will explore how this new approach can give defenders the edge in an era of targeted attacks.

    About the Presenter:
    Simon Crosby is a co-founder and CTO of Bromium Inc. – the pioneer of micro-virtualization, which enables PCs to defend themselves by design from all malware. Previously Simon was CTO, Data Center & Cloud at Citrix Systems, which acquired XenSource, where he was co-founder and CTO. He was formerly a Principal Engineer at Intel where he led strategic research on platform security and trust, and founder & CTO of CPlane Inc., a pioneer in Software Defined Networking. He was a faculty member in the Computer Laboratory at the University of Cambridge, UK from 1994-2000. He holds a PhD in Computer Science from the University of Cambridge, UK, and is author of more than 50 peer reviewed papers and patents.
  • The Malware Battleground in 2017 Recorded: Feb 22 2017 56 mins
    Shimon Oren, Head of Cyber-Intelligence at Deep Instinct
    2016 has been yet another record breaking year in many aspects of the cyber security and malware world. We will look at some of the trends and vectors that have materialized or strengthened in 2016 and will carry into 2017.

    Join Shimon N. Oren, Deep Instinct’s Head of Cyber-Intelligence, to learn about the evolution of malware and cyber threats in the previous year. From ransomware, through cross platform campaigns, to file-less attacks we will review and give examples of the newest concepts and campaigns that will shape this year’s play ground between hackers and the cyber-industry.

    About the Presenter:
    Shimon Noam Oren is the head of Cyber-Intelligence at Deep Instinct. Prior to joining Deep Instinct Shimon served for 14 years as an officer in the Israel Defense Force's elite cyber unit. With a background that includes a wide range of cyber security and intelligence positions, Shimon successfully led multifunctional teams of engineers, analysts, hackers and security professionals in various settings and operations. Some of his other accomplishments during his tenure in the military include developing new methods and tools for researching and analyzing cyber-attacks and leading a product management team in charge of a series of innovative cyber collection products. Shimon has worked extensively with a variety of industry, defense and intelligence partners and agencies in North America and Europe, and was awarded the President of Israel Award for outstanding service.
  • Overcoming Security Threats in an Evolving IT Landscape Recorded: Feb 22 2017 43 mins
    Cris Thomas (aka Space Rogue), Strategist at Tenable Network Security
    Today’s attack surface is expanding and the network is becoming increasingly complex thanks in large part to the ephemeral nature of assets, including mobile devices, cloud, IoT, web apps, containers and virtual machines.

    ‘Space Rogue’ (aka Cris Thomas), strategist at Tenable Network Security, will look at the findings of the Tenable 2017 Global Cybersecurity Assurance Report Card and discuss strategies for staying ahead of sophisticated cyberattacks in the modern IT landscape.
  • AI & Machine Learning in CyberSecurity. What Is the Difference? Recorded: Feb 22 2017 60 mins
    Sven Krasser, Igor Baikalov, Stephan Jou, Engin Akyol, and Sean Martin
    Artificial Intelligence and Machine Learning are becoming more pervasive in the cybersecurity space, but it is not the panacea everyone thinks it is. Lacking real case studies, many vendors must resort to simulated data and made-up scenarios to demonstrate their product capabilities. Moderator Sean Martin, Editor in Chief of ITSP Magazine, will ask the expert panelist to share their insights as to how AI and/or ML can be used to help address a variety of cybersecurity risks.

    Leading into this actionable advice, the panel will provide additional insights, including:
    • The difference is between AI and ML
    • How AI and ML can be used for good … and evil
    • What the future of AI and ML looks like

    Moderator:
    Sean Martin, Editor in Chief of ITSP Magazine

    Panelists:
    • Sven Krasser, Chief Scientist at CrowdStrike
    • Igor Baikalov, Chief Scientist at Securonix
    • Stephan Jou, CTO of Interset
    • Engin Akyol, Co-Founder & CTO of Distil Networks
  • Rise of the Zombie Army - A Study of Botnets Recorded: Feb 22 2017 36 mins
    Ronan Lavelle, General Manager EMEA, Zenedge
    From Haitian folklore to George A. Romero’s Dawn of the Dead, the use of Zombies in fictional settings has experienced a strong resurgence in recent years. With fact mirroring fiction, the real world has also faced the terror of dealing with a rise of mindless automatons capable of creating mass devastation on an international scale.

    We are of course talking about the rise of Botnets.

    Come join us for an interactive presentation with chief zombie-wrangler, Ronan Lavelle, on the insidious rise of this threat looking at recent attacks, the link in growth to insecure IoT devices and just what we can do to combat them.

    This webinar is perfect for cyber professionals those who want to:

    - stop data loss by defending against botnets
    - better respond to incidents and remediate
    - reduce attack surfaces and counter threats
  • State of Endpoint Protection & How Machine Learning Helps Stop The Attacks Recorded: Feb 22 2017 61 mins
    Robert Arandjelovic & Jose Carlos Cerezo
    In the world of endpoint security and antivirus there no less than 37 new endpoint security products that have emerged in the past five years, each claimed to address the changing landscape, but is it all just hype?

    Learn more about Machine Learning, what it is, how it works, and what else you need to protect yourself across all points of attack.

    Key Learning Objectives:

    •What is the state of the industry for Endpoint Protection technology
    •Why machine learning is not enough
    •Discover how to reduce the number of agents on your endpoint with the high-performance lightweight agent that includes advanced machine learning, exploit mitigation, antimalware, and more
  • Panel Discussion - AI & Machine Learning in Cyber Security Recorded: Feb 22 2017 60 mins
    Josh Downs, BrightTALK; John Laliberte, FireEye; Natalino Busa, TeraData & Neill Gernon, AI.Dublin and Atrovate
    A live online panel discussion focused on the debate around AI and machine learning and how they can automate cyber security; catch more threats and malicious attacks and prove a useful weapon against cyber crime.

    Panelists:

    - Josh Downs, Community Manager - Information Security, BrightTALK (moderator)

    - John Laliberte, VP, Endpoint and ICE, FireEye

    - Natalino Busa, Head of Applied Data, TeraData

    - Neil Gernon, MD, Atrovate & Founder, Dublin.AI
  • Today's Government Networks: Detect and Prevent Hidden Attacks and Data Leakage Recorded: Feb 21 2017 33 mins
    Pamela Warren - Director of Government & Industry Initiatives & Mark Harman - Federal SE for Palo Alto Networks
    A comprehensive security strategy for Federal and other government agencies requires in-depth analysis of encrypted traffic to detect and prevent hidden attacks and data leakage. SSL has become a favorite tool that attackers use to distribute malware to evade detection by security devices, such as a firewall, IPS or web gateway. Increasing numbers of attackers, including state-sponsored actors, are using this technology to hide malware and escalate the likelihood of successful attacks.

    Join this informative webcast to review your options to ensure a more comprehensive view of this potentially malicious traffic.
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Key Security Insights: Examining 2014 to predict what's coming in 2015
  • Live at: May 14 2015 5:00 pm
  • Presented by: Ken Dang, Product Marketing Manager, Dell Security
  • From:
Your email has been sent.
or close