Hi [[ session.user.profile.firstName ]]

Hacking the Hypervisor

Clearly not all virtualization is the same. Different Clouds have assembled their own flavors that range from “full emulation” to “bare metal.” From his popular Black Hat presentation, IOActive’s Joshua Pennell will discuss the approaches from the most popular virtualization technologies for how the virtual machine will function and how the virtual hardware that is exposed can be used.

These approaches have security implications for companies that are leveraging these cloud architectures for ubiquitous storage and access of their sensitive data and applications. Josh will discuss the virtualization technologies, the security trade-offs of each, and what the past security failures will mean to enterprises looking to invest their data to the cloud.
Recorded Jun 16 2011 25 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Joshua Pennell, Founder and President, IOActive, Inc.
Presentation preview: Hacking the Hypervisor

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Top Cybersecurity Threats and 2019 Predictions Feb 19 2019 11:00 am UTC 45 mins
    Kelvin Murray, Sr. Threat Research Analyst, Webroot
    Small and medium-sized businesses are major targets for cybercriminals. To stay safe, today’s businesses must understand the different types of cyberattacks they may encounter and implement strong cybersecurity practices.

    Register for this 30-minute webinar on the key threats businesses faced this year and what's upcoming in 2019 to get details and tips that will help you keep your business and clients safe. Our Threat expert will be discussing ransomware, banking Trojans, phishing and all the crypto-crime that’s wreaking havoc on IT pros.

    Book your place and get some key insights, including:

    · 2019 Threat Landscape Predictions
    · Observed business trends (how businesses worry about the wrong threats)
    · Where stolen data/information ends up
    · Long term effects of data theft
  • IoT Series [Ep.2]: Current State -- Maturity and Success Jan 24 2019 4:00 pm UTC 60 mins
    Johna Till Johnson, CEO & Founder, Nemertes Research
    Everybody knows IoT is the wave of the future. But what are successful organizations doing differently when it comes to their IoT initiatives? Are they saving more? Generating new revenue and lines of business? Or increasing operational efficiency and other metrics?

    This webinar unveils the secrets of top-performing companies when it comes to IoT initiatives. You'll learn how they plan for, design, secure, and operate their IoT initiatives--and how they track the benefits.
  • Best Practices for Securing Your Organization in 2019 Jan 15 2019 4:00 pm UTC 60 mins
    Panelists TBA
    Data breaches are on the rise and getting their fair share of media attention. It is no longer a question of "if", but "when" an organization will get breached. So, how are organizations preparing for the inevitable?

    Join this roundtable discussion with security experts to learn more about:
    - Trends in cyber attacks and breaches and what's at risk
    - Prevention best practices
    - Solution recommendations for breach detection and response
    - Key factors for CISO success
    - What's on the horizon for 2019
  • Break the chains of legacy virtualization Dec 19 2018 6:00 pm UTC 60 mins
    Bhavani Yellapragada, AVP of DevOps, Nasdaq
    IT leaders look to technology as a business differentiator and rely on it to foster innovation. Enterprises have discovered that hyper-converged infrastructure (HCI) can be the foundation of a modern, cloud-like datacenter. But don’t stop there — going beyond HCI delivers more savings, increases IT agility, and supports multi-cloud goals when you add virtualization as an integral part of your stack.

    How do you harness the power of HCI and virtualization? Sure, there are a wide variety of tools on the market, but choosing the wrong HCI platform could limit your options in how you operate your datacenter or could impede cloud goals — including those associated with virtualization.

    To learn more about the power of HCI and virtualization, how virtualization can remove complexity and increase efficiency, and how to choose the right HCI tool, don’t miss this VB live event!

    Registration is free.

    Attend and learn:
    * How virtualization platform options on the market compare
    * Why to consider changing virtualization solutions
    * How to choose the right virtualization solution
    * How to save thousands in virtualization licensing costs

    * Bhavani Yellapragada, AVP of DevOps, Nasdaq
    * Mike Wronski, Principal Marketing Manager, Nutanix
    * Stewart Rogers, Analyst-at-Large, VentureBeat
    * Rachael Brownell, Moderator, VentureBeat

    Sponsored by Nutanix
  • IoT Series [Ep.1]: Foundations -- Architecture and Framework Dec 18 2018 4:00 pm UTC 60 mins
    Johna Till Johnson, CEO & Founder, Nemertes Research
    Everyone talks about IoT, and many organizations are implementing it and reaping the business benefits. But even those who have had IoT projects deployed for years may not have a comprehensive architecture and framework in place to help guide technology decisions and streamline operations.

    Join Nemertes CEO Johna Till Johnson as she reviews the IoT architecture and framework and shares guidance gleaned from leading-edge clients and research study participants.
  • Cyber Security Planning and Strategy for 2019 Recorded: Dec 13 2018 60 mins
    Sushila Nair (NTT DATA Services) | Topher Chung (OneLogin)
    Discover the cyber security attack trends that will shape your security planning and budgets for 2019. Discover what's new on the threat horizon, how businesses are coping and the key areas for improvement. Learn about the latest technologies enabling stronger and more resilient enterprises.

    Join this keynote panel of security experts and industry veterans as they discuss:
    - New on the threatscape
    - Cyber attack trends seen in 2018
    - Addressing your cyber risk
    - How to prepare for 2019
    - Security strategy and making the most of your security dollars
    - New leaps in technology
    - Best practices and recommendations

    - Sushila Nair Sr. Director Security Portfolio, NTT DATA Services
    - Topher Chung, Director of Security Engineering, OneLogin
  • Unified Endpoint Management & Security: A Force Multiplier Recorded: Dec 13 2018 56 mins
    Scott Scheferman, Cylance Director of Global Services; Masataka Hashiguchi, Interfocus Sales Engineer
    Join Interfocus and Cylance for this webinar outlining the workplace productivity gains that your business can realize through an integrated and unified platform delivering both IT asset management and endpoint security. Most IT teams today suffer from "alert fatigue" from the growing number of devices on their network, and spend on average 5-13 hours a week cleaning up compromised endpoints. Scott Scheferman from Cylance and Masataka Hashiguchi from Interfocus will demonstrate how automation and prevention is worth a pound of cure on your endpoints.
  • Social Engineering, Phishing and Protecting the Enterprise Recorded: Dec 13 2018 56 mins
    Jan Liband (SlashNext) | John Bambenek (ThreatSTOP) | JP Bourget (Syncurity)
    This webinar is part of the 2019 Trends and Predictions series on BrightTALK.

    Join top security leaders for an interactive discussion on how to better secure the enterprise in 2019:
    - Top threats on the horizon and what's at risk
    - Cyber defenses and your employees
    - Basic cyber safety recommendations to protect against social engineering, phishing and email cyber attacks
    - Use cases and examples
    - Actions to take today to protect your employees and enterprise from cyber criminals
    - What to expect in 2019

    - John Bambenek, VP Security Research & Intelligence, ThreatSTOP
    - JP Bourget, Founder & Chief Security Officer, Syncurity
    - Jan Liband, CMO, SlashNext
  • Next-Generation Security: Containers Recorded: Dec 13 2018 44 mins
    Johna Till Johnson
    Companies are increasingly moving to an architecture based on microservices and containers, as part of an overall move to DevOps, Agile, and cloud-first development.

    But are they taking the right steps to secure those containers?

    This Webinar provides a feature-functionality comparison of the leading providers of container security, and provides guidance for enterprise developers in launching their container security initiatives.
  • Securing the Weakest Link: Adding Security Layers While Keeping the Users Happy Recorded: Dec 13 2018 46 mins
    Olav Tvedt & Pål-Erik Winther, Innofactor Norway
    The modern user is pushing the limits and testing all borders, and they want as few restrictions as possible. To make sure the organisation’s security needs are met in this mix we can utilise feature like Microsoft Azure Active Directory Identity Protection for extended identity protection, and Azure Information Protection (AIP) for data protection.

    By analysing user risk and detecting suspicious activities, we can make sure annoying security features doesn’t appear before they are necessary.

    With AIP we can help our users secure their information and limit the chances of leaking important information by accident. AIP also gives us unique insight into how our users are working with information, where our sensitive information is, and also who has access to it.

    Understanding features and possibilities, and how they can match up against the ever-changing threat and temptations out there are essentials in any security strategy.

    - Olav Tvedt, Principal Cloud Solution Architect, Innofactor Norway
    - Pål-Erik Winther, Principal Cloud Solution Architect, Innofactor Norway
  • What’s Outside the Perimeter? Look After Your Data, Not Just Your Network Recorded: Dec 13 2018 39 mins
    Jeremy Hendy, CEO, RepKnight
    Most cyber professionals spend much of their time, effort and budget on protecting their corporate networks from an attack or breach. However, the reality is that most corporate data these days no longer lives only inside the perimeter of the network.

    Every business now uses the cloud to store and process data. Every business also shares data with its supply chain. Employees store data on their laptops and mobile devices and set up complex, unmanaged shadow IT networks of cloud apps and microservices. They email data within and outside the organisation, sometimes to the wrong recipient in error. The number one cause of data breach by far is our employees and human error, not failures of cybersecurity. Defending our network is no longer enough, so how can we defend our data?

    It all starts by reframing how we think about cybersecurity. This webinar explains why you need to beyond your networks to protect the thing that matters most — your data.

    Jeremy Hendy, CEO, RepKnight
    Jeremy is the chief executive officer at RepKnight. Jeremy has 30 years’ experience in high technology industries, working at companies like Texas Instruments, Symbionics and Cadence. Prior to joining RepKnight in 2016, he was VP of sales and marketing at Cambridge-based Nujira. He holds a degree in electronic engineering from the University of Liverpool.
  • Emerging Areas in Third Party Management Practices Recorded: Dec 12 2018 40 mins
    Max Aulakh, CEO, Ignyte Assurnace Platform
    Globalization and division of labor has allowed multi-national corporations and businesses to focus on their core capabilities while outsourcing all various ranges activities form legal services, IT services, marketing, etc... these trends will continue to gain speed as global markets become much more efficient.

    Proliferation of suppliers has also rapidly increased emerging threats such as privacy, data sharing and cyber risks. The key takeaway for audience in this presentation will be over all discussion of dimensions of supplier risks and how to holistically develop a proper comprehensive supplier report card that includes financial and cyber data.
  • Intelligence Lead Cyber Defense Recorded: Dec 12 2018 43 mins
    Griff James, Director, Damrod Analysis Ltd.
    A sound defence needs more than technology. Alongside advancements in machine learning and artificial intelligence, there remains a vital role for human insight and ability. At heart, cyber is a field of conflict – a contest over access to data. To allocate resources effectively and win that fight, defenders need consider the attacker’s perspective. Only by understanding what is under threat and what the likely attacks are can defenders allocate defences effectively.

    Ideal for technical leaders explaining priorities to non-technical managers, this webinar discusses how to understand, assess, and defend against cyber-attack using widespread offensive techniques to discuss how best to develop defensive strategy.
  • It’s almost Breach Season… Are You Prepared? Recorded: Dec 11 2018 40 mins
    Ron Pelletier, Founder, Pondurance
    Hacking is a lucrative business. Like any other line of work, there are business drivers that lead to natural surges in activity. Just as retailers rely on holiday shopping season to remain in the black, malicious actors are spending time right now gearing up for Breach Season. Pondurance research shows a massive uptick in intrusions during the months of February-April, in some cases, 80-90%. This means now is the time that hackers are busy doing reconnaissance and infiltrating networks.

    Pondurance Founder Ron Pelletier will discuss:
    · Breach Season basics: who is affected and what to expect
    · The main drivers causing the intrusions and breaches?
    · Pre-season tactics and strategies to prepare
    · What companies can do to reduce the likelihood of occurrence
    · Review of last year’s top threats and predictions for 2019

    Ron Pelletier, Founder, Pondurance
    With more than 17 years of information security and business continuity experience, Pondurance Founder Ron Pelletier brings seasoned expertise in all areas of risk advisory, incident response and forensic investigations. His training as a U.S. Army commissioned officer equipped him with problem-solving and risk analysis capabilities well-suited for the tech world. His vast experience in enterprise risk and security includes a wide range of industries and organizations ranging from Fortune 500 to small, non-profit groups.

    Ron is certified in multiple disciplines relating to information and asset protection including Certified Information Systems Security Professional (CISSP), Certified Information Systems Security Manager (CISM), Certified Business Continuity Professional (CBCP), Certified Information Systems Auditor (CISA), Certified Computer Forensics Examiner (CCFE), and Certified Ethical Hacker (CEH).
  • Around the World with Privacy and Your Business Recorded: Dec 11 2018 54 mins
    Victoria McIntosh, Information and Privacy Professional, MLIS,CIPT, Information in Bloom Management Services
    Planning on doing business overseas? Establishing a new office in a foreign land, or selling online to consumers in a new country? When going over company requirements for working in your new neighbourhood, don’t forget to review corporate privacy practices.

    When it comes to privacy, expectations, safeguard minimums and rights of the data subject can vary between jurisdictions. From Canada and the United States, the European Union with its new GDPR, Japan, Australia, even between China and Hong Kong, there’s no single set of global standards. Fortunately however, many privacy legislations do contain common ground. There are also ways to proactively account for the differences.

    Information and Privacy Professional Victoria McIntosh presents a taste of privacy across the globe, with some of the ways businesses can prepare in dealing with data across borders.
  • The Rise of Targeted Ransomware Recorded: Dec 11 2018 32 mins
    Michelle Drolet, CEO, Towerwall Inc.
    What is targeted ransomware?
    Are you susceptible?
    What can you do to defend against it?
  • Emerging Cyber Threats for 2019 Recorded: Dec 11 2018 47 mins
    Steve Durbin, Managing Director, ISF LTD
    Organisations in 2019 will be increasingly faced with a hyper-connected world where the pace and scale of change – particularly in terms of technology – will accelerate substantially. Business leaders need to develop cutting-edge ways to deal with new regulation, advanced technology and distorted information.

    In this webinar, Steve Durbin, Managing Director, ISF will discuss the threats organisations will be facing in 2019 and how business leaders and their security teams can address them. The emerging cyber threats to lookout for include:

    -The increased sophistication of cybercrime and ransomware
    -The impact of legislation
    -The myth of supply chain assurance
    -Smart devices challenge data integrity

    About the presenter

    Steve Durbin is Managing Director of the Information Security Forum (ISF). His main areas of specialism include strategy, information technology, cybersecurity and the emerging security threat landscape across both the corporate and personal environments.
  • Trending Attacks from Inside the Cyber Forensics Lab Recorded: Dec 10 2018 46 mins
    Ondrej Krehel, CEO/Founder CISSP, CEH, CEI, EnCE LIFARS LLC
    Current forensic evidence is indicating that Ransomware, Extortion, and Phishing Attacks are the top attack vectors penetrating companies today. Although not as wide-spread, intellectual property theft and disgruntled employees is causing significant loss for many organizations as well. Given the scarcity of talent and resources, learn tips and actionable insights from the forensic lab on what you can do to protect your organization from these most prevalent threats.
  • Invest in Your Staff in 2019, They Are Your Greatest Asset Against Cyber Attacks Recorded: Dec 10 2018 44 mins
    Daryl Flack, CIO & Co-Founder, BLOCKPHISH
    Analysis shows that human actions are overwhelmingly at the heart of many data breaches, and cyber attackers are actively seeking to exploit this to compromise target systems.

    If global organisations and nation states with their considerable resources and budgets are struggling to stem the flow of data breaches from this threat, what hope do ordinary businesses have of protecting themselves in 2019 and beyond?

    Join us for a comprehensive and insightful webinar from Daryl Flack, CIO and Co-Founder of BLOCKPHISH, who will use examples drawn from real attacks to reveal why, if you invest in your staff, you can be more confident in your ability to be resilient to cyber-attacks.
  • Creating a Winning Security Strategy for 2019 Recorded: Dec 5 2018 49 mins
    Israel Barak, Cybereason | Dario Forte, DFLabs
    Cyber attacks on businesses, organizations and critical infrastructure becoming the norm in 2018. Massive breaches are constantly in the news and consumers are demanding stricter data and privacy protections. Cybersecurity has never been more important to organizations, and the investment in security technology has never been greater.

    CISOs are in the spotlight, and are looking to build the best strategy to secure their organizations, customers and users.

    Join top security experts for an interactive Q&A panel discussion on:
    - The key factors CISOs should consider for their cybersecurity strategy
    - The current and future threatscape
    - Platform Security for 2019
    - Technological solutions that make CISOs' lives easier
    - How organizations are coping with the shortage of qualified security workforce
    - How CISOs can better communicate their strategy to the board

    Israel Barak,CSO, Cybereason
    Dario Forte, CEO, DFLabs

    Panel moderated by:
    Amar Singh, Founder & CEO, Cyber Management Alliance
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Hacking the Hypervisor
  • Live at: Jun 16 2011 6:00 pm
  • Presented by: Joshua Pennell, Founder and President, IOActive, Inc.
  • From:
Your email has been sent.
or close