Hi [[ session.user.profile.firstName ]]

Application Whitelisting: the Good, the Bad, the Unknown

Join Bloor’s Senior Analyst for Security, Fran Howarth, and Jon Parkes, Vice President, Pre-Sales, McAfee EMEA to learn:

- the role that application whitelisting plays in defending networks against attack through a focus on two key areas—controlling what applications are allowed to run and preventing any unauthorised applications (including malware) from executing
- how to protect systems on the network from configuration changes and mistakes that can allow serious vulnerabilities to be exploited.

Fran Howarth specialises in the field of security, primarily information security, but with a keen interest in physical security and how the two are converging. Fran’s other main areas of interest are new delivery models, such as cloud computing, information governance, web, network and application security, identity and access management, and encryption.
For more than 20 years, Fran has worked in an advisory capacity as an analyst, consultant and writer. She writes regularly for a number of publications, including Silicon, Computer Weekly, Computer Reseller News, IT-Analysis and Computing Magazine. Fran is also a regular contributor to Security Management Practices of the Faulkner Information Services division of InfoToday.

Jon Parkes is responsible for all technical sales operations and solution architects for McAfee in EMEA – helping customers to realise solutions to meet their security and business needs, in an optimal way that balances cost of ownership with security posture. Like other IT functions, the security market is maturing, going through consolidation reflecting customers’ desire for trusted partnership with fewer suppliers. Jon’s twenty-year career has been built around global Enterprise consulting and software, working with some of the world’s largest businesses in many industry sectors, including telecommunications, utilities, financial services and Government, holding regional management positions in both EMEA and Asia Pacific.
Recorded Aug 10 2011 47 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Fran Howarth, Senior Analyst, Security, Bloor Research; Jon Parkes, Vice President, Pre-Sales EMEA, McAfee
Presentation preview: Application Whitelisting: the Good, the Bad, the Unknown

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • WannaCry Ransomware Attack: What You Need to Know & How to Protect Against It Jun 1 2017 6:00 pm UTC 60 mins
    Lance Cottrell (Ntrepid), Brian Minick (Morphick), Sven Krasser (CrowdStrike), RJ Gazarek (Thycotic)
    The recent WannaCry ransomware attack was unprecedented in scale. With over 230,000 computers infected in over 150 countries, it is the largest cyberextortion scheme ever. More importantly, some experts fear that the danger is far from over.

    Join this panel of security leaders as they discuss:
    - What is WannaCry?
    - Why did it spread so quickly and at such a scale?
    - How can we protect our companies against this and similar cyber attacks?
    - Threatscape: What can we expect to see in the future?

    Speakers:
    - Lance Cottrell, Chief Scientist at Ntrepid Corp.
    - Brian Minick, CEO of Morphick
    - Sven Krasser, Chief Scientist at CrowdStrike
    - RJ Gazarek, Product Manager at Thycotic
  • How to Securely Configure a Linux Host to Run Docker Jun 1 2017 5:00 pm UTC 45 mins
    Kevin Lewis, Solution Architect, Twistlock
    Learn how to securely configure host settings and Docker Engine.

    Docker allows teams to increase the speed and scale that they can deliver software. As a result, adoption rates for docker are accelerating as more organizations are looking for ways to innovate faster.

    As you move down the path to containers, it is important to note that an out-of-the box installation of just about any Linux distribution is capable of running the Docker daemon and Docker containers, but it will leave your host exposed to many security and performance concerns if not configured properly.

    Join us for this webinar to learn how to:
    - Configure host settings to harden and protect it from unauthorized access
    - Install and configure a Docker Engine with minimal attack surface
    - Ensure that the host has the necessary integration with existing enterprise systems like SIEM and enterprise directories
  • Black Hat USA 2017: Women Wanted Jun 1 2017 4:00 pm UTC 60 mins
    Daniel Cuthbert, COO of SensePost and Jessica Gulick from Women's Society of Cyberjutsu
    Join Daniel Cuthbert, COO of SensePost and Jessica Gulick from Women's Society of Cyberjutsu for an informative discussion on what you need to know about attending Black Hat USA 2017 conference this July in Las Vegas. We will share tips and lessons learned from selecting and attending the training courses and conference. The WSC is offering a special discount (save $200) on registration by using code WSCBH17.
  • The Role of the End User: your strongest line of defence against cyber-attack Jun 1 2017 12:00 pm UTC 45 mins
    Steve Durbin, Managing Director, ISF LTD
    People remain a wild card to the cyber security of an organisation. Many businesses recognise people as their biggest asset, yet still fail to recognise the need to secure the human element of information security.

    In this webinar Steve Durbin, Managing Director of the ISF, tackles the question: How can organisations make people their strongest line of defence against cyber attack?
  • Wannacry Ransomware & The Future of Cyber Attacks May 31 2017 6:00 pm UTC 60 mins
    Mark Weatherford (vArmour), Gary Hayslip (Webroot), Simon Crosby (Bromium)
    As organizations worldwide are trying to get back to normal in the messy aftermath of the biggest ransomware attack to date, cybersecurity experts see this attack as a warning. If even basic malware can leave such a global impact on enterprises, health organizations, universities and other organizations, what would a more sophisticated attack look like?

    Join this CISO panel of security leaders as they discuss:
    - The impact of Wannacry and the reasons behind it
    - What can we learn from this attack and steps to take today
    - How likely are we to see this type of attack repeated on a more devastating scale in the future
    - What should organizations and enterprises do to improve their security posture in the age of ransomware, phishing scams, and IoT

    Speakers:
    - Mark Weatherford, Chief Cybersecurity Strategist at vArmour
    - Gary Hayslip, CISO of Webroot
    - Simon Crosby, CTO of Bromium
  • Anatomy of WannaCry - Learning from the Ransomware that Paralyzed Global Systems Recorded: May 26 2017 57 mins
    Paul Schofield, Director, Partner Architecture & Enablement, enSilo
    In early May, the world witnessed a massive ransomware campaign that had a crippling effect on businesses in multiple industries across the globe. What made this ransomware, called WannaCry, so different than others was the ransomware’s ability to combine lateral movement. As opposed to other ransomware that typically infects a few devices within an organization, WannaCry had worm-like capabilities, spreading itself throughout the organizational network and hitting servers.

    While a “kill-switch” was used against WannaCry, organizations are undoubtedly going to continue suffering from WannaCry’s remnants within organizations. More so, the impact of WannaCry will motivate ransomware authors to start adopting lateral movement capabilities. Yet, with all the advanced malware techniques, security professionals are required to ensure the continuous operations of their systems.

    In this webinar, you will:
    - Learn about EternalBlue - the exploit in Microsoft's implementation of the SMB protocol that enabled WannaCry to propagate throughout the organization
    - Watch how WannaCry attacks an unpatched endpoint and encrypts data
    - Receive strategies and best practices to ensure that your systems are protected from advanced ransomware
  • Mobile DevSecOps 101: Common slip-ups in embedding mobile app security testing Recorded: May 25 2017 32 mins
    Brian Lawrence, NowSecure Solutions Engineer & Keith Mokris, NowSecure Product Marketing Leader
    Developers and DevOps engineers want to fail fast, iterate, and continuously improve. If security practioners want to join in the fun, they need to integrate security assessments into existing mobile DevOps workflows and toolchains. This webinar will teach security professionals, developers, and DevOps engineers how to avoid common mistakes in embedding automated app security testing into mobile DevOps practices.

    Join NowSecure Solutions Engineer Brian Lawrence and Product Marketing Leader Keith Mokris to learn how to do things like:

    -- Address DevOps stakeholders' worries and concerns about integrating security testing
    -- Determine the right depth of analysis for continuous mobile app security testing
    -- Track mobile DevSecOps metrics over time to measure success
  • Malware in Disguise & How to Spot It [Ransomware, Phishing] Recorded: May 24 2017 56 mins
    Alex Holden, CISO of Hold Security
    On the surface, spotting malicious attacks can be difficult. Hackers are expanding their malware distribution networks by exploiting commonly used applications to carry and distribute their malicious software. In the wake of the three major attacks Wanna Cry, DocuSign, and Google Docs malware outbreak we will examine how malware is distributed and provide guidelines on how to secure infrastructures against the next attack.

    About the Presenter:
    Alex Holden is the founder and CISO of Hold Security. Holden is credited with the discovery of many high profile breaches including Adobe Systems, initial vendor breach that led to the discovery of the JPMorgan Chase breach, and the independent discovery of the Target and Yahoo breaches. Considered one of the leading security experts, he regularly voices his professional opinion in mainstream media.
  • [VIDEO] Man & Machine: Analytics as a Defence Against Advanced Cyber Threats Recorded: May 24 2017 30 mins
    Ross Brewer, vice president and managing director EMEA, LogRhythm & Josh Downs, Senior Community Manager, BrightTALK
    As technology advances, so does the threat landscape, with cyber criminals effectively exploiting weak points on an almost daily basis. When malware infiltrates an organisation’s first layer of defence, it can spread quickly throughout the network, exposing data and weakening security - and in most cases this happens faster than analysts or administrators have time to react to. Indeed, with reams of data being generated and transferred over networks, organisations are having a hard time monitoring everything, which means potential threats can easily go unnoticed.

    Organisations need to rely on machines to detect and respond to threats more quickly and efficiently. Even enterprises with a dedicated security team that monitors the latest security threat trends and understands the blueprint of evolving attack vectors still need to continuously monitor all network activity. The sheer volume of processes, services and applications running on a corporate network is just too much for human beings to monitor alone. However, this doesn’t mean that human analysis is not important.

    User and entity behavioural analytics (UEBA) is essential in keeping up with continuously evolving threats and making sense of anomalous network behaviour. Security approaches that utilise both machine learning and human analysis enable all threats to be analysed for effective detection and response, ensuring all data is accounted for and including the human element to help reduce the opportunities for false positives. To keep up with the ever-changing security landscape, companies need to integrate internal and external threat context in their environment by updating processing rules for operating systems, applications, and network devices in order to strengthen the accuracy of real-time machine analytics.
  • Strategies for Effective 3rd Party Risk Management Recorded: May 23 2017 63 mins
    Scott Roller, Founder of 3WP; Rebecca Herold, Privacy Professor; Sam Kassoumeh, SecurityScorecard. James Christiansen, Optiv.
    The challenges that organizations face today are increasingly more complex than in the past. The constant change of the global economy, dynamics of business risks and opportunities, and an increased threat of cyber-attacks add complexities we’ve never faced. As organizations rely on more and more third parties to grow and thrive, they’re exposed to higher levels of risk, and regulators are focused on the need for organizations to manage 3rd party risk more effectively.

    Manual processes, silos in contract administration, and technology and resource constraints can all lead to significant errors in the third party supply chain that leads to violation of privacy guidelines and security breaches, which cause substantial fines, penalties, and damage to brand value. On this webinar our panel of experts will discuss the risks and repercussions associated with third party contract management shortcomings, common gaps in third party contract management processes, examples of how new solutions and technologies can help organizations optimize their third party processes, and effective strategies for managing 3rd Party Risk.
  • GDPR: Global Implications of EU Legislation Recorded: May 23 2017 62 mins
    Jonathan Armstrong, Cordery & Nima Baiati, Absolute
    Enforcement of the EU General Data Protection Regulation (GDPR) is looming, giving you less than 12 months to prepare. And it has major implications for every organization that processes EU personal data – regardless of where they are based.

    With the cost of non-compliance set at an astronomical 4% of global annual revenue – not to mention damage to reputation – the time to protect yourself is now.

    On May 23rd, join Absolute’s data protection experts alongside leading technology and compliance lawyer Jonathan Armstrong, as they share practical insights on the global implications of GDPR. Register today and learn:

    • GDPR compliance – what’s required and what’s at stake
    • Organizational steps you need to take now to avert disaster
    • The best security approaches to ensure compliance and protect your data – and your brand
  • Don’t let Smartphones Kill your PKI Security Strategy Recorded: May 23 2017 51 mins
    Gregory Vigroux, Enterprise Mobility Expert at Gemalto
    Half of businesses admit security is their biggest concern to increasing user mobility. Securing enterprise mobility has been an ongoing and arduous topic for IT security professionals. Maintaining high-assurance security, while offering access to company resources to an on-the-go workforce has become a balancing act. So much so, a third of businesses actually prevent employee access to company resources via mobile. This is likely not a long term or sustainable solution to the problem.

    So how do you find a compromise that won’t kill your security strategy? There are currently many technologies from derived credentials to mobile PKI. IT professionals are feeling the pressure to find a viable, user friendly, easy-to-deploy and secure options. In this webinar, we will discuss the current solutions in-depth and how they impact your current IT security policies. Attendees will learn more about:
    -Software-based security versus hardware-based security
    -How this impacts your back-end systems
    -Technology such as derived credentials and mobile PKI
    -Implementing a mobile PKI solution
  • [Video Interview] AI & Machine Learning in Cyber Security: The IBM View Recorded: May 23 2017 10 mins
    Josh Downs, BrightTALK & Martin Borrett, CTO, IBM Security Europe
    - BrightTALK at CRESTCON & IISP Congress -

    BrightTALK caught up with IBM Security Europe's Martin Borrett for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - AI & machine learning and the influence that the technology will have on the security space

    - The ins and outs of AI & machine learning and how it analyses your data looking for security incidents

    - How to find a good solution to suit all budgets

    - The growth of IoT networks and how we can look to protect them effectively

    - V2V security and how to ensure connected cars are protected from cyber threats

    - The threatscape in 2017; the threat actors, motives and attack techniques
  • WannaCry Ransomware: Why Kill Switches Will Not Protect You Recorded: May 22 2017 35 mins
    Mounir Hahad, Sr. Director of Cyphort Labs
    The world is experiencing a ransomware attack like no other. While the wave of infections was spreading from East to West, a kill switch was identified that slowed the campaign considerably. Then another kill switch was needed, then another. Against popular belief, these kill switches are only effective against the original strain of the malware. In this presentation, we will review a variant without a registerable web site kill switch and how to protect against it.

    Join this webinar and ask your most pressing WannaCry questions.

    About the Presenter:
    Mounir Hahad, Ph.D. is Sr Director at Cyphort, a Security Analytics company headquartered in Santa Clara, CA. Mounir is the head of Cyphort Labs, the group responsible for conducting threat research within Cyphort and driving detection enhancements for Cyphort’s Advanced Detection Fabric which uses behavioral analysis along with machine learning to detect advanced threats and correlate those incidents with ingested information from third party solutions. Mounir holds a Ph.D. in computer science from the University of Rennes. Prior to Cyphort, Mounir held various engineering management positions with Cisco’s Security Technology Group and with IronPort Systems.
  • Google Docs Worm - Facts, Resolution & Why This Scam Will Happen Again Recorded: May 19 2017 41 mins
    Travis Smith (Tripwire), Cameron Naghdi (Malwarebytes), Filippo Valsorda (Cloudflare)
    Attacks like the Google Docs phishing scam that swept across the internet in early May showed a level of sophistication above regular phishing scams. More importantly, it will likely happen to other online services, thanks to a common login mechanism that is used by hundreds of websites.

    Join this panel of security experts as they discuss:
    - The nuts and bolts of the Google Docs worm
    - How it was resolved
    - What to expect in the future
    - How to avoid becoming a victim to phishing scam: What to look out for and what NOT to do

    Speakers:
    - Travis Smith, Principal Security Researcher at Tripwire
    - Cameron Naghdi, Sr. Security Engineer at Malwarebytes
    - Filippo Valsorda of the Crypto Team at Cloudflare
  • Detecting Insider Threats: Lessons from the Front Line Recorded: May 19 2017 44 mins
    Brian White (RedOwl) & Mark Kelton (ex-CIA)
    Join us for this rare opportunity to hear Mark Kelton, a former senior CIA official, who concluded his career as Deputy Director of the National Clandestine Service for Counterintelligence, discuss the insider threat.

    Mr. Kelton led the unit that protected the Nation’s most closely guarded secrets – and by virtue of his experience overseeing the Intelligence Community’s “Gold Standard” Insider Threat Detection program, Mr. Kelton has comprehensive expertise in the detection, investigation and mitigation of Insider Threats.
  • Securing Fintech: Threats, Challenges & Best Practices Recorded: May 18 2017 60 mins
    Ulf Mattsson, CTO Security Solutions at Atlantic BT
    Cyber attacks have increased in frequency and severity, and financial institutions are particularly interesting targets to cyber criminals. Join this presentation to learn the latest cybersecurity threats and challenges plaguing the financial industry, and the policies and solutions your organization needs to have in place to protect against them.

    Viewers will learn:
    • Current trends in Cyber attacks
    • FFIEC Cyber Assessment Toolkit
    • NIST Cybersecurity Framework principles
    • Security Metrics
    • Oversight of third parties
    • How to measure cybersecurity preparedness
    • Automated approaches to integrate Security into DevOps

    About the Presenter:
    Ulf Mattsson is the Chief Technology Officer of Security Solutions at Atlantic BT, and earlier at Compliance Engineering. Ulf was the Chief Technology Officer and a founder of Protegrity, He invented the Protegrity Vaultless Tokenization, Data Type Preservation (DTP2) and created the initial architecture of Protegrity's database security technology. Prior to Protegrity, Ulf worked 20 years at IBM in software development and in IBM's Research organization, in the areas of IT Architecture and Security, and received a US Green Card of class ‘EB 11 – Individual of Extraordinary Ability’ after endorsement by IBM. Ulf is the inventor of more than 45 patents in the areas of Encryption, Policy Driven Data Encryption, Internal Threat Protection, Data Usage Control and Intrusion Prevention.
  • Exploit Kits: Getting in by Any Means Necessary Recorded: May 18 2017 50 mins
    Scott Simkin, Senior Threat Intelligence Manager, Palo Alto Networks
    By understanding the inner workings of exploit kits, you’ll be better equipped to protect your organization from them. Join Scott Simkin from Unit 42 as he breaks down how today’s attackers are automatically exploiting vulnerabilities in common systems.

    You’ll learn about:

    - Why exploit kits are increasing in popularity
    - The process for launching exploit kit campaigns
    - How to defend your organization from exploits
  • Ransomware in the Age of Wannacry: What Fintech Needs to Know Recorded: May 18 2017 45 mins
    John Bambenek, Threat Systems Manager at Fidelis Cybersecurity
    This past week we saw the emergence of a worm-based ransomware attack in wannacry that showed us how damaging these attacks can be to critical services society relies on.

    This presentation will cover the recent wannacry attacks and what we have learned from them. In addition, we'll discuss the evolution of ransomware in recent years, focusing on attacks targeted against enterprises and so-called "high-interaction" ransomware attacks. Attendees will also be given a path forward of protecting their institution. A discussion of the renewal of Business Continuity and Disaster Recovery as a result and what this means for fintech going forward.

    About the Presenter:
    John Bambenek is Manager of Threat Intelligence Systems at Fidelis Cybersecurity and an incident handler with the Internet Storm Center. He is also a faculty member of the Department of Computer Science at the University of Illinois where he teaches courses in cybersecurity. He has been researching security threats and criminal organizations for 17 years and coordinating with US and foreign law enforcement entities to help bring criminal actors to justice.
  • Real-time Threat Hunting - 451 Research Trends & Security Analytics Recorded: May 18 2017 58 mins
    Jason Stamper, Analyst, 451 Research and Eric Tran-le, CMO, Logtrust
    Every day, organizations are impacted by cyber-attacks. Misleading indicators, complex security incidents, and evolving intruder patterns require new threat intelligence and analytics. With millions of data to analyze, every second counts - augment your security tools with real-time threat hunting capabilities and new research insights.

    Join experts Jason Stamper, Analyst for 451 Research, and Eric Tran-le, CMO for Logtrust, as they affirm how essential real-time threat hunting is for cybersecurity teams, and share new insights and tools for combatting attacks.

    • Learn new trends in machine data analytics from 451 Research
    • Pinpoint cybersecurity attacks and unusual behavior
    • Visualize an attack graph
    • Detect intruder paths and potential vulnerabilities
    • Leverage a single source of truth
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Application Whitelisting: the Good, the Bad, the Unknown
  • Live at: Aug 10 2011 9:00 am
  • Presented by: Fran Howarth, Senior Analyst, Security, Bloor Research; Jon Parkes, Vice President, Pre-Sales EMEA, McAfee
  • From:
Your email has been sent.
or close