Hi [[ session.user.profile.firstName ]]

What a Hacker Thinks and how to Protect Your Business from one?

Take a look into a hacker’s brain. What do they think? Who do they target? What motivates them?
Recorded Apr 10 2013 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Stephen Cobb, Security Evangelist, ESET North America
Presentation preview: What a Hacker Thinks and how to Protect Your Business from one?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Wannacry Ransomware & The Future of Cyber Attacks May 31 2017 6:00 pm UTC 60 mins
    Mark Weatherford (vArmour), Gary Hayslip (Webroot), Simon Crosby (Bromium)
    As organizations worldwide are trying to get back to normal in the messy aftermath of the biggest ransomware attack to date, cybersecurity experts see this attack as a warning. If even basic malware can leave such a global impact on enterprises, health organizations, universities and other organizations, what would a more sophisticated attack look like?

    Join this CISO panel of security leaders as they discuss:
    - The impact of Wannacry and the reasons behind it
    - What can we learn from this attack and steps to take today
    - How likely are we to see this type of attack repeated on a more devastating scale in the future
    - What should organizations and enterprises do to improve their security posture in the age of ransomware, phishing scams, and IoT

    Speakers:
    - Mark Weatherford, Chief Cybersecurity Strategist at vArmour
    - Gary Hayslip, CISO of Webroot
    - Simon Crosby, CTO of Bromium
  • Anatomy of WannaCry - Learning from the Ransomware that Paralyzed Global Systems May 26 2017 5:00 pm UTC 60 mins
    Paul Schofield, Director, Partner Architecture & Enablement, enSilo
    In early May, the world witnessed a massive ransomware campaign that had a crippling effect on businesses in multiple industries across the globe. What made this ransomware, called WannaCry, so different than others was the ransomware’s ability to combine lateral movement. As opposed to other ransomware that typically infects a few devices within an organization, WannaCry had worm-like capabilities, spreading itself throughout the organizational network and hitting servers.

    While a “kill-switch” was used against WannaCry, organizations are undoubtedly going to continue suffering from WannaCry’s remnants within organizations. More so, the impact of WannaCry will motivate ransomware authors to start adopting lateral movement capabilities. Yet, with all the advanced malware techniques, security professionals are required to ensure the continuous operations of their systems.

    In this webinar, you will:
    - Learn about EternalBlue - the exploit in Microsoft's implementation of the SMB protocol that enabled WannaCry to propagate throughout the organization
    - Watch how WannaCry attacks an unpatched endpoint and encrypts data
    - Receive strategies and best practices to ensure that your systems are protected from advanced ransomware
  • Mobile DevSecOps 101: Common slip-ups in embedding mobile app security testing May 25 2017 6:00 pm UTC 45 mins
    Brian Lawrence, NowSecure Solutions Engineer & Keith Mokris, NowSecure Product Marketing Leader
    Developers and DevOps engineers want to fail fast, iterate, and continuously improve. If security practioners want to join in the fun, they need to integrate security assessments into existing mobile DevOps workflows and toolchains. This webinar will teach security professionals, developers, and DevOps engineers how to avoid common mistakes in embedding automated app security testing into mobile DevOps practices.

    Join NowSecure Solutions Engineer Brian Lawrence and Product Marketing Leader Keith Mokris to learn how to do things like:

    -- Address DevOps stakeholders' worries and concerns about integrating security testing
    -- Determine the right depth of analysis for continuous mobile app security testing
    -- Track mobile DevSecOps metrics over time to measure success
  • Malware in Disguise & How to Spot It [Ransomware, Phishing] Recorded: May 24 2017 56 mins
    Alex Holden, CISO of Hold Security
    On the surface, spotting malicious attacks can be difficult. Hackers are expanding their malware distribution networks by exploiting commonly used applications to carry and distribute their malicious software. In the wake of the three major attacks Wanna Cry, DocuSign, and Google Docs malware outbreak we will examine how malware is distributed and provide guidelines on how to secure infrastructures against the next attack.

    About the Presenter:
    Alex Holden is the founder and CISO of Hold Security. Holden is credited with the discovery of many high profile breaches including Adobe Systems, initial vendor breach that led to the discovery of the JPMorgan Chase breach, and the independent discovery of the Target and Yahoo breaches. Considered one of the leading security experts, he regularly voices his professional opinion in mainstream media.
  • [VIDEO] Man & Machine: Analytics as a Defence Against Advanced Cyber Threats Recorded: May 24 2017 30 mins
    Ross Brewer, vice president and managing director EMEA, LogRhythm & Josh Downs, Senior Community Manager, BrightTALK
    As technology advances, so does the threat landscape, with cyber criminals effectively exploiting weak points on an almost daily basis. When malware infiltrates an organisation’s first layer of defence, it can spread quickly throughout the network, exposing data and weakening security - and in most cases this happens faster than analysts or administrators have time to react to. Indeed, with reams of data being generated and transferred over networks, organisations are having a hard time monitoring everything, which means potential threats can easily go unnoticed.

    Organisations need to rely on machines to detect and respond to threats more quickly and efficiently. Even enterprises with a dedicated security team that monitors the latest security threat trends and understands the blueprint of evolving attack vectors still need to continuously monitor all network activity. The sheer volume of processes, services and applications running on a corporate network is just too much for human beings to monitor alone. However, this doesn’t mean that human analysis is not important.

    User and entity behavioural analytics (UEBA) is essential in keeping up with continuously evolving threats and making sense of anomalous network behaviour. Security approaches that utilise both machine learning and human analysis enable all threats to be analysed for effective detection and response, ensuring all data is accounted for and including the human element to help reduce the opportunities for false positives. To keep up with the ever-changing security landscape, companies need to integrate internal and external threat context in their environment by updating processing rules for operating systems, applications, and network devices in order to strengthen the accuracy of real-time machine analytics.
  • Strategies for Effective 3rd Party Risk Management Recorded: May 23 2017 63 mins
    Scott Roller, Founder of 3WP; Rebecca Herold, Privacy Professor; Sam Kassoumeh, SecurityScorecard. James Christiansen, Optiv.
    The challenges that organizations face today are increasingly more complex than in the past. The constant change of the global economy, dynamics of business risks and opportunities, and an increased threat of cyber-attacks add complexities we’ve never faced. As organizations rely on more and more third parties to grow and thrive, they’re exposed to higher levels of risk, and regulators are focused on the need for organizations to manage 3rd party risk more effectively.

    Manual processes, silos in contract administration, and technology and resource constraints can all lead to significant errors in the third party supply chain that leads to violation of privacy guidelines and security breaches, which cause substantial fines, penalties, and damage to brand value. On this webinar our panel of experts will discuss the risks and repercussions associated with third party contract management shortcomings, common gaps in third party contract management processes, examples of how new solutions and technologies can help organizations optimize their third party processes, and effective strategies for managing 3rd Party Risk.
  • GDPR: Global Implications of EU Legislation Recorded: May 23 2017 62 mins
    Jonathan Armstrong, Cordery & Nima Baiati, Absolute
    Enforcement of the EU General Data Protection Regulation (GDPR) is looming, giving you less than 12 months to prepare. And it has major implications for every organization that processes EU personal data – regardless of where they are based.

    With the cost of non-compliance set at an astronomical 4% of global annual revenue – not to mention damage to reputation – the time to protect yourself is now.

    On May 23rd, join Absolute’s data protection experts alongside leading technology and compliance lawyer Jonathan Armstrong, as they share practical insights on the global implications of GDPR. Register today and learn:

    • GDPR compliance – what’s required and what’s at stake
    • Organizational steps you need to take now to avert disaster
    • The best security approaches to ensure compliance and protect your data – and your brand
  • Don’t let Smartphones Kill your PKI Security Strategy Recorded: May 23 2017 51 mins
    Gregory Vigroux, Enterprise Mobility Expert at Gemalto
    Half of businesses admit security is their biggest concern to increasing user mobility. Securing enterprise mobility has been an ongoing and arduous topic for IT security professionals. Maintaining high-assurance security, while offering access to company resources to an on-the-go workforce has become a balancing act. So much so, a third of businesses actually prevent employee access to company resources via mobile. This is likely not a long term or sustainable solution to the problem.

    So how do you find a compromise that won’t kill your security strategy? There are currently many technologies from derived credentials to mobile PKI. IT professionals are feeling the pressure to find a viable, user friendly, easy-to-deploy and secure options. In this webinar, we will discuss the current solutions in-depth and how they impact your current IT security policies. Attendees will learn more about:
    -Software-based security versus hardware-based security
    -How this impacts your back-end systems
    -Technology such as derived credentials and mobile PKI
    -Implementing a mobile PKI solution
  • [Video Interview] AI & Machine Learning in Cyber Security: The IBM View Recorded: May 23 2017 10 mins
    Josh Downs, BrightTALK & Martin Borrett, CTO, IBM Security Europe
    - BrightTALK at CRESTCON & IISP Congress -

    BrightTALK caught up with IBM Security Europe's Martin Borrett for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - AI & machine learning and the influence that the technology will have on the security space

    - The ins and outs of AI & machine learning and how it analyses your data looking for security incidents

    - How to find a good solution to suit all budgets

    - The growth of IoT networks and how we can look to protect them effectively

    - V2V security and how to ensure connected cars are protected from cyber threats

    - The threatscape in 2017; the threat actors, motives and attack techniques
  • WannaCry Ransomware: Why Kill Switches Will Not Protect You Recorded: May 22 2017 35 mins
    Mounir Hahad, Sr. Director of Cyphort Labs
    The world is experiencing a ransomware attack like no other. While the wave of infections was spreading from East to West, a kill switch was identified that slowed the campaign considerably. Then another kill switch was needed, then another. Against popular belief, these kill switches are only effective against the original strain of the malware. In this presentation, we will review a variant without a registerable web site kill switch and how to protect against it.

    Join this webinar and ask your most pressing WannaCry questions.

    About the Presenter:
    Mounir Hahad, Ph.D. is Sr Director at Cyphort, a Security Analytics company headquartered in Santa Clara, CA. Mounir is the head of Cyphort Labs, the group responsible for conducting threat research within Cyphort and driving detection enhancements for Cyphort’s Advanced Detection Fabric which uses behavioral analysis along with machine learning to detect advanced threats and correlate those incidents with ingested information from third party solutions. Mounir holds a Ph.D. in computer science from the University of Rennes. Prior to Cyphort, Mounir held various engineering management positions with Cisco’s Security Technology Group and with IronPort Systems.
  • Google Docs Worm - Facts, Resolution & Why This Scam Will Happen Again Recorded: May 19 2017 41 mins
    Travis Smith (Tripwire), Cameron Naghdi (Malwarebytes), Filippo Valsorda (Cloudflare)
    Attacks like the Google Docs phishing scam that swept across the internet in early May showed a level of sophistication above regular phishing scams. More importantly, it will likely happen to other online services, thanks to a common login mechanism that is used by hundreds of websites.

    Join this panel of security experts as they discuss:
    - The nuts and bolts of the Google Docs worm
    - How it was resolved
    - What to expect in the future
    - How to avoid becoming a victim to phishing scam: What to look out for and what NOT to do

    Speakers:
    - Travis Smith, Principal Security Researcher at Tripwire
    - Cameron Naghdi, Sr. Security Engineer at Malwarebytes
    - Filippo Valsorda of the Crypto Team at Cloudflare
  • Detecting Insider Threats: Lessons from the Front Line Recorded: May 19 2017 44 mins
    Brian White (RedOwl) & Mark Kelton (ex-CIA)
    Join us for this rare opportunity to hear Mark Kelton, a former senior CIA official, who concluded his career as Deputy Director of the National Clandestine Service for Counterintelligence, discuss the insider threat.

    Mr. Kelton led the unit that protected the Nation’s most closely guarded secrets – and by virtue of his experience overseeing the Intelligence Community’s “Gold Standard” Insider Threat Detection program, Mr. Kelton has comprehensive expertise in the detection, investigation and mitigation of Insider Threats.
  • Securing Fintech: Threats, Challenges & Best Practices Recorded: May 18 2017 60 mins
    Ulf Mattsson, CTO Security Solutions at Atlantic BT
    Cyber attacks have increased in frequency and severity, and financial institutions are particularly interesting targets to cyber criminals. Join this presentation to learn the latest cybersecurity threats and challenges plaguing the financial industry, and the policies and solutions your organization needs to have in place to protect against them.

    Viewers will learn:
    • Current trends in Cyber attacks
    • FFIEC Cyber Assessment Toolkit
    • NIST Cybersecurity Framework principles
    • Security Metrics
    • Oversight of third parties
    • How to measure cybersecurity preparedness
    • Automated approaches to integrate Security into DevOps

    About the Presenter:
    Ulf Mattsson is the Chief Technology Officer of Security Solutions at Atlantic BT, and earlier at Compliance Engineering. Ulf was the Chief Technology Officer and a founder of Protegrity, He invented the Protegrity Vaultless Tokenization, Data Type Preservation (DTP2) and created the initial architecture of Protegrity's database security technology. Prior to Protegrity, Ulf worked 20 years at IBM in software development and in IBM's Research organization, in the areas of IT Architecture and Security, and received a US Green Card of class ‘EB 11 – Individual of Extraordinary Ability’ after endorsement by IBM. Ulf is the inventor of more than 45 patents in the areas of Encryption, Policy Driven Data Encryption, Internal Threat Protection, Data Usage Control and Intrusion Prevention.
  • Exploit Kits: Getting in by Any Means Necessary Recorded: May 18 2017 50 mins
    Scott Simkin, Senior Threat Intelligence Manager, Palo Alto Networks
    By understanding the inner workings of exploit kits, you’ll be better equipped to protect your organization from them. Join Scott Simkin from Unit 42 as he breaks down how today’s attackers are automatically exploiting vulnerabilities in common systems.

    You’ll learn about:

    - Why exploit kits are increasing in popularity
    - The process for launching exploit kit campaigns
    - How to defend your organization from exploits
  • Ransomware in the Age of Wannacry: What Fintech Needs to Know Recorded: May 18 2017 45 mins
    John Bambenek, Threat Systems Manager at Fidelis Cybersecurity
    This past week we saw the emergence of a worm-based ransomware attack in wannacry that showed us how damaging these attacks can be to critical services society relies on.

    This presentation will cover the recent wannacry attacks and what we have learned from them. In addition, we'll discuss the evolution of ransomware in recent years, focusing on attacks targeted against enterprises and so-called "high-interaction" ransomware attacks. Attendees will also be given a path forward of protecting their institution. A discussion of the renewal of Business Continuity and Disaster Recovery as a result and what this means for fintech going forward.

    About the Presenter:
    John Bambenek is Manager of Threat Intelligence Systems at Fidelis Cybersecurity and an incident handler with the Internet Storm Center. He is also a faculty member of the Department of Computer Science at the University of Illinois where he teaches courses in cybersecurity. He has been researching security threats and criminal organizations for 17 years and coordinating with US and foreign law enforcement entities to help bring criminal actors to justice.
  • Real-time Threat Hunting - 451 Research Trends & Security Analytics Recorded: May 18 2017 58 mins
    Jason Stamper, Analyst, 451 Research and Eric Tran-le, CMO, Logtrust
    Every day, organizations are impacted by cyber-attacks. Misleading indicators, complex security incidents, and evolving intruder patterns require new threat intelligence and analytics. With millions of data to analyze, every second counts - augment your security tools with real-time threat hunting capabilities and new research insights.

    Join experts Jason Stamper, Analyst for 451 Research, and Eric Tran-le, CMO for Logtrust, as they affirm how essential real-time threat hunting is for cybersecurity teams, and share new insights and tools for combatting attacks.

    • Learn new trends in machine data analytics from 451 Research
    • Pinpoint cybersecurity attacks and unusual behavior
    • Visualize an attack graph
    • Detect intruder paths and potential vulnerabilities
    • Leverage a single source of truth
  • Trends in Fintech Security - Mobile Payment Apps, Risks & Cybersecurity Recorded: May 18 2017 75 mins
    Ted Eull (NowSecure), JP Bourget (Syncurity), RJ Gazarek (Thycotic), Jason Kent (AsTech)
    Fintech may still be in its early stages, but it's seen tremendous growth and is expected to see global investments exceed $150 billion in 2017. With the proliferation of mobile apps, cybersecurity is extremely important. Trust is a key difference maker for customers, so fintech companies need to ensure that their sensitive client information stays secure.

    Join this panel roundtable of cyber security experts as they discuss:
    - The top cyber threats financial institutions are facing
    - Ransomware, data loss & BCDR
    - Mobile banking apps and security vulnerabilities
    - Recommendations on improving security and establishing consumer trust

    Speakers:
    - JP Bourget, CSO of Syncurity
    - Ted Eull, VP Privacy and Risk at NowSecure
    - RJ Gazarek, Product Manager at Thycotic
    - Jason Kent, CTO of AsTech Consulting
  • How to Recover from the WanaCrypt Ransomware Attack Recorded: May 18 2017 60 mins
    Phil Richards (CISO), Chris Goettl, and Amber Boehm of Ivanti Software
    On Friday the news broke: a massive ransomware attack which started in the UK NHS immediately spread to global proportions. By Sunday, the attack had impacted over 200,000 organizations in 150 countries. Listen to Phil Richards, CSO of Ivanti and a panel of security experts discuss how to recover from the WanaCrypt Ransomware attack and safeguard your environment against the evolving threats that are likely to come.

    Presenters:
    • Phil Richards, CISO
    • Chris Goettl, Manager of Product Management, Security

    About Phil Richards:
    Phil Richards is the Chief Information Security Officer (CISO) for Ivanti. He has held other senior security positions including the head of operational security for Varian Medical Systems, Chief Security Officer for Fundtech Corporation and Business Security Director for Fidelity Investments.
  • [Video Panel] Fighting Ransomware & Responding if the Worst Happens Recorded: May 18 2017 47 mins
    Josh Downs, BrightTALK; Adrian Taylor, FireEye; Ian Whiting, Titania & Bart Parys, PwC
    Ransomware was one of the biggest threats facing businesses in 2016 and that trend is expected to continue as we press further into 2017.

    As more and more cheap malware becomes available to cyber criminals the sheer amount of ransomware attacks is on the rise.

    However, cyber defences are beginning to catch up.

    This expert video panel will be discussing the ransomware landscape, what you can do to better protect your business from the threat and steps to take should the worst happen.

    Panelists:

    - Josh Downs, BrightTALK (moderator)

    - Adrian Taylor, Field CTO, FireEye

    - Ian Whiting, CEO, Titania

    - Bart Parys, Threat Intelligence Analyst, PwC
  • Politics and Cyber Attacks: Techniques, Prevention & Influence Recorded: May 18 2017 34 mins
    Indy Dhami, Director & Independent Security Consultant
    Focus of the talk:

    The current global political climate and the increased number of cyber attacks associated with nation states and revelations from whistleblowers such as WikiLeaks. The strategies and potential reasons for such attacks – We are seeing a focus shifting from financial gain
    to political power, control and mass surveillance.

    Audience learning:

    A view of the technologies utilised and targeted to perform the attacks such as malware targets such as iPhones, Android devices and smart TVs and malware on Windows, Osx, Linux etc

    Audience takeaways:

    The talk is aimed at those with a general interest in Cyber Security and how political gain is firmly intertwined and a tool utilised in state sponsored cyber attacks indiscriminately against corporations, criminals and citizens alike.

    ------------------

    Indy possesses over 14 years’ experience, having worked in both
    operational and consulting positions at FTSE100 and Fortune 500
    organisations including AXA, Deutsche Bank, PwC, Accenture,
    Mercedes-Benz, Jaguar Land Rover and many other world leading
    organisations.

    His experience includes leadership positions in information/
    cybersecurity transformation, risk assurance, crisis management
    (pre and post incident), assurance, audit, governance, risk and
    compliance programmes.
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: What a Hacker Thinks and how to Protect Your Business from one?
  • Live at: Apr 10 2013 5:00 pm
  • Presented by: Stephen Cobb, Security Evangelist, ESET North America
  • From:
Your email has been sent.
or close