Hi [[ session.user.profile.firstName ]]

Desktop Support and Data Breaches: The Unknown Dangers

According to the 2014 HDI Desktop Support Practices & Salary Report, remote control tops the “must have” list of technologies to successfully provide desktop support to end users. Unfortunately, many service desks are using legacy remote access tools that often leave security gaps putting companies at higher risk of data breaches. This is not a new or unknown issue. Often, IT departments don’t realize the tools they’re using to provide tech support are also being compromised by hackers to plant malware and steal data.  According to the 2013 Trustwave Global Security Report, legacy remote access tools such as RDP and VNC are cited year after year as the most common attack pathways used by hackers. So if remote control tools top the must-have list, what can service desks do to securely support their users without putting their organizations at risk?

This session will educate desktop support professionals on how hackers are targeting legacy systems and what they need to do to secure their environment.
Recorded Mar 17 2015 33 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Bryan Hood, Senior Solutions Engineer, Bomgar
Presentation preview: Desktop Support and Data Breaches: The Unknown Dangers

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • State of Endpoint Protection & How Machine Learning Helps Stop The Attacks Feb 22 2017 12:00 pm UTC 60 mins
    Robert Arandjelovic & Jose Carlos Cerezo
    In the world of endpoint security and antivirus there no less than 37 new endpoint security products that have emerged in the past five years, each claimed to address the changing landscape, but is it all just hype?

    Learn more about Machine Learning, what it is, how it works, and what else you need to protect yourself across all points of attack.

    Key Learning Objectives:

    •What is the state of the industry for Endpoint Protection technology
    •Why machine learning is not enough
    •Discover how to reduce the number of agents on your endpoint with the high-performance lightweight agent that includes advanced machine learning, exploit mitigation, antimalware, and more
  • Panel Discussion - AI & Machine Learning in Cyber Security Feb 22 2017 11:00 am UTC 60 mins
    Josh Downs, BrightTALK; John Laliberte, FireEye; Natalino Busa, TeraData & Neill Gernon, AI.Dublin and Atrovate
    A live online panel discussion focused on the debate around AI and machine learning and how they can automate cyber security; catch more threats and malicious attacks and prove a useful weapon against cyber crime.

    Panelists:

    - Josh Downs, Community Manager - Information Security, BrightTALK (moderator)

    - John Laliberte, VP, Endpoint and ICE, FireEye

    - Natalino Busa, Head of Applied Data, TeraData

    - Neil Gernon, MD, Atrovate & Founder, Dublin.AI
  • [Video Interview] RSA 2017 - Ian Glover & Rowland Johnson Feb 21 2017 2:00 pm UTC 45 mins
    Josh Downs, Community Manager, BrightTALK; Ian Glover, President, CREST & Rowland Johnson, MD, Nettitude
    BrightTALK will be broadcasting its in-depth interview with CREST President Ian Glover and Nettitude MD Rowland Johnson jointly in conversation.

    Topics up for discussion will include:

    - The new political climate and it's effect on Cyber Security and global cyber warfare

    - The supposed Russian hack on the 2016 US election

    - GDPR and what companies need to be doing to prepare for 2018

    - Equal opportunities in the information security industry

    - The rise of AI & Machine learning and how it'll influence the cyber world

    - IoT and how to keep connected devices all safe and secure

    - Incident response and steps to take if you've been breached!

    - The 2017 threatscape and what you shoud be concentrating on

    All this and much more - join us for the broadcast.
  • Cybersecurity Strategy: Success Cases and Avoidable Mistakes Feb 21 2017 11:00 am UTC 45 mins
    Peter Wood, CEO, First Base Technologies LLP
    Our cybersecurity consultancy practice works with multinational businesses through to medium-sized UK organisations. We see cybersecurity strategies that are impressive, comprehensive, misguided and non-existent. This webinar will distil some of the most creative and successful approaches, as well highlighting the mistakes to avoid. Our analysis is based on cyber readiness, cyber risks stress testing, cyber hygiene assessments and security gap analysis. Threat and risk assessments and red team exercises also provide an insight into the effectiveness of cybersecurity strategies.
  • Panel Discussion: Cyber Security Strategies and Trends in 2017 Feb 21 2017 9:00 am UTC 60 mins
    Jeff Costlow, ExtraHop Networks; Francois Raynaud, DevSecCon; Rami Mizrahi, TopSpin Security & Josh Downs, BrightTALK
    These days it's not a matter of if you'll be breached, but when. Security teams in the modern enterprise must accept that as well as efforts to protect their perimeter, they must also focus on understanding their east-west traffic.

    This panel discussion will look at the trends and technologies influencing cyber security strategy in 2017, in particular those that deal with effectively monitoring your network to ensure your organisation handles vulnerabilities and stays breach free.

    Panelists:

    - Josh Downs, Community Manager - Information Security, BrightTALK (moderator)

    - Jeff Costlow, Director of Security, ExtraHop Networks

    - Rami Mizrahi, VP of R&D, TopSpin Security

    - Francois Raynaud, Founder, DevSecCon

    Tune into this panel conversation if you're a network or security professional looking to hear the latest trends and security best-practices to defend against a constantly evolving opponent.
  • Best Practices for Protecting Your Applications on Azure Recorded: Feb 15 2017 35 mins
    Vince Bryant, Cloud Platform Partner Executive
    Microsoft Azure is experiencing enormous growth as an increasing number of organizations turn to Azure to more easily launch and scale applications and services, and achieve the benefits of using the cloud. Azure offers several native platform capabilities and services to help ensure these workloads are secure, easy to manage, and able to scale to meet demand. Organizations are rethinking their approach to securing these dynamic environments, not because cloud platforms are insecure themselves, but because the vast majority of legacy on-premises security products and strategies do not work for cloud workloads. 

    Join Alert Logic team member Vince Bryant, Cloud Platform Partner Executive, for an in-depth webinar where we will discuss best practices for securing applications running on Azure and in multi-cloud deployments, including: 

    • Five things you must consider when securing applications running on Azure or multi-cloud deployments 
    • Tips for addressing your responsibilities in the Microsoft Azure Shared Security Model 
    • Case study: Learn how Bentley Systems addressed customer and compliance requirements in their multi-cloud deployments
  • Forrester's Mastering The Endpoint: Addressing your core endpoint security needs Recorded: Feb 9 2017 45 mins
    Chris Sherman, Senior Analyst at Forrester Research & Nima Baiati, Senior Director of Product Management at Absolute
    Security and risk professionals are dealing with staggering amounts of endpoint-related data loss and risk exposure. To help mitigate these risks, security pros need to rethink their current endpoint security strategies and move past traditional security technologies. Join guest speaker Chris Sherman, Senior Analyst at Forrester Research, as he discusses Forrester’s "Targeted-Attack Hierarchy of Needs”. In this webinar, he will highlight the core endpoint security needs critical to an enterprise security strategy. Attendees will learn how to deal with the multitude of threats targeting their user endpoints through a balance of attack surface reduction and threat detection, with orchestration and automation as key components.
  • The Foundations and Future of PKI: Yes, it’s Alive and Kicking Recorded: Feb 6 2017 59 mins
    Asaf Lerner, PKI product development at Gemalto
    According to a report from the Ponemon Institute, 62% of businesses surveyed regard cloud-based services as the most important trend driving the deployment of applications using PKI, an increase from 50% in 2015. While 28% say IoT will drive PKI deployment. PKI is once again in the spotlight, thanks to the growing number of use cases.

    The foundations of PKI technology and it’s future potential will help professionals determine the best security strategy for the long term. This session will go over the building blocks of a PKI ecosystem and discusses the functionality and use cases of the technology. Whether you’re a security professional looking for a PKI refresher or you are starting from scratch, you will find this webinar useful.

    During our webinar, The Foundations and Future of PKI: Yes, it’s Alive and Kicking, we will cover:

    •Brief overview of PKI technology and it’s components
    •PKI for identity and data protection
    •Advanced security functions of PKI
    •Basic PKI practices
    •PKI vertical use cases
    •The brave new world of PKI – a look at emerging trends and technology
  • Preparing for Cyber Threats in 2017 Recorded: Feb 2 2017 51 mins
    Richard Davis, Director Cybersecurity & Adenike Cosgrove, Snr. Product Marketing Manager, Proofpoint
    Despite increased investment in the enterprise security landscape, cyber threats in the coming year will continue to evolve and adapt to even the most sophisticated defenses.

    To help you and your company prepare, we've put together our top cybersecurity recommendations for 2017.

    Join Proofpoint for "How to Prepare for Cyber Threats in 2017" and learn:

    * What we predict for the threat landscape in 2017

    * Key actions you can take to prepare

    * What top resources will help support your security efforts
  • Redefining Endpoint Incident Response with Behavioral Analysis Recorded: Feb 1 2017 63 mins
    Mike Vien, former CounterTack Sales Engineer and current Malware And Forensic Expert
    Incident response is changing. IR professionals and security teams consistently need tools that provide a deeper level of intelligence around threats impacting their environments. The capability to drill down into information on incidents upon alerts from other tools is critical when investigating root cause and ultimately impact. 

    CounterTack is dedicated to helping incident response and forensics teams leverage behavioral intelligence to track attacks and determine exactly how to work that knowledge into the response workflow. Leveraging behavioral traits and predictive analytics through its products, CounterTack understands the demands IR teams face for improving response time and accuracy.

    This webinar will feature an interactive demonstration of exactly how an IR professional would leverage CounterTack’s industry-leading Responder PRO tool to reverse engineer key risk indicators. This demo will detail real-world uses of not just features in the solution, but show you how to investigate common and uncommon types of threats through a forensic lens.

    Attendees of this session will receive a limited-time only incentive to buy Responder PRO.

    Register Today.
  • Speed and Scalability Matter: SANS Review of LogRhythm 7 SIEM Platform Recorded: Jan 31 2017 61 mins
    Dave Shackleford, sr. sans analyst, and Seth Goldhammer, Director of Product Management
    Enterprise-level security is no easy task. To detect, respond, and remediate advanced threats (and the vulnerabilities that cause them) security teams must get the most out of each security tool they use. For those with immense and complicated IT environments, your security intelligence platform should scale—incorporating cutting-edge security analytics to support everything from incident response case management and automated workflow. All of this should utilise automation to maximise the use of hunters and responders through more efficient searching, reporting, quantifying and visualisation processes.

    In this webcast, learn how LogRhythm reduces mean time to detect (MTTD) and mean time to respond (MTTR) through machine-driven, real-time behavioural analytics, rapid forensic search and automated response.

    Learn about:

    • LogRhythm platform’s overall platform performance
    • LogRhythm 7’s streamlined administration capabilities for reduced operating costs
    • Accuracy of LogRhythm’s event prioritisation
    • LogRhythm’s automation of security orchestration capabilities, with granular risk ratings and built-in case management
  • Security in the Age of Social Media Recorded: Jan 26 2017 33 mins
    Jeff Lenton, Solutions Architect, RiskIQ
    Social Media has come of age. Collectively, social platforms have attracted two-thirds of the world’s internet users with more joining every day. This ubiquity has led many organisations to make social an integral part of their digital channels strategy, along with their web presence and mobile apps.

    For organisations engaging in social media, the importance of having an advanced social media strategy is more critical than ever.


    During the session you will learn:
    * The attack methods hackers use to exploit social media platforms and profiles.
    * Which weaknesses cyber criminals look for so you can protect your company’s social media reputation.
    * How to strengthen your security approach to combat social media threats.
    * The defense techniques an organization must employ to prevent social phishing attacks, brand impersonation, recruiting scams, customer service impersonations, malware attempts, RDC, and more.
  • Seeing the Forest and the Trees – Unique Security Challenges of Financial Data Recorded: Jan 25 2017 28 mins
    Kim Ellery, Director, Product Marketing, Absolute
    Financial organizations are entrusted with the some of the most sensitive data and face a constant onslaught of attempts by insiders and hackers to steal incredibly valuable and easily monetized data. In this informative webinar, Kim Ellery, Director Product Marketing at Absolute, will discuss the increasing risk from both advanced attacks and insider threats. Attendees will gain actionable insights on how to balance the emphasis between detecting threats and preventing them in the first place, starting with visibility and actionable intelligence, to gain complete visibility and control of every endpoint device … no matter if they’re on or off the network.

    Join the Absolute team on January 25th for an informative webinar on improving your visibility, get actionable insights and strategies to help you detect threats faster or prevent them entirely
  • Exploit kits: getting in by any means necessary Recorded: Jan 25 2017 50 mins
    Scott Simkin, Senior Threat Intelligence Manager, Palo Alto Networks
    By understanding the inner workings of exploit kits, you’ll be better equipped to protect your organization from them. Join Scott Simkin from Unit 42 as he breaks down how today’s attackers are automatically exploiting vulnerabilities in common systems.

    You’ll learn about:

    - Why exploit kits are increasing in popularity
    - The process for launching exploit kit campaigns
    - How to defend your organization from exploits
  • The Critical Infrastructure Attack Surface: Assessing Its Threats and Defences Recorded: Jan 24 2017 59 mins
    Sameer Bhalotra, frm. cybersecurity director at the White House, Kennet Westby, president of Coalfire, James Carder, CISO
    The recent DDoS attack on Dyn did much more than simply disrupt service to websites of some of the biggest online brands. It caused many to question our definition of critical infrastructure and the best way to ensure crucial functions are protected.

    In this webcast, a panel of experts discuss a number of questions around critical infrastructure and the challenges of protecting it against advanced cyber threats. The panelist also highlight the issues and risks the Internet of Things (IoT) pose to securing critical infrastructure.

    You’ll learn:

    • The definition of critical infrastructure
    • The responsibility the private sector plays in protecting the nation’s critical infrastructure
    • How IoT is amplifying the scope of critical infrastructure
    • Where organisations should focus to best mitigate the growing and shifting cyberthreats
  • Auditing Neglected Critical Infrastructure Recorded: Jan 18 2017 33 mins
    Ian Whiting - CEO Titania Group
    Key network infrastructure devices are overlooked yet they provide critical functionality. Exploiting web application weaknesses and service buffer overflows is exciting, but the housekeeping of network infrastructure is not. Issues in network infrastructure devices can lead to network wide problems that would cause system admininstration nightmares. This presentation provides a review of key security devices, often side-lined when looking at security. It covers the value of these devices to "Blue Teams", issues "Red Teams" can highlight, desired outcomes and auditing practices.
  • Stop Malicious Activity by Analyzing Network Behavior Recorded: Jan 10 2017 33 mins
    Chris Matthieu, Director of IoT Engineering, Citrix, John Smith, Principal Solutions Architect, ExtraHop Networks
    In the ever-evolving world of persistent threats to your environment the only way to keep up with malicious actors is by utilizing behavior based profiling. In this webinar, we will show how you can rethink the network to detect and remediate threats in real time. When wire data visibility from ExtraHop meets automated response from Citrix Octoblu you're able to protect your environment without having to spend all your time wading through alerts.

    This webinar is perfect for any network or security professionals who are keen to maintain optimum visibility accross their entire network, allowing them to neutralise threats and reduce vulnerabilities.

    About the presenters:

    John Smith is Solutions Architect at ExtraHop and author of the wiredata.net blog. He is a Citrix Technology Professional and 16-year IT veteran specializing in application delivery, event correlation, security, web applications, and application virtualization. John’s background gives him an invaluable perspective on the challenges facing IT, and creating new approaches to deal with them. Follow him on Twitter: @jmsazboy

    Chris was the co-founder and CTO of Octoblu, a revolutionary real-time IoT platform recently acquired by Citrix. Octoblu connects things, systems, people and clouds to a global mesh network allowing users to automate and control design flows, processes and sensor data, and analyze/react to real-time events and messages as well as big data trends and anomalies.
    Follow him on Twitter: @ChrisMatthieu
  • Threat intelligence and predictions for 2017 with Kaspersky Lab Recorded: Jan 6 2017 60 mins
    Amar Singh
    Join us to learn about the top predictions for 2017, as identified by Kaspersky Lab's Global Research & Analysis Team (GReAT). Gain the latest intelligence on the threat landscape and our predictions for 2017

    We face a future of increasingly subtle and sophisticated threat factors; a world where traditional clues and indicators are no longer enough on their own to identify and block attacks; where information is wielded as a weapon, misdirection is king, and global networks of connected devices can be used to paralyse the Internet. What does this mean for business in 2017?

    Kaspersky Lab UK's Principal Security Researcher, David Emm, shall present the Who, What, How and Why in Kaspersky Lab's predictions for 2017 and explain how they will affect the cyber-security landscape throughout the year.

    - Who: The business sectors we predict will be particularly targeted in 2017 and who will attack them.

    - What: The data, behaviour and habits that will expose businesses to increasingly sophisticated threat factors.

    - How: The technical methods through which businesses will be targeted.

    - Why: What Kaspersky predict to be the endgame of 2017's cyber-criminals.

    Hosted by Amar Singh
  • Can Good Security Help Drive Greater Business Agility? On-demand Panel debate! Recorded: Dec 19 2016 61 mins
    Stephen Pritchard - InfoSecurity Magazine, Bob Tarzey - Quocirca, Nathan Dornbrook - ECS, Tom Salmon - LogRhythm
    Good security operations have never been more critical for a business than today. More and more businesses are suffering damaging breaches. Outdated or overly complex security measures are a barrier to productivity, and to adopting new technologies.

    Plus, manual processes and a lack of visibility into unusual network behaviour by a user, machine or network device, can slow a security team down.

    How can advancements in security technology help to connect, unite and enable better processes to help drive greater business agility?

    In this webinar we will address:
    • SIEM’s role in enabling fast detection and response to modern-day threats
    • Implementing a security strategy that protects company assets and aligns to business objectives
    • How having faster access to the right data at the right time, enables better decision making and increased productivity
    • How to modernise your operations with real-time visibility and actionable intelligence
  • Redefining Endpoint Incident Response with Behavioral Analysis Recorded: Dec 15 2016 48 mins
    Michael Angelo Vien, CounterTack Cyber Response Expert
    Cybersecurity teams and incident responders struggle to gather the most accurate intelligence on threats, and targeted, specific security incidents. Teams need technology to drill down into information on incidents, often to respond quickly, and in doing so, determine root cause.

    Is it malware? Are there other indicators that you are blind to? Are your systems maligned with attack residue that you can’t analyze in-memory?

    The art of incident responses contains three key components typically:

    1)Understanding your threat landscape to the point where you can effectively begin to eradicate threats quickly and with confidence
    2)Determining through deep investigation the root cause of security incidents, and the broader impact incidents that are not triaged
    3)Applying forensic-level analysis to add a layer of intelligence based on what was found, and what can be predictably analyzed

    CounterTack delivers incident response capabilities built for analyzing today’s threats, and for drilling down forensically into incidents that might stem from varying levels of malicious code associated with malware and other IOC’s. Leveraging behavioral traits and predictive analytics through its solutions, CounterTack is dedicated to continually improving IR for organizations globally.

    This webinar will feature key trends on how the discipline of incident response has shifted toward needing more definitive analysis. The presentation will convey a few real-world use cases, leveraging CounterTack technology across multiple common and uncommon types of threats from a forensic point of view, so attendees can learn new techniques to elevate their IR workflow.

    As a takeaway, we’ll leave you with an endpoint IR checklist and a set of best practices, and a special incentive to acquire Responder PRO for detailed incident investigation.
For Certified Members and Information Security Professionals Globally
The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker (C|EH), Computer Hacking Forensics Investigator (C|HFI) and EC-Council Certified Security Analyst (E|CSA)/License Penetration Tester (L|PT) programs, and various others offered in over 60 countries around the globe.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Desktop Support and Data Breaches: The Unknown Dangers
  • Live at: Mar 17 2015 4:00 pm
  • Presented by: Bryan Hood, Senior Solutions Engineer, Bomgar
  • From:
Your email has been sent.
or close