Facing Evolving Cyber Threats - The Resilient Defense Model

Jerry L. Archer, SVP & CSO, Sallie Mae
In today’s world of cybercrime are you really secure? How must we change our thinking and defenses to detect and combat a new and continuous evolving cyber-threat. The presentation will explain the Resilient Defense model and describe how to turn this new thinking into reality, key tools that are available today and what tools are still needed to effectively stand your ground.
Jul 19 2012
46 mins
Facing Evolving Cyber Threats - The Resilient Defense Model
Join us for this summit:
  • Channel
  • Channel profile
  • The End Point Protection Conundrum: Inside Looking Out or Outside Looking In? Jun 10 2015 9:00 am UTC 45 mins
    Patrick Grillo, Fortinet Senior Director, Security Solutions
    Advanced Threat Protection (ATP) has taken on a life of its own over the past year. Despite some differences, most solutions tend to agree on the type of protection needed for the core network. Where things start to come apart is when you introduce the end user into the equation and how to protect the network from an internal error, deliberate maliciousness or even criminal intent. End point protection, in all of its various forms, must be a key component of any ATP solution and integrated into the process of Prevent, Detect and Mitigate.

    This session will focus on the overall issue and how the Fortinet ATP solution addresses this matter.
  • Cyber Warfare Jun 9 2015 5:00 pm UTC 45 mins
    Chuck Easttom, Computer Scientist, Author, and Inventor
    This discusses the history of cyber warfare, current trends, and what is coming in the near future.
  • Cloud Security Report 2015: What You Need to Know Jun 9 2015 5:00 pm UTC 45 mins
    Martin Lee, Manager, Intelligence, Alert Logic
    With the recently released Cloud Security Report, Alert Logic will open the doors to our research team and give you insight into how we gather data to prepare the cloud security report.

    Register for this live webinar as Alert Logic ActiveIntelligence team manager Martin Lee provides insight into the key resources used by our staff to find the latest data and then explore what our research team does with the information.

    This webinar will also cover:

    •Macro-trends uncovered in this years report,
    •The cyber kill chain in easy to understand terms
    •Industry specific analysis
  • HP Cyber Risk Report 2015: The Past is Prologue Jun 9 2015 4:00 pm UTC 30 mins
    Jewel Timpe, Senior Manager- Threat Research, HP Security Research
    In the world of information security, the past isn’t dead; it isn’t even the past.

    The 2015 edition of HP’s annual security-research analysis reveals a threat landscape still populated by old problems and known issues, even as the pace of new developments quickens. In 2014, well-known attacks and misconfigurations existed side-by-side with mobile and connected devices (the “Internet of Things”) that remained largely unsecured. As the global economy continues its recovery, enterprises continued to find inexpensive access to capital; unfortunately, network attackers did as well, some of whom launched remarkably determined and formidable attacks over the course of the year.

    The 2015 edition of the HP Cyber Risk Report, drawn from innovative work by HP Security Research (HPSR), examines the nature of currently active vulnerabilities, how adversaries take advantage of them, and how defenders can prepare for what lies ahead. Jewel Timpe, HPSR’s senior manager of threat research, describes the report’s findings and explains how this intelligence can be used to better allocate security funds and personnel resources for enterprises looking toward tomorrow.
  • Hackers and Threats: Cybercrime Syndicates Go Global Jun 9 2015 1:00 pm UTC 45 mins
    Steve Durbin, Managing Director, ISF Ltd
    Organisations around the globe are struggling to cope with the quantum speed and sophistication of attacks by organised cyber criminal syndicates and going forward will need to prepare to be targeted 24x7 by multiple assailants. Criminal organisations have become more sophisticated, mature and are migrating their activities online at greater pace. They have begun to develop complex hierarchies, partnerships and collaborations that mimic large private sector organisations and are taking their activities global. Organisations that wish to keep pace with these developments and remain financially viable will need to take action now.

    This webcast will share guidance and tips on how organisations can identify and protect the areas of their business that could be impacted by cybercrime activity.
  • Anatomy of a Botnet – Dissecting and Malware analysis Jun 9 2015 12:00 pm UTC 45 mins
    Tiago Pereira, Threat Intel Researcher at AnubisNetworks
    Knowing that your company has been compromised is just the first step in a long road to erase the threat.

    Many companies take weeks and sometimes months to address compromised machines due to a lack of real-time notifications or, in many cases, a deep understanding of the malware profile.

    Tiago Pereira, Threat Intel at AnubisNetworks will share the methodology used by AnubisNetworks which comprises the combination of Cyberfeed threat intelligence capabilities with the expertise of the security team to dissect and understand the botnet behaviour, destroying capabilities and threat risk for organizations. The first part of the webinar will be dedicated to explaining the methodology and the second how it was applied in a real case study.

    In this webinar you will learn:
    - AnubisNetworks’ sinkhole techniques and botnet research methodology
    - Case study: understand a botnet:

    o DGA mechanisms

    o Decipher the network protocol

    o Uncover the malware capabilities
  • The Evolving Cyber Threat Landscape Jun 9 2015 11:00 am UTC 45 mins
    Adrian Nish, Head of Cyber Threat Intelligence, BAE
    Attackers are getting smarter, while repurposing what we thought were outdated techniques. So, how can your organisation stay safe?

    In the past decade we’ve seen the emergence of the world’s youngest profession – the Cyber-Intruders. These actors, often working normal 9 to 5 hours, Monday to Friday, are paid to break into systems and steal sensitive information or scope out a target for their employer.

    Crime-as-a-service has become a reality in cyber-space, with specialisms emerging which make it akin to a mini-industrial revolution. The techniques they use are often novel, though not always. Out-dated technology as well as lessons unlearned by organisations mean that persistent attackers can breach networks with relative ease.

    This talk aims to present the current state of the cyber threat landscape, what are the latest tricks attackers are using, and what should organisations focus on to keep data and systems secure.
  • Five steps to improving security: A pragmatic approach Jun 9 2015 11:00 am UTC 45 mins
    Hadi Hosn, Managing Principal Consultant, Dell SecureWorks
    Information security is becoming more and more vital to organisations in an ever changing landscape with the role of the Chief Information Security Officer (CISO) growing in magnitude with hacker based activity, cloud computing, and work-from-anywhere initiative adding to the complexity. New privacy regulations, social media and BYOD have added further challenges and put additional strains on compliance…

    In this webcast, Hadi Hosn, Managing Principal Consultant at Dell SecureWorks, will discuss the five key areas we believe a CISO should focus today to help shape and drive a security programme. Hadi will focus on the most important areas that are applicable in all market sectors and centre in on those activities that, in his experience, deliver the most value, security improvement and return on investment.

    Key topics covered include:

    •Understanding your organisation’s extended enterprise

    •How to improve visibility into what’s going on in your environment

    •Building a culture of security in your organisation
  • If Hacking is the Poison, What's the Antidote? Jun 9 2015 10:00 am UTC 45 mins
    James Hanlon CISM, CISSP, Cyber Security Strategy & GTM Lead, EMEA
    James Hanlon, Security Strategist at Symantec, looks at both the current cyber poisons and potential antidotes to the cyber security challenge. The discussion will focus current threat landscape and the changes we are seeing in regard to hacking and cyber attacks. It will pose the questions to whether global intelligence & data analytics is an approach that can be used counter the most advanced threats.
  • Stopping Data Breaches: Show me the money Jun 3 2015 3:00 pm UTC 45 mins
    Dave Finger, Director of Product Marketing, Fortinet
    Yes, there are annual studies that calculate the cost of the average data breach. And yes, within weeks of a major data breach the headlines shift from number of records lost to estimated cost. So it is unsurprising, if troubling, that a recent survey of enterprise executives indicated that the #1 thing they are most concerned about protecting from cyber attack is customer data. However, there are other important aspects to making a business case for improving your security posture. This webcast will discuss what we feel you should be concerned about losing and why…and it’s not just customer records that require costly breach notification.
  • Using Your Network and Cisco ASR 9000 for Comprehensive DDoS Protection Jun 3 2015 2:00 pm UTC 45 mins
    Talbot Hack, Senior Product Manager, Arbor Networks + Mike Geller, Principal Engineer Cisco Systems
    DDoS attacks are rising in size, frequency and complexity; recent research from Arbor Networks discovered a 334 Gbps DDoS attack! What makes this concerning is that there isn’t a single DDoS protection product on the planet that can stop an attack of this magnitude. So what’s the solution? You need to leverage your network to stop DDoS attacks.

    In this session, representatives from two industry leaders – Talbot Hack from Arbor Networks and Mike Geller from Cisco Systems – discuss best practices in leveraging your network for DDoS detection and mitigation.

    This presentation will cover:
    -The use of current and emerging technologies such as, Netflow, BGP, Flowspec, S&D/RTBH and SDN/NFV
    -An introduction to a joint Arbor-Cisco solution which embeds Arbor’s Threat Management System (TMS) technology in the Cisco’s ASR 9000 router for network embedded, virtual DDoS protection
  • Experiments in Deep Learning May 28 2015 6:00 pm UTC 60 mins
    Patrick Hall, Senior Associate Research Statistician Developer, SAS
    The human brain makes it look easy. What our eyes see, we decode immediately and effortlessly. But is it that simple? In truth, how we process images is staggeringly complex. Inspired in part by our remarkable neurons, deep learning is a fast-growing area in machine learning research that shows promising breakthroughs in speech, text and image recognition. It’s based on endowing a neural network with many hidden layers, enabling a computer to learn tasks, organize information and find patterns on its own.

    Recently, SAS took on a classical problem in machine learning research, the MNIST database, a data set containing thousands of handwritten digit images. Learn how we did – and what it reveals about the future of deep learning.
  • 2015 Cyberthreat Defense Report May 28 2015 6:00 pm UTC 45 mins
    Steve Piper, CEO, CyberEdge and Hal Lonas, CTO, Webroot
    This presentation provides key findings from the 2015 Cyberthreat Defense Report from the analyst firm CyberEdge. Based on a survey of IT security decision makers and practitioners across North America and Europe, the report examines the current and planned deployment of security measures, including the use of threat intelligence. It also provides developers of IT security technologies and products with answers they need to better align their solutions with the concerns and requirements of end users.
  • 5 Habits of Highly Compliant Marketers: May 28 2015 5:00 pm UTC 30 mins
    Thor Johnson, CMO Intralinks and Lisa Cannon, Content Strategist and Writer
    The need to share content -- securely, collaboratively, immediately -- is critical to your job. You’re working with outside agencies and business partners, sharing documents that contain sensitive data like product designs, ad campaigns and customer data, to name just a few.

    According to research from the Ponemon Institute, more than six out of ten people report having accidentally forwarded files to individuals not authorized to see them. It’s time to create some good habits that will allow you to collaborate with internal and external resources and be 100% compliant with the regulations that govern your industry.

    Please join us for an interactive presentation about how new habits and tools can make it easy for you to be efficient and compliant, without sacrificing speed or creativity.
  • Cyber Insurance Underwriting - A High-Tech Discipline? May 28 2015 4:00 pm UTC 45 mins
    Ira Scharf, GM of Insurance, BitSight and Advisen Insurance Intelligence
    The cyber market is an ever-changing industry. So how are insurance carriers currently assessing the risks their insured face? And how are they mitigating those risks?

    In this webinar, Ira Scharf, our GM of Insurance, teams up with Advisen Insurance Intelligence to discuss how cyber exposures have grown and changed over the last 20 years, and how the insurance product has evolved to keep pace.

    Watch this on-demand webinar to:

    learn exactly how the underwriting process has developed over the years,
    hear experts discuss the current trends in the industry, and
    find out the latest tools carriers are adopting to better assess corporation’s cyber preparedness.
  • Creating a Government Private Threat Intelligence Cloud May 27 2015 6:00 pm UTC 75 mins
    Taylor Ettema, Product Manager, Threat Prevention Technologies
    With the sophistication and highly targeted nature of attacks against governments, the adversary can use numerous approaches and actions to get in and move across the network. Palo Alto Networks Threat Intelligence—from the cloud or an on-premises government-run platform—constantly gathers intelligence on evasive applications and converts the intelligence back into all platform devices. This ensures that organizations maintain control of evasive applications to ensure authorized activity traverses the networks while unauthorized activity fails to route.

    Join this webinar to Learn:
    - How Government Agencies can develop and manage their own threat intelligence cloud on a closed, dedicated Palo Alto Networks WF-500 threat intelligence platform.

    - How to create effective threat intelligence private clouds for a singular agency or for a group of Agencies, Ministries or Departments who wish to share their threat intelligence.

    - How the threat intelligence cloud (public or private) analyzes and correlates intelligence from all platform security functions—URL Filtering, mobile security, IPS/threat prevention and the virtual execution engine or sandbox, WildFire™— and validated community input.

    - How WildFire immediately discovers previously unknown malware and communicates the results to the platform to automatically generate signatures.

    - How all threat intelligence is distributed to the network and endpoints to ensure they are protected.

    - How this is all done automatically, reducing operational burden and shortening an organization’s response time.

    - How this innovative architecture can be operated at a fraction of the cost it takes to deploy and manage an equivalent set of point products – APT, IDS/IPS, URL filtering and more – all correlating insights automatically in real-time for greatest network protection.
  • How to Assess and Manage Your Cyber Risk May 27 2015 5:00 pm UTC 60 mins
    Stephen Cobb, Senior Security Researcher, ESET
    Information technology brings many benefits to a business, but it also brings risks. Knowing how to assess and manage those cyber risks is essential for success, a powerful hedge against many of the threats that your business faces, whether you are an established firm or pioneering startup. ESET security researcher Stephen Cobb explains how cyber risk assessment and management can work for you.
  • How Bad Can Zero Days Get? May 27 2015 5:00 pm UTC 45 mins
    Robert Hansen, VP of WhiteHat Security Labs
    Are you giving the adversary unintended access through vulnerabilities in your system?

    By only having one method of finding vulnerabilities or one way of mitigating them, the chances of the adversary getting through are increasingly high. This webinar will walk you through the current threat landscape, how vulnerabilities can be found, and how to mitigate control.

    In this webinar you'll learn:

    - What types of assessments work at which points in the software development lifecycle.
    - What is the most popular way to deploy a WAF and why that's not a good idea as a single method of defense.
    - Why finding and fixing your vulnerability isn't actually good enough.
  • When Do Managed Security Services Make Sense? May 27 2015 5:00 pm UTC 45 mins
    Guest Speaker: Ed Ferrara, Principal Analyst, Forrester Research, Mark Stevens, VP Global Services, Digital Guardian
    The importance of protecting sensitive data is gaining visibility at the C-level and the Boardroom. It’s a difficult task, made even more so by the shortage of security experts. One option that more and more companies are pursuing is the use of managed security services. This can enable them to employ sophisticated technologies and processes to detect security incidents in a cost-effective manner. Should managed security be a component of your security mix?

    In this webinar, Ed Ferrara of Forrester and Mark Stevens of Digital Guardian will discuss:

     When does it make sense to utilize managed security services

     How to the scope the services your company contracts out

     Questions to ask when evaluating managed security services providers

     The key criteria for selecting managed security providers
  • All About the Base: Test Drive FortiGate-VMX from Hypervisor and up Live 45 mins
    Cynthia Hsieh, Director of Product Marketing, Cloud and SDN product, Fortinet.
    Server virtualization is a mature technology. More than 70% of all x86 architecture workloads are running in VMs on top of hypervisors. With the increase in virtualization of mission critical workloads plus clustering and high availability, it’s more challenging than ever to get the visibility and dynamic rule settings for North-South and East-West traffic. In this session, no future hype, learn what is happened today with FortiGate-VMX use cases to secure all of your hypervisors and provide a real-world agility traffic testing using Ixia Breakingpoint for the proof.
For Certified Members and Information Security Professionals Globally
The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker (C|EH), Computer Hacking Forensics Investigator (C|HFI) and EC-Council Certified Security Analyst (E|CSA)/License Penetration Tester (L|PT) programs, and various others offered in over 60 countries around the globe.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Facing Evolving Cyber Threats - The Resilient Defense Model
  • Live at: Jul 19 2012 6:00 pm
  • Presented by: Jerry L. Archer, SVP & CSO, Sallie Mae
  • From:
Your email has been sent.
or close
You must be logged in to email this