Emerging Industrial Control Vulnerabilities – A Proactive Solution

McAfee and Wurldtech
Operators of Critical Infrastructure are facing rapidly changing threats to their industrial control systems. Plant failure or disruption can be very expensive to operators in terms of revenue and brand image. Wurldtech and McAfee have developed mitigations to protect your systems effectively, without patching or plant shutdown.

This session offers practical advice on how to protect your critical assets including:
• An analysis of the current threat landscape within the industries
• The importance of utilizing IPS and ICS focused rule sets
• An overview of Wurldtech and McAfee’s industrial control system IPS signature offering
Sep 6 2012
33 mins
Emerging Industrial Control Vulnerabilities – A Proactive Solution
Join us for this summit:
  • Channel
  • Channel profile
  • View from the CISO Chair May 27 2015 2:15 pm UTC 60 mins
    Tom Bowers, Principal vCISO Services Practice at ePlus
    View from the CISO Chair - Security as Business Risk with Tom Bowers, Principle Security Strategist, ePlus
  • Addressing Challenges in Securing the Software Defined Data Center May 27 2015 8:00 am UTC 60 mins
    Claudio Salmin, Fortinet Consulting Systems Engineer
    Data center security is being reshaped by virtualisation, consolidation, and promising new technologies such as Software Defined Networking (SDN).
    The adoption of the SDDC brings new challenges such as inspecting East-West traffic without the need to compromise on all the benefits of today's physical appliances.
  • DDoS Attacks Are a Serious Threat to U.S. Companies, Not for Reasons You'd Think Recorded: May 26 2015 30 mins
    Margee Adams, Director of Product Marketing, Neustar
    Neustar, in its annual DDoS Attacks Report shares critical DDoS trending data from real companies from across industries. Learn how companies are ramping up DDoS protection tactics and why.
  • POS Attacks Persist: Fight Back with 5 Key Defense Strategies Recorded: May 26 2015 42 mins
    Ken Dang, Product Marketing Manager, Dell Security
    2014 was a year pack with hacker attacks on payment card infrastructures but we’re not out of the woods yet. Dell’s threat research team have regularly observed new active pieces of advanced Point-of-Sales (POS) malware in 2015. Why so many retailers still soft targets? For cyber criminals, retail is where the money is. The possibility of spiriting away and selling thousands or millions of credit card details and chunks of consumer information is powerful incentive.
  • Real Customer Successes: Business Transformation through Information Governance Recorded: May 26 2015 61 mins
    Barclay T. Blair, Executive Director and Founder, Information Governance Initiative; Stephen Ludlow, Director, Product Market
    Successful Information Governance enables organizations to take control of their information, ensure compliance, reduce costs, and ultimately achieve greater profitability. Watch the webinar on demand, Real Customer Successes: Business Transformation through Information Governance, to hear expert insights on how real-world customers have successfully leveraged Information Governance programs.
    Barclay Blair of the Information Governance Initiative and OpenText's Stephen Ludlow discuss how customers have successfully implemented Information Governance programs that streamline processes, increase productivity, and reduce costs to transform their businesses. You’ll learn:
    •How leading organizations have been able to amplify the value in their information
    •How to measure the success of an Information Governance implementation
    •What drivers lead customers to implement an Information Governance program
  • Expert Speed Round: 7 CEM Trends in 40 Minutes Recorded: May 26 2015 58 mins
    Marci Maddox, OpenText, Kim Celestre, Forrester and a panel of experts
    If you’re not engaging your customers, you could be losing them. Last year alone, 66 percent of global customers switched service providers due to poor customer experience—up 4 percent from the previous year, according to Accenture. They estimate that this “switching economy” puts $5.9 trillion up for grabs globally every year. That’s a large sum to leave up to chance!

    Register for the virtual roundtable, Expert Speed Round: 7 CEM Trends in 40 Minutes, to hear experts discuss Walters’s observations and answer pressing questions around how to succeed in Customer Experience Management.

    Marci Maddox, OpenText
    Kim Celestre, Forrester
    Scott Marshall, Amerisource Bergen
    Roopesh Nair, Sapient Nitro
    Leo Mindel, Sotic Digital Sports Agency
  • How to Reshape Customer Conversations through Real-Time Customer Engagement Recorded: May 25 2015 50 mins
    Omer Minkara, Research Analyst, Aberdeen Group; Robert Thiele, Senior Director of SAP Corporate Alliance, OpenText
    According to Aberdeen, 50% of businesses say managing consistent customer experiences continues to be a top challenge. Today’s buyers demand higher levels of personalization with each interaction they have with a company. Customer Communications Management (CCM) can help personalize communications by capturing customer requirements on-the-go.

    Watch the webinar on demand, Reshape Customer Conversations through Real-time Customer Information, to learn about:
    - Business value of managing consistent and timely customer interactions
    - Best practices to ensure consistency of customer messages across your business
    - The growing role of content in delivering personalized customer experiences
  • Top 5 Trends in Information Governance Recorded: May 25 2015 65 mins
    Cheryl McKinnon, Principal Analyst, Forrester Research, Inc.; Liz Kofsky, Product Marketing Director, OpenText
    To keep up with soaring volumes of information, A strong Information Governance program is no longer a nice-to-have: It’s a must have. View Part 1 in the information governance webinar series, 5 Top Trends in Information Governance, to hear expert insights into the current state of information management, including investment priorities, technology adoption trends, and the top challenges facing enterprise decision-makers. Join guest speaker Forrester analyst Cheryl McKinnon and Liz Kofsky from OpenText as they discuss the findings from Forrester’s latest recent research in records management, information governance, enterprise content management (ECM) and archiving trends.
    You’ll learn:
    •The latest trends in information management
    •How to overcome the top information governances challenges facing organizations
    •Where to start your information governance program and how to get to successful information management
  • Large Scale, High Performance Visibility Plane for Cloud and Web Service Recorded: May 21 2015 48 mins
    Gordon Beith, Director of Product Management
    This webinar will describe the challenges faced by cloud and web service providers when attempting to monitor, manage, and troubleshoot across large data centers and networks, whether fully owned or hosted. It will describe the benefits of using a unified visibility plane as the solution to address these challenges, in a cost-effective and streamlined manner, whether it is for security, performance, and/or troubleshooting purposes.
  • Preventing Threats using Machine Learning, Contextualization and Predictability Recorded: May 21 2015 36 mins
    David Dufour, Senior Director of Security Architecture, Webroot
    With the rapidly accelerating nature of attacks on network infrastructure and software systems approaches such as static block lists, manual policy configurations and other current prevention techniques have become outdated. Through the use of distributed computing, contextualization and machine learning it is possible to build tools that analyze data across multiple threat vectors allowing for the development of predictive algorithms and a greater understanding of an organizations threat landscape. We will walk through common machine learning techniques, discuss contextualization, how predictive logic works and see a demonstration of contextualized threat intelligence.
  • How Fraudsters Steal Identities Recorded: May 21 2015 53 mins
    Fred Crawley, Managing Editor, Credit Today and David Pope, Marketing Director, Jumio
    This webinar will explore the methods criminals use to perpetrate fraud and steal identities and what you can do to secure your business without taking a hit on transaction completion and revenue.

    We'll cover:

    1. The common approaches used in identity theft and how they apply to e-commerce.

    - the coffee shop wifi hack
    - the local government census
    - social media techniques
    - the offer you can't refuse
    - the catchers supermarkets

    2. Firsthand research from the Jumio team and what they uncovered when they interviewed convicted ex-fraudsters, professional criminologists, law enforcement practitioners and fraud managers to uncover some of the exploits that fraudsters use.
  • Ponemon Institute: The Cost of Time To Identify & Contain Advanced Threats Recorded: May 21 2015 57 mins
    Dr. Larry Ponemon, Ponemon Institute + Arabella Hallawell, VP of Corporate Strategy, Arbor Networks
    The purpose of our study was to better understand the cyber-security challenges facing financial services enterprises as well as both conventional and Internet retail companies.

    Attend this webinar to learn:
    - The state of ATs and DDoS attacks in the two verticals
    - How companies deal with advanced threats and denial of service attacks
    -Industry differences: financial services vs. retail companies
  • Data Sovereignty and the Cloud Recorded: May 21 2015 48 mins
    Holger Mueller, VP & Principal Analyst, Constellation Research and Todd Partridge, Director of Product Marketing, Intralinks
    Cloud computing has broken down traditional geographic borders, and defining data ‘location’ has become more complex. Global enterprises embracing the cloud must deal with the compliance and risk challenges that arise when information is distributed across multiple physical, logical, and legal locations.

    Join our guest Holger Mueller, Vice President and Principal Analyst, Constellation Research, and Todd Partridge, Product Marketing Director, as they explore the challenges of information governance in the cloud:

    - The critical emerging topic of data sovereignty and jurisdiction
    - How governments are responding in different ways to the questions of data privacy and ownership
    - What organizations must do to address the varying requirements and regulatory environments
  • Data Security: 3 Ways to Protect Your Company from the Inside Out Recorded: May 20 2015 42 mins
    Guest Speaker: Chris Berube, Director of IT at Law Offices of Joe Bornstein
    There seems to be news of a major data breach in the headlines almost every week. Conventional wisdom suggests that securing the network and perimeter of an IT environment should be enough to protect a company from a breach – but what if that breach originates internally? How can a situation like this be averted? Today companies need to protect themselves from the inside out by first recognizing which of their data is sensitive and then ensuring that it’s properly secured.

    Join us and learn how Chris Berube, Director of IT at Law Offices of Joe Bornstein, has rethought information security in order to protect his company from the inside out.

    We’ll discuss how to:
    1.Identify files which contain sensitive information
    2.Audit user files to track suspicious activities
    3.Monitor proactively when secured data has been moved to public shares
  • Leveraging Next-Gen SIEM For Security Intelligence: A Buyer’s Perspective Recorded: May 19 2015 47 mins
    Paul Lynch, Director of Data Security & Networks, American Board of Internal Medicine
    Chartered with securing both the PII of over 250,000 physicians and a vast amount of highly valued intellectual property amidst a rapidly evolving threat landscape, Paul Lynch, Director of Data Security and Networks at the American Board of Internal Medicine (ABIM), recognized the need to move beyond a traditional SIEM, and employ a more holistic approach to Security Intelligence.

    In this CISO Executive Network webinar, Mr. Lynch will share with you the path he took to go from defining ABIM’s core security intelligence requirements to making his ultimate selection. The path included establishing a detailed score card for evaluating various SIEM solutions, moving from eight vendors’ to a short list of four, then testing and ultimately selecting a unified platform for ABIM.

    Whether you have an existing SIEM platform and are overwhelmed by its complexity, inadequate visibility to today’s advance threats or the manpower required to manage it, or you’re considering deploying SIEM for the first time, you’ll benefit greatly by joining us for this webinar.

    Key themes to be covered include:
    • SIEM for Security vs. IT Operations – understanding and prioritizing your options
    • Establishing a score card to evaluate vendors and solutions
    • How to leveraging market research and outside perspectives to inform your decision
    • Considering total cost of ownership (price, deployment, implementation, usability, management)
  • IDS for Security Analysts: How to Get Actionable Insights from your IDS Recorded: May 19 2015 59 mins
    Joe Schreiber, AlienVault; Grant Leonard, Castra Consulting; Tony Simone, Castra Consulting
    The fun with IDS doesn't stop after installation, in fact, that's really where the fun starts. Join our panel of IDS experts for an educational discussion that will help you make sense of your IDS data, starting from Day 1. We will discuss signature manipulation, event output, and the three "P's" - policy, procedure and process. We won't stop there either! You'll find out the meaning behind the terms all the cool kids are using like "False Positives" and "Baselining". We'll round it out with more information about how IDS interacts with the rest of your IT applications and infrastructure. If you installed an IDS and are wondering what to do next then signup now!Asset Discovery - creating an inventory of running instances
    Vulnerability Assessment - conducting scans to assess exposure to attack, and prioritize risks
    Change Management - detect changes in your AWS environment and insecure network access control configurations
    S3 & ELB Access Log Monitoring - Monitor access logs of hosted content and data directed at your instance
    CloudTrail Monitoring and Alerting - Monitor the CloudTrail service for abnormal behavior
    Windows Event Monitoring - Analyze system level behavior to detect advanced threats
    We'll finish up with a demo of AlienVault USM for AWS, which delivers all of the above capabilities, plus log management & event correlation to help you detect threats quickly and comply with regulatory requirements.
  • Key Security Insights: Examining 2014 to predict what's coming in 2015 Recorded: May 14 2015 52 mins
    Ken Dang, Product Marketing Manager, Dell Security
    It’s clear that cyber-crimes are alive and well on the global stage and will only continue to be pervasive as long as organizations prolong taking the necessary defense measures to stop threats from slipping through the cracks. In this Dell Security Annual Threat webcast, we’ll present the most common attacks Dell SonicWALL observed in 2014 and the ways we expect emergent threats to affect small and medium businesses, as well as large enterprises, throughout 2015. Our goal is not to frighten, but to inform and provide organizations of all sizes with practical advice that will help them adjust their practices to more effectively prepare for and prevent attacks, even from threat sources that have yet to emerge.
  • Cloud Access Security—Keep Sensitive Data Safe and Compliant in the Cloud Recorded: May 14 2015 48 mins
    Albert Biketi, VP and general manager of HP Atalla and HP Security Voltage
    The exploding use of cloud applications like Office 365, Google Apps, and SalesForce CRM is giving enterprises unprecedented agility. But it also brings new challenges in ensuring data security and demonstrating compliance. In this webinar HP Atalla shows why many enterprises are turning to HP Cloud Access Security Protection platform to protect sensitive data in SaaS cloud deployments.
  • Do You Even CISO? Recorded: May 14 2015 48 mins
    Eric Cowperthwaite, VP of Advanced Security and Strategy and Mike Boyd - CISO, Providence Health & Services
    Being a CISO (Chief Information Security Officer) is hard. Endless responsibilities, never ending demands, restless nights’ sleep, and always playing catchup. Come hear a current and former CISO tell stories of some of their more interesting experiences, challenges, successes and complete failures.
  • The Factors & Technologies that Drive Data Security Confidence in UK Firms Recorded: May 14 2015 60 mins
    Bob Tarzey, Analyst and Director, Quocirca
    What are the factors and technologies that engender UK Firms with the highest levels of confidence in their data security measures?

    Attend this webinar with Bob Tarzey, Analyst and Director at Quocirca, as he reviews new research that examines:

    - The confidence levels amongst UK businesses about the security of their sensitive business data
    - The three key factors that drive the highest confidence levels
    - The security technologies that help deliver these high confidence level - with the specific technologies that enable the management of complex information supply chains
    - The measures firms at the bleeding edge take to make sharing data in the cloud more secure
For Certified Members and Information Security Professionals Globally
The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker (C|EH), Computer Hacking Forensics Investigator (C|HFI) and EC-Council Certified Security Analyst (E|CSA)/License Penetration Tester (L|PT) programs, and various others offered in over 60 countries around the globe.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Emerging Industrial Control Vulnerabilities – A Proactive Solution
  • Live at: Sep 6 2012 5:00 pm
  • Presented by: McAfee and Wurldtech
  • From:
Your email has been sent.
or close
You must be logged in to email this