6 Ways to Put "Secure" Back in Secure Web Gateways
More malware today is machine-generated and one-off. With advanced malware also employing obfuscation and anti-sandboxing techniques, just how "secure" are secure web gateways? The reality is - many are just not that secure anymore. Based on 2015 breach investigations, Trustwave found that 42% of malware used encryption, underscoring the importance of having an advanced secure web gateway with the capability to inspect encrypted content.
Join our webinar where we will cover practical steps nearly any organization can take to optimize protection and policy control for your web users. We will be discussing real-world ideas on how to:
-Ensure real-time blocking of encrypted new malware.
-Easily keep policy optimized.
-Virtually patch web browsers, and more.
RecordedJul 14 201663 mins
Your place is confirmed, we'll send you email reminders
As the Covid19 pandemic ripped across the globe impacting our health, politics and our ability to continue to work, companies have been forced to shut down or otherwise present an opportunity for remote work. For some companies, that impact may have seemed minimal, due to already having a remote workforce. For others, the task of enabling remote work came with a lot of technical problems, support issues, and quite a few mistakes along the way. This type of chaotic situation, is exactly what the predatory threat actors of today are looking for. The mass confusion can lend itself to unauthorized bypass, internal reconnaissance and eventually, exfiltration of critical data.
During these critical moments it is absolutely vital to assess your critical assets, understand how your threat landscape has changed and perform routine threat hunts to identify anomalous behavior or unauthorized changes introduced to the environment.
Ed Williams, EMEA Director of SpiderLabs; Elliot Dellys, Director of Strategic Consulting for Trustwave EMEA
Join Ed and Elliot for a lively discussion covering common issues in cloud migration planning and execution, misconfiguration of sensitive repositories, managing an increased attack surface area, and tips for ensuring your migration journey is built for success – with security as a foundation, not an extension.
Ed Williams and Elliot Dellys have very different backgrounds, but regularly encounter the same phenomenon: organisations want to migrate to the cloud (or already have!) but are unsure of the risks it poses to their organisation. Drawing on over 20 years of collective experience, Ed provides deep technical insight into the most common issues his penetration testers exploit in the cloud while Elliot provides commentary on the oft-overlooked human, governance and regulatory considerations.
Travis Lee, Director Product Management & Mark Trinidad, Senior Product Manager
Your most critical and sensitive data lives in databases. Your customers, users or consumers not only expect you to protect it, you are required to by law
Data privacy cannot be met without proper data security. Long gone are the days when you could simply monitor database activity and react tactically to threats. Today’s security leaders realize that risks are constantly changing and evolving, therefore data security controls must be able to continuously assess risk posture and remediate against evolving threats. Attend this webinar to learn three critical strategies for getting ahead of data risks:
-Developing a continuous database risk assessment process
-Reducing access to data
-Using focused database monitoring to continuously harden your attack surface
Mark Whitehead, Vice President, SpiderLabs NA, Trustwave & Ulf Mattsson, Head of Innovation, TokenEx
New regulations are consistently coming to market that will have an impact on how we consume cybersecurity solutions.
Join Mark Whitehead, Director, SpiderLabs NA, Trustwave for an exclusive and informative video interview to learn more about:
- The challenges, risks and security gaps of the new regulations
- The hurdles that each new regulation and framework will present
- What the U.S. Department of Defense’s Cyber Maturity Model Certification (CMMC) is exactly
- What steps should companies be taking to prepare for CMMC
- What companies can do to succeed given the changing landscape
This video interview will be broadcast LIVE from San Francisco during the 2020 RSA Conference.
Terence Jackson (Thycotic), Ziv Mador (Trustwave), Mark Bagley (Verodin) & Chris Morales (Vectra)
Adversaries are growing in numbers and sophistication is regularly employing automation while AI and machine learning continue to be successful in various different attacks.
Join this panel of industry leaders and security experts to learn more about cyber attacks and how to protect your organization in 2020. Viewers will learn about:
- What the experts are seeing when it comes to successful and profitable breaches
- How businesses can be successful in stopping attackers in their tracks
- Expert recommendations for improving security in 2020 and beyond
This panel will be broadcast LIVE during RSA Conference in San Francisco.
Terence Jackson, Chief Information Security Officer, Thycotic
Ziv Mador, VP, Security Research at Trustwave SpiderLabs
Mark Bagley, VP Products, Verodin
Chris Morales, Head of Security Analytics, Vectra
Raj Mallempati (CloudKnox Security) | Chris Schueler (Trustwave) | Tim Choi (Proofpoint) | Nathan Wenzler (Moss Adams)
How are organizations handling security for their multiple clouds and applications? Join cloud and security leaders in an interactive discussion to learn about:
- Multi-cloud reality
- Addressing your cyber risk
- Managing vulnerabilities, detecting breaches and responding to incidents
- Automating security tasks across multiple clouds and applications
- Recommendations for improving enterprise cloud security
- Raj Mallempati, COO, CloudKnox Security
- Chris Schueler, Senior Vice President of Managed Security Services, Trustwave
- Tim Choi, VP, Product Marketing, Proofpoint
- Nathan Wenzler, Senior Director of Cybersecurity, Moss Adams
Brian Hussey, VP of Cyber Threat Detection and Response at Trustwave & Mark Whitehead, VP of Trustwave SpiderLabs
The threat landscape continues to evolve with new breaches leveraging both old and new Tactics Techniques and Procedures (TTP)s.
Hear from Brian Hussey, Vice President of Cyber Threat Detection and Response and Mark Whitehead, Vice President SpiderLabs to learn about the threats the Trustwave SpiderLabs elite security team identified during red team and threat hunt engagements and how to prevent against the growing threat landscape. Hussey and Whitehead will also discuss recommendations and best practices for a cybersecurity posture that can withstand the increased focus on cybersecurity when it comes to regulation and compliance.
If your organization is looking to better understand the cybersecurity maturity model certification (CMMC), data privacy regulations like CCPA and how to move to an adaptive security posture, don’t miss this session.
The primary goal for any security professional today is to present less of a target-rich environment for the slew of cyber swindlers aiming to compromise critical assets. However, as businesses continue to scale, leveraging multiple clouds to upgrade their operations, larger sets of dispersed data are expanding the battleground and presenting overwhelming challenges from a data protection standpoint.
One effective method that more businesses are wising up to is penetration testing, which allows them to locate the root of many problems before attackers do. To be successful against your adversary, you have to think like them, and penetration testing allows for this to happen.
To aid pen testing professionals, the Trustwave SpiderLabs team is always at work developing new ways to make their jobs easier and more productive.
Dubbed AttackSurfaceMapper, the tool is intending to speed up and simplify the reconnaissance process for pen testers, allowing them to focus on the exploitation process a bit more, according to Andreas Georgiou, security consultant at Trustwave, and one of the tool’s creators.
By taking a single IP address or domain, AttackSurfaceMapper analyzes it by using passive OSINT techniques and effective reconnaissance methods. This results in hard, actionable data that security professionals can use to spend more time on the testing, and less time on manually performing reconnaissance.
In the full video interview above, Trustwave outlines what you need to know about this open-source tool and how it can benefit your security efforts today.
Through the Trustwave Fusion platform, security leaders and their teams now have deep visibility into their network by connecting the digital footprint of their business to a security cloud made up of Trustwave’s data lake, advanced analytics, and actionable threat intelligence.
In this video, Trustwave Vice President of Americas for Managed Security Services, Jesse Emerson, breaks down the platform's benefits for security organizations across industries.
Most IT roles tend to involve long hours and high stress levels, but with breaks between projects. The reality of a cybersecurity professional, however, is that their job is never fully complete. Much like an air traffic controller or a law officer, just one oversight can result in detrimental consequences. The constant pressure of identifying new threats, contending with persistent adversaries around the clock, and assessing how third parties and introduction of new technologies may impact risk is psychologically taxing. Furthermore, it may weaken the enterprise cyber resiliency.
Join this Q&A interview live from Black Hat to learn more about:
- Burnout in cybersecurity
- The effect of AI and behavioral analytics on burnout
- Industry shortage of security expertise and how to address it
- How to alleviate day-to-day cybersecurity stress
Frank Downs, Director/SME Cybersecurity Practices, ISACA
Chris Schueler, Senior Vice President of Managed Security Services, Trustwave
Sachin Deodhar, Technical Director of Threat Intelligence, APAC Region, Trustwave SpiderLabs Fusion Center
From an incident responder perspective, the cyber threat landscape today, and in the coming years, appear forbidding and treacherous.
With the rise in the adversaries’ use of sophisticated trojans to target organizations with techniques to bypass two-factor authentication, destructive malware to thwart forensics, and living off the land techniques to evade attack vendor and persist longer we are compelled to develop equally innovative means to combat such threats.
In this webinar you will understand the emerging (attackers') tactics, techniques, and procedures (TTPs) that pose serious challenges to current defense paradigms; in particular:
1. Examine ATMITCH campaign targeting financial institutions with a focus on subverting and compromising ATM terminals.
2. Understand the complex and sophisticated Emotet Trojan wreaking havoc on the Financial Sector.
3. Understand limitations of blocking PowerShell and how adversaries can run "PowerShell without PowerShell".
4. Come to terms with the fact that two-factor authentication is broken. We will describe one technique using a reverse proxy as a man-in-the-middle for two-factor authentication bypass and account takeover.
Mark Weatherford (vArmour), Azi Cohen(WhiteSource) | Mark Whitehead (Trustwave) | Joseph Kucic (Cavirin Systems)
Tune in for this exclusive panel on the key factors for a successful security strategy. This is a Part 1 of 2 CISO panels during Black Hat exploring the ever-changing role of the CISO, the factors influencing their success and the elements needed to build a more cyber resilient enterprise.
Join top cyber security executives for an interactive Q&A roundtable discussion on:
- The changing role of CISO
- Why cybersecurity should be a key priority
- Key resources every CISO needs
- How to recruit, develop and retain security talent
- Why investing in your security culture matters
- Biggest cyber security challenges and how to overcome them
The session is being brought to you in partnership with ITSPmagazine and will be streamed LIVE from Las Vegas during Black Hat.
Mark Whitehead (Trustwave) & Mari Galloway (Women's Society of Cyberjutsu)
Join Mark Whitehead, Director, Spider Labs Americas at Trustwave for an exclusive interview at Black Hat 2018 in Las Vegas on the latest cyber threats and trends in cybersecurity. Some of the topics up for discussion will include:
- What are the 3-5 top cyber threats CISOs are worried about in 2018? What's new on the threatscape?
- How to improve cybersecurity? Key areas to focus on. Top recommendations for CISOs.
- Data breaches affecting millions of users are on the rise. What are the security controls / policy changes / tech solutions businesses should implement to prevent breaches and detect them faster?
- What are the biggest threats to security coming from the IoT? Are you worried about cyberwarfare? How should we be protecting our critical infrastructure?
- Cybercrime is on the rise. How can businesses defend against ransomware, phishing, social engineering, and other cyber-attacks? Is investing in technology enough, or should the focus also be on cyber awareness education for employees.
- There is chronic shortage of skilled cyber security workforce in the US and worldwide. How are businesses coping with the lack of cyber talent in the age of cyber-attacks? Is AI/ML helping alleviate the problem? How does diversity (or lack thereof) play into all of this?
- What career path will be most advantageous to people starting their cybersecurity career?
- Can you explain testing maturity models as it relates to test organizations conduct to test their security posture?
- How do you properly scope testing?
- How do you test in cloud and hybrid environments?
- Can you explain the compliance vs security mindset?
Thanassis Diogos, Managing Consultant, Incident Response EMEA at Trustwave
Cybercriminals are setting their sights on hospitality businesses across the U.S. and Europe with unprecedented malware attacks known as Carbanak, as part of precise and difficult-to-stop APT-style operation that we code-named 'Grand Mars'.
Our Trustwave SpiderLabs team of incident responders and researchers have spent months analyzing Grand Mars and its elements, and unlocking strategies that can be used to identify and mitigate this insidious campaign – which may soon spread to e-commerce and retail organizations as well.
Join our webinar where the author of the report will be sharing the findings including:
•How the attackers make initial entry and force infection
•How they achieve persistence
•How they perform lateral movements
•Which malicious files they use
•Which signs indicate you’ve been compromised
•Which countermeasures you should apply immediately
Michael Aminzade, VP of Global Compliance and Risk Services at Trustwave
Your organization has its own unique IT infrastructure, business model, risk profile and tolerance. The best strategy for streamlining your annual Payment Card Industry (PCI) validation process is to make sure that your Qualified Security Assessor Company (QSA-C) employs a sound and forward-looking methodology for your assessments. A key first step is understanding the critical differences between risk acceptance and risk mitigation and the implications for your business.
Tune in to learn best practices in PCI services methodology and how they apply to your specific requirements. Michael Aminzade, VP of Global Compliance and Risk Services at Trustwave, will discuss:
-The impact on PCI assessments, including PCI Data Security Standard (DSS), Payment Applications DSS and P2PE (Point to Point Encryption).
-How sound methodology helps you build a better foundation for security and compliance - whatever your starting point.
-Top considerations for evaluating methodology.
Chris Harget, Senior Product Marketing Manager at Trustwave
Ransomware and CEO email fraud cause organizations billions of dollars in losses annually. These next level threats are so lucrative that they are accelerating hacking innovations and exploding attack frequencies. Ransomware damages user productivity, creates emergency work for IT and at least one CEO has been fired because of CEO email fraud. Security solutions and users have to be smarter than ever before.
Our Trustwave SpiderLabs researchers, security experts and thought leaders have gathered valuable insights and examples on how to help prevent ransomware and CEO fraud. We will be sharing their findings with you during this webinar, including:
• What these attacks look like to your users.
• The essentials and limitations of user training.
• Which automated techniques are most effective at stopping unknown attacks.
Alexander Norell, Director of Global Risk and Compliance Services at Trustwave
Join Alexander Norell, Director of Global Risk and Compliance Services at Trustwave, as he shares his insider view of what you can expect at the upcoming 2016 Payment Card Industry Security Standards Council (PCI SSC) Europe Community Meeting in October.
Alexander’s findings will be based on what he learns from his attendance at the North America Community Meeting and his insight as a subject matter expert on PCI compliance.
During the webinar, Alexander will:
• Alert you to trending topics and their implications
• Share takeaways from participants as well as SSC leaders
• Analyse the impact to the European community
Michael Osterman, President of Osterman Research, Inc., and Kevin Overcash, Director of SpiderLabs North America at Trustwave
One in five businesses don’t test for security vulnerabilities. A recent study by Osterman Research found that many businesses fail to conduct frequent security testing despite believing that it’s critically important to securing their systems and data.
In this presentation Michael Osterman, President of Osterman Research, Inc., will discuss key findings from the “Security Testing Practices and Priorities: An Osterman Research Survey Report”, including:
•Common types of security issues experienced in the past 12 months.
•The extent to which organizations take a proactive approach to security testing.
•Types of security testing conducted during the past 6 months.
•How often organizations conduct detailed review of security tests.
•Challenges faced by organizations in the context of security testing.
Miguel Arévalo, Managing Consultant y Diana Elizabeth Rodriguez Sanchez, LAC Sales Manager
La versión 3.2 del PCI DSS (Payment Card Industry Data Security Standard) ha sido anunciada - las organizaciones que deben cumplir precisan entender los cambios y sus implicaciones. Participe de nuestro webinar para entender más sobre por qué fue lanzado tan rápido y cómo puedes parar mejor a tu organización.
• El alcance de la nueva versión PCI DSS 3.2
• ¿Qué significa para su negocio?
• ¿Por qué deberías implementar los cambios, aunque no sean mandatorios?
• ¿Qué puede venir en el futuro próximo?
Brian Hussey, Global Director of Incident Response & Readiness and John Ramsey, Senior Product Marketing Manager
Trustwave offers advice for those looking to take back control of their cyber destinies. Cybercrime has become a world-wide epidemic as organized crime syndicates are literally making money hand over fist in extorting businesses or otherwise stealing valuable data and company assets. Combined with a global shortage of trained security professionals and you literally have "The Perfect Storm" of cybercriminal activity.
Join Trustwave SpiderLabs cybersecurity expert, Brian Hussey, as he discusses how you can get ahead of today’s cybercrime ‘super storm’ with some simple steps and key solutions. The more you know the better equipped you are to detect and prevent cybercrime - and ultimately protect your business. Join our webinar to help:
-Understand who is targeting you.
-Get a handle on just how they are doing it.
-Learn some key tactics and solutions to combat today’s modern cybercriminal.
Trustwave helps businesses fight cybercrime, protect data and reduce security risk. With cloud and managed security services, integrated technologies and a team of security experts, ethical hackers and researchers, Trustwave enables businesses to transform the way they manage their information security and compliance programs. More than 2.7 million businesses are enrolled in the Trustwave TrustKeeper® cloud platform, through which Trustwave delivers automated, efficient and cost-effective data protection, risk management and threat intelligence. Trustwave is a privately held company, headquartered in Chicago, with customers in 96 countries. For more information about Trustwave, visit www.trustwave.com.
6 Ways to Put "Secure" Back in Secure Web GatewaysChris Harget, Senior Product Marketing Manager at Trustwave and Stephen Brunetto, Director of Product Management at Trustwave[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]62 mins