Compelling Reasons to use Vulnerability Intelligence

Manage webcast
Marcelo Pereira, Business Development and Analyst Relations at Secunia
Dealing with the threat of cyber-attacks becomes more complex as the methods used by hackers to break into organizations and steal valuable assets become more sophisticated. Business leaders panic when hearing about the risks of advanced targeted attacks (ATA), advanced persistent threat (APT) and other acronyms.

As fairly simple techniques are all it takes to exploit vulnerabilities, and vulnerability exploitation is behind the majority of security breaches, one of the challenges organizations face in the race against cyber-attacks is acquiring trusted information about vulnerabilities to enable security teams to define strategies to mitigate risk.

In this webinar we will talk about the reasons why vulnerability intelligence is a critical part of an information security strategy. We will discuss how vulnerability research, and the intelligence derived from it, can help organizations improve their security posture.

Key takeaways:

What makes vulnerability intelligence trustworthy

The most effective uses of vulnerability intelligence

How to leverage vulnerability intelligence to reduce risk
Aug 12 2014
34 mins
Compelling Reasons to use Vulnerability Intelligence
Join us for this summit:
More from this community:

IT Security

  • Live 2 and recorded (5863)
  • Upcoming (126)
  • Date
  • Rating
  • Views
  • Channel
  • Channel profile
  • How to Mitigate the Risk of Software Vulnerabilities Aug 6 2015 2:00 pm UTC 30 mins
    Marcelo Pereira, Product Marketing Manager at Secunia
    This webinar is a webinar focused on a strategic view of risk mitigation:
    Vulnerabilities in commercial software remain one of the most common attack vectors for security incidents and data breaches, either as the entry point for hackers or the enabler of privileges escalation inside networks.
    Despite awareness of the risk, and the fact that most software vulnerabilities have a fix the day they are made public, organizations continue to fail to execute mitigation actions. The consequence is that we continue to see costly breaches affecting businesses around the globe.
    In this webinar, Marcelo will talk about how the use of vulnerability intelligence can be a game changer to help organizations become better at mitigating the risk of software vulnerabilities.
    Key takeaways:
    -Fresh data related to software vulnerabilities
    -The challenge of prioritizing mitigation
    -How the use of vulnerability intelligence can help support consistent risk reduction
  • Understanding Software Vulnerabilities Aug 4 2015 2:00 pm UTC 30 mins
    Marcelo Pereira, Product Marketing Manager at Secunia
    This webinar is for business leaders who wish to understand vulnerabilities in commercial software and how they can impact organizations:
    Software vulnerabilities remain one of the most common attack vectors for security incidents and data breaches, either as the entry point for hackers or as the enabler of privileges escalation inside networks.
    This webinar demystifies software vulnerabilities, shows how they relate to the wider ecosystem and demonstrates how this knowledge can be used to define strategies and improve security.
    Key takeaways:
    -What is a software vulnerability
    -How a software vulnerability becomes a threat
    -A glimpse of how threats multiply
    -How closing vulnerabilities impacts risk reduction
  • Never mind the Next Big Threat Thing. Fix the Golden Oldies first. Recorded: Jun 10 2015 49 mins
    Santeri Kangas, CTO, Secunia
    Globally, we are seeing an increase in Advanced Persistent Threats (APT) and targeted attacks. And while the strategy applied to choosing which organizations and assets to target is increasingly sophisticated, the methods are the same as always: exploiting well-known vulnerabilities that could have been mitigated with simple and fundamental controls.

    In this webinar, Secunia’s new CTO Santeri Kangas will use real-life examples to demonstrate how hackers actually exploit vulnerabilities, and illustrate the risk organizations are effectively accepting, when they neglect the fundamentals of IT security. Kangas also discusses how organizations can strengthen their resilience to attacks that exploit publicly known vulnerabilities, and explain why business leaders are central players in saving the company bacon: they need to get behind the efforts to get security fundamentals right.
  • How to Enhance your Configuration Manager Environment Recorded: May 14 2015 60 mins
    Wally Mead, Principal Program Manager, Cireson
    You have System Center 2012 Configuration Manager implemented in your environment, and you are realizing great results with it. However, can you take it a bit further to gain even more benefits? You sure can, and Cireson can help. In this session, Wally will introduce you to the Cireson Remote Manage app, which can assist your help desk in supporting their clients, as well as Cireson Asset Management, which can provide full asset management capabilities that leverage your Configuration Manager investment.

    Attend this session and learn:

    · How the Cireson Remote Manage app can assist your help desk analyst in supporting their customers
    · How to enhance asset management capabilities of Configuration Manager with Cireson’s Asset Management capabilities to provide financial and business data tied into your software and hardware assets
    · How to manage 3rd party software with ConfigMgr and how Secunia can enhance that process
  • All About the Thousands of 2014 Vulnerabilities - From Secunia Research Recorded: Apr 14 2015 43 mins
    Kasper Lindgaard, Director of Research and Security, Secunia
    Every year, Secunia Research releases a review of the global vulnerability landscape, based on their large vulnerability database and data from the Secunia Personal Software Inspector (PSI) user base.

    The data in this research provides security professionals around the world with perspective on the impact and evolution of the threat landscape and what has trended throughout the year.

    In this webinar, Secunia’s Director of Research and Security Kasper Lindgaard will discuss the data presented in the Secunia Vulnerability Review 2015 and answer questions.

    The review itself was released on March 25.

    You can download a copy of the review on our website:

    www.secunia.com/VR2015

    Key takeaways:

    - The number of vulnerabilities and zero-days detected in 2014

    - How quick vendors are to respond to vulnerabilities

    - Which programs are more vulnerable

    - How products bundled with open source applications and libraries affect security
  • Reducing the Risk of Targeted Attacks with Intelligence Recorded: Mar 17 2015 47 mins
    Marcelo Pereira, Product Marketing Manager, Secunia
    If your intuitive response to the risk of targeted attacks is to run and get some Advanced Threat

    Protection, do yourself a favour and take a step back. The reality is that, while the number of advanced

    attacks has been increasing, the vast majority of cases still use fairly simple techniques and exploit

    publically known vulnerabilities that can be solved by regular patching or other mitigation actions.

    In this webinar we will talk about how you should use vulnerability intelligence to reduce the attack

    surface for hackers and strengthen resilience before you think of implementing ATP solutions.

    Key takeaways:

    - An overview of a multi-layered security approach

    - How to leverage vulnerability intelligence to reduce risk
  • Deploying a Configuration Manager Lab in Azure via PowerShell Recorded: Dec 16 2014 46 mins
    Trevor Sullivan, Microsoft MVP-PowerShell
    During this webinar, we will discuss the process of deploying a Microsoft System Center 2012 Configuration Manager lab environment on the Microsoft Azure platform, by using Desired State Configuration, the Azure PowerShell module, and general PowerShell automation.
  • How to mitigate the risk of APT with a multi-layered approach to security Recorded: Dec 11 2014 39 mins
    Andrei Vilcan, Head of Information Security, Banca Transilvania
    In this webinar, Andrei Vilcan will present his approach to Information Security and how he and his team work to mitigate the risk of Advanced Persistent Threat attacks at Banca Transilvania.
    He will introduce the aspects of the multi-layered approach to the Information Security strategy he is in charge of implementing, the challenges he faces and his achievements so far.
    As a Secunia CSI user, he will share how the solution helps him in one of the key areas of his strategy: security patch management.

    About Andrei: Andrei is Head of Information Security at Banca Transilvania. He has 23 years of experience in IT Management, the past 6 of which is in IT Security. He works to protect his organization’s assets, including customer data, to ensure that the business can operate without disruptions.
  • Heartbleed, Bash Bug and Poodle: What we learnt from the Big Three in 2014! Recorded: Dec 3 2014 33 mins
    Kasper Lindgaard, Director of Research and Security, Secunia
    In April, one fairly minor vulnerability - Heartbleed - sent the IT community reeling. Since then we’ve had Shellshock/Bashbug and Poodle.

    2014 was a year of high profile cases that effected massive changes in the IT community - and the lessons learnt should stay top of mind.
  • Focus: Software Vulnerability Management Recorded: Oct 14 2014 36 mins
    Marcelo Pereira, Business Development and Analyst Relations, Secunia
    RISK.

    Managing risk must start with reducing the cracks and holes through which unwelcome visitors can gain access to any valuables you want to protect.

    Software vulnerabilities are often the entry points used by cybercriminals to get into organizations and escalate attacks. For that reason, having a comprehensive overview and accurate information on software vulnerabilities is one of the critical factors to assess risk and prioritize the actions that will have a strong and consistent impact on reducing the attack surface.

    The immediate result of managing software vulnerabilities is the proactive reduction of risk, but there is another, often overlooked, benefit for organizations. Less cracks and holes means less noise for those who monitor environments for incidents and are responsible for responding to them. The outcome is improved accuracy, faster responses and lower cost.

    In this webinar we explain the intelligence that goes into managing software vulnerabilities, how it differs from basic information about vulnerabilities and how organizations can benefit from intelligence to become more secure.
  • Secunia's Corporate Software Inspector 7.0 Reviewed live Recorded: Aug 19 2014 46 mins
    Microsoft MVP Kent Agerlund, Coretech
    Walk through Secunia's Corporate Software Inspector, CSI, 7.0 with Microsoft MVP Kent Agerlund, Coretech. Kent will walk through and review Secunia's CSI 7.0 live - while demoing the tool and answering questions. In addition he will review the System Center CnfgMngr 2012 Plug-in - the add on piece to Secunia's CSI 7 solution.
  • Compelling Reasons to use Vulnerability Intelligence Recorded: Aug 12 2014 34 mins
    Marcelo Pereira, Business Development and Analyst Relations at Secunia
    Dealing with the threat of cyber-attacks becomes more complex as the methods used by hackers to break into organizations and steal valuable assets become more sophisticated. Business leaders panic when hearing about the risks of advanced targeted attacks (ATA), advanced persistent threat (APT) and other acronyms.

    As fairly simple techniques are all it takes to exploit vulnerabilities, and vulnerability exploitation is behind the majority of security breaches, one of the challenges organizations face in the race against cyber-attacks is acquiring trusted information about vulnerabilities to enable security teams to define strategies to mitigate risk.

    In this webinar we will talk about the reasons why vulnerability intelligence is a critical part of an information security strategy. We will discuss how vulnerability research, and the intelligence derived from it, can help organizations improve their security posture.

    Key takeaways:

    What makes vulnerability intelligence trustworthy

    The most effective uses of vulnerability intelligence

    How to leverage vulnerability intelligence to reduce risk
  • Work Smarter Not Harder Recorded: Aug 6 2014 58 mins
    Nash Pherson, Microsoft MVP, Now Micro
    In this one hour session, Microsoft MVP Nash Pherson and Right Click Tools Author Ryan Ephgrave will show day-to-day scenarios that all ConfigMgr Administrators will recognize, but utilize tools that make them easier. These include things like keeping your ConfigMgr infrastructure healthy and happy, taking care of ConfigMgr Clients, and deploying and troubleshooting software updates. Come see the Now Micro Right Click Tools and Secunia Corporate Software Inspector in action!
  • Patching and Compliance: A CISO's perspective to reducing risk Recorded: Jul 15 2014 48 mins
    Larry Whiteside, Chief Information Security Officer for LCRA
    Join us on Tuesday, July 15th for a Webinar with Larry Whiteside, Chief Information Security Officer for LCRA, as he discusses Patching and Compliance: A CISO's perspective to reducing risk.

    Over the past few years security has gotten caught up in the latest hype or trends related to threats. This has caused many security teams to lose focus of some basic things that can be done to mitigate new and old threats in their environment. In this Webinar we will discuss tride and true techniques to mitigate risk and help security organizations take care of some low hanging fruit.
  • Using PowerShell with ConfigMgr 2012 R2 Recorded: Jun 20 2014 50 mins
    Greg Ramsey, Microsoft MVP, Dell, Inc
    In this session, we will discuss how to use PowerShell with ConfigMgr to make your job easier. You will learn about the integrated cmdlets, as well as how to step out and leverage WMI when you need to handle those ‘special’ PackageFlags and other tasks.
  • ConfigMgr HTTPS Client Communication Recorded: Jun 19 2014 46 mins
    Jason Sandys
    HTTPS client communication enables other features within ConfigMgr including IBCM and Mac OSX support and also increases the security of client communication. The pre-requisite for HTTPS client communication and implementing HTTPS client communication is simple, right? Well, as many have found out, the added complexity of a PKI and certificates makes this task much more complex than it appears at first. This session will cover the not-so-basics along with the multiple possible pitfalls when implementing HTTPS client communication in ConfigMgr.
  • Managing 3rd Party Updates with Microsoft’s System Center Configuration Manager Recorded: Jun 18 2014 48 mins
    Meaghan McKeown, Director Business Development, Secunia
    Attend this session and learn tips and tricks on how to solve the daily challenges around patching your environment with Microsoft and non-Microsoft updates. We will outline best practices and demonstrate how to effectively patch 3rd party applications in System Center Configuration Manager.
  • Was Heartbleed Really that Critical? Recorded: Jun 18 2014 30 mins
    Kasper Lindgaard, Director Research and Security
    Was Heartbleed really that critical? What’s all the commotion about? Why did it cause so much trouble?

    Part of the answer lies in the failed disclosure of it. In early April 2014, Heartbleed was the hot topic, not only in the security media, but equally in mainstream vehicles. Very few times in the past has a vulnerability received such extensive media coverage. And even as its newsworthiness lessens, the consequences of Heartbleed continue to develop.

    In this webinar, Secunia’s Director of Research and Security, Kasper Lindgaard will present his views on the disclosure of the Heartbleed vulnerability, and how it exemplifies that an unsuccessful coordinated disclosure increases the risk of exploitation. Kasper will also talk about the impact for technology vendors using the vulnerable Heartbeat in their products, and give an overview of the number of products and vendors affected to date.

    Key takeaways:
    -Insights into the dynamics of vulnerability research and how it impacts security in the context of the Heartbleed event.
    -The impact of Heartbleed for technology vendors.
    -Figures on vendors and products affected.
    -Learnings from the Heartbleed incident for the industry and for security practitioners.
  • Strategies to Prevent ConfigMgr Oopsies Recorded: Jun 17 2014 55 mins
    Nash Pherson, Microsoft MVP
    ConfigMgr 2012 R2 is the most powerful systems management tool available… and that power may keep your manager up at night. This session will cover strategies for developing the people, process, and technical tools required to reduce the risk of an ‘oops’ with ConfigMgr. We will discuss how to develop staff members to appropriately utilize ConfigMgr, common mistakes and how to overcome them, and how to leverage the built-in Role Based Administration security model.
  • System Center Configuration Manager and the art of Compliance Management Recorded: Jun 16 2014 47 mins
    Kent Agerlund, Microsoft MVP, Coretech
    With Compliance Settings aka Management you can combine all the cool features in Configuration Manager into a single set of rule. In this session you will learn how to use compliance settings to control your Windows environment, Apple Mac OS X environment and your mobile devices.
Take pre-emptive action against vulnerabilities and security breaches
Secunia is recognised industry-wide as a pioneer and global player within the IT security ecosystem, in the niche of Vulnerability Management. Our award-winning portfolio equips corporate and private customers worldwide with Vulnerability Intelligence, Vulnerability Assessment, and automated Patch Management tools to manage and control vulnerabilities across their networks and endpoints.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Compelling Reasons to use Vulnerability Intelligence
  • Live at: Aug 12 2014 2:00 pm
  • Presented by: Marcelo Pereira, Business Development and Analyst Relations at Secunia
  • From:
Your email has been sent.
or close
You must be logged in to email this