Enter the BYOD - Assessing the Risk of Infected Smart devices at the Workplace
Every day more of your users are bringing their personal ‘smart’ devices to work and connecting them to corporate resources. But what happens when one of these devices is infected with a malicious app? Join us as we discuss the various flavors of malicious apps and the impact they can have in a your IT environment. We will provide useful recommendations to IT administrators who have concerns about data leakage, phishing and other malicious activities which target these devices.
RecordedSep 14 201243 mins
Your place is confirmed, we'll send you email reminders
Year over year, newer and more inventive social-engineering techniques, such as watering hole attacks and spear phishing, are combined with malware attacks to trick users into handing over their personal information. Traditional security solutions are unable to keep up with these new threats and provide effective solutions. By using big data analytics and security intelligence, a Security-as-a-Service platform provides real-time protection to millions of end users daily. This will define the next generation of cloud-based threat identification and advanced persistent threat prevention by leveraging collective cloud-hosted intelligence to offer up-to-the-minute protection—both on the web and across all device platforms.
Attendees will leave this presentation with:
• An overview of the common threats and methods used to perform attacks.
• A summary of the impact such threats bring to both users and businesses.
• A better understanding of the challenges and benefits of deploying a cloud-based security solution.
Tyler Moffitt, Sr Threat Research Analyst at Webroot, Inc.
Today's advanced malware is increasingly difficult to remove and often even harder to detect in the first place. In this presentation, we examine the modern threat landscape and discuss the shortcomings of traditional antivirus; as well as how organizations can stay ahead of the malware curve. Malware authors aren't too concerned about what your traditional AV is capable of blocking since they've formed reliable tactics to circumvent that protection. Either through social engineering or advanced evasive tactics, traditional antivirus technology is fighting an uphill battle to defend against it. Learn about highlights and revelations from Blackhat 2015; specifically about the 1.4 million Chrysler vehicle hack, how windows software update services can be hacked, the future of biometrics, and the progress encrypting ransomware. We also will talk about updates on law enforcement's attempts to catch cybercriminals. We will also discuss the startling trends we've seen from phishing attacks and mobile malware and what it means for an end user.
Grayson Milbourne, Security Intelligence Director at Webroot, Inc.
2015 was yet another record setting year in the world of Internet security. More malware, malicious apps, websites, IP’s and phishing sites were discovered than in any previous year. At the same time, attacks on businesses and individuals continue to increase at an alarming rate.
This presentation will look at data from Webroot’s 2016 Threat Brief and examine threat trends and draw comparisons to data from Webroot’s 2015 Threat Brief. Most notable is the near complete utilization of polymorphic distribution models for malware whereby over 97% of infections today are intentionally unique for each infected system. Attend to learn about the impacts of this strategy as well as many other aspects of the constantly evolving threat landscape.
Andrew Bagnato, LabTech Technical Account Manager at Webroot, Inc.
Today’s MSPs face a world full of malware, and not many options when it comes to productive and profitable endpoint security. Join us as we dive into the wants, needs and challenges of MSPs, and how Webroot SecureAnywhere Business Endpoint Protection uses a smarter approach to address these pain points. During this webinar you will learn how endpoint security can be profitable for MSPs with the following features:
•Real time threat intelligence
•Detection with a 99.7%+ efficacy
•Multi-tenant cloud based management console
George Anderson, Director Product Marketing and Tyler Moffitt, Senior Threat Research Analyst
Due to the ever-changing nature of the Crypto* family and other ransomware, the sad truth is that no vendor can guarantee 100% protection. But, between advanced defenses with heuristic detection and a solid cybersecurity best practices strategy, it is possible to protect your business and data from these insidious threats.
This webinar will examine:
» How ransomware is developed, and who the newest players are
» Why ransomware is so good at getting around the usual defenses
» Your best chance at beating the threat (and minimizing the impact in the case that you don’t)
Grayson Milbourne, Security Intelligence Director at Webroot, Inc.
While many are familiar with the more mainstream security conferences, such as RSA, BlackHat and Virus Bulletin, AVAR is an international conference put on by the Association of Anti-Virus Asia Researchers, meeting for the 18th year, which focuses on the specific topic of malware research and analysis.
This presentation will review the content delivered at this conference and highlight the challenges and successes researchers have faced over the past year when analyzing malware to secure our online future.
Tyler Moffitt, Webroot Senior Threat Research Analyst
2015 has been a huge year for malware. Learn about highlights and revelations from Black Hat 2015, specifically how the windows software update services can be hacked, the future of biometrics, and the progress of scams and other victim-initiated payments like ransomware.
We will also discuss the spikes we've seen from phishing attacks this year and what it means for an end user.
George J. Anderson, Product Marketing Director at Webroot Inc.
Web security is back on the IT Security agenda in a big way. With breaches caused by web usage at an all-time high security professionals are realizing that relying solely on endpoint security to protect their users is downright negligent.
This presentation explores why with this reappraisal is happening and why so many companies are opting for SaaS cloud-based Secure Web Gateway solutions. It also looks at how Webroot, using its BrightCloud Threat Intelligence platform, have completely updated their existing cloud-based web security service to provide a new logical first line of security defense for web users.
1.Why web security should be the primary user security defense layer?
2.The advantages of cloud-based web security over traditional on-premise solutions.
3.The benefits your organization will see as a result of cloud-based web security.
David Dufour | Senior Director of Security Architecture
Traditional cybersecurity approaches aren’t effective in the world of IoT with the vast disparity in device capabilities, resource constraints and architectural designs. This diversity has created an environment where attacking the IoT infrastructure of an organization will become more common place. This presentation will discuss what can be done in the near term to help protect against attacks on the varying device types and their ecosystems.
Grayson Milbourne, Security Intelligence Director at Webroot, Inc.
This year’s BlackHat conference was the largest ever in both attendance and vulnerabilities disclosed. From the Fiat Chrysler recall of 1.4 million vehicles due to a remote hacking security gap, to the nearly billion Android devices that needed updating against an MMS flaw in the Stagefright engine, the issues facing our digital world are only becoming more severe. This presentation will review the hottest discussion topics from BlackHat, as well as provide updates and insights on the current threat landscape and the security issues the future may hold.
Rick Holland - Principal Analyst, Forrester Research and David Dufour - Sr. Director of Security Architecture, Webroot
In 2014, Forrester Research saw a significant shift in customers’ awareness of cybersecurity risks. In response, Forrester has developed strategic and tactical recommendations for enterprise security programs in a March 2015 report entitled “Twelve Recommendations For Your Security Program In 2015.” In this webcast, guest speaker Rick Holland from Forrester and Webroot’s David Dufour will review and discuss those recommendations, with a particular focus on the use of big data and threat intelligence, and the impact of IoT.
David Dufour, Senior Director of Security Architecture, Webroot
This presentation will provide an overview of contextualization and how contextualized data can be used to prevent both known and unknown threats. It will dive deep into the technologies used in the collation and analysis process across both single and multiple threat types. It will conclude with real world use cases where contextualized data can help identified and prevent threats.
Tyler Moffitt and Cameron Palan, Senior Threat Research Analysts at Webroot
With the mobile platform now outpacing desktop users it's important to be informed on what type of threats utilize the smartphone as a vector of attack. This presentation will look at the mobile threat landscape at a glance with statistics over the past couple years as well as its growth to what it is today. We'll also take a few specific threats and take an in-depth look to show the differences compared to PC that have been developed to take advantage of the Android.
Steve Piper, CEO, CyberEdge and Hal Lonas, CTO, Webroot
This presentation provides key findings from the 2015 Cyberthreat Defense Report from the analyst firm CyberEdge. Based on a survey of IT security decision makers and practitioners across North America and Europe, the report examines the current and planned deployment of security measures, including the use of threat intelligence. It also provides developers of IT security technologies and products with answers they need to better align their solutions with the concerns and requirements of end users.
David Dufour, Senior Director of Security Architecture, Webroot
With the rapidly accelerating nature of attacks on network infrastructure and software systems approaches such as static block lists, manual policy configurations and other current prevention techniques have become outdated. Through the use of distributed computing, contextualization and machine learning it is possible to build tools that analyze data across multiple threat vectors allowing for the development of predictive algorithms and a greater understanding of an organizations threat landscape. We will walk through common machine learning techniques, discuss contextualization, how predictive logic works and see a demonstration of contextualized threat intelligence.
This presentation provides an overview of the threats against a wide range of organizations and individuals during 2014. This overview is based on research and analysis conducted by the Webroot Threat Research team. The report includes analysis of IP addresses associated with malicious activity, details on the reputation of URLs by category and location, phishing detection statistics, insights into file reputation and encounter rates with malware and PUAs and information on mobile app security for Android devices. All data presented comes from Webroot’s Intelligence Network and was observed during 2014.
Tyler Moffitt, Senior Threat Research Analyst, Webroot
You only have two lines of defense when it comes to blocking threats. Beyond relying on your security solution for protection the only safeguard is you and your decisions. Malware authors aren't too concerned about what your AV is capable of blocking since they've formed reliable tactics to circumvent that protection. Their focus now is social engineering. You'd be surprised what the average user, and even the experienced user might fall for when it's presented in a professional fashion. We'll talk about tactics involved with phishing attachments, Fake AVs, PUAs, Cold Calls, and Encrypting Ransomware. This Webinar will go into detail on the different types of social engineering used in each of these threats to turn you into a reliable clicker.
With the exponential growth and sophistication of malware today, the security industry can no longer afford to ‘bury its head in the sand’. The bottom line is that traditional endpoint security protection has now become ineffective due to the sheer volume, quality, and complexity of malware. New threats have stretched the capabilities of "fat client" security architectures to the limit, making it impractical to keep endpoints updated with signatures for all the new viruses.
Please join us for a live demonstration of Webroot SecureAnywhere® Business – Endpoint Protection.
Grayson Milbourne, Director of Security Intelligence, Webroot
There was more Malware in 2014 than all Malware measured since 1984! Today's malware now hides not only in blacklisted websites and email attachments - it may emanate from the Web's most popular sites, from "Friends" on popular social networking sites, or from bots that reside on the own corporate network. In this special webcast the presenter will take a step back and review the history of malware, its purpose then, and its purpose now.
George Anderson, Director Product Marketing, Webroot
Traditional endpoint security has failed to keep up with today’s threats and is exposing organizations to unacceptable levels of risk. It’s time for smarter, next-generation malware prevention to replace or supplement traditional defenses. New approaches to malware can wrest back control and give security administrators greater visibility and control over their endpoints at a lower cost than traditional solutions.
This webinar will look at the endpoint threats organizations are facing, the means to combat those threats, and why next-generation, cloud-driven protection offers the smartest way to prevent endpoint malware infections.
Webroot delivers next-generation endpoint security and threat intelligence services to protect businesses and individuals around the globe. Our smarter approach harnesses the power of cloud-based collective threat intelligence derived from millions of real-world devices to stop threats in real time and help secure the connected world. Our award-winning SecureAnywhere® endpoint solutions and BrightCloud® Threat Intelligence Services protect tens of millions of devices across businesses, home users, and the Internet of Things. Trusted and integrated by market-leading companies, including Cisco, F5 Networks, Aruba, Palo Alto Networks, A10 Networks, and more, Webroot is headquartered in Colorado and operates globally across North America, Europe, and Asia. Discover Smarter Cybersecurity™ solutions at www.webroot.com.
Blazent's CEO, Charlie Piper and Dan Ortega introduce the company strategy, vision and it's value to customer's and MSP partners. Together, Charlie and Dan describe how Blazent's platform finds the the most accurate data to improve decision manking in IT and beyond.
Stu Sjouwerman, CEO of KnowBe4, has seen first-hand the devastating impact of ransomware on healthcare entities. And he knows traditional defenses aren't enough to ward off attackers. What's needed is a whole new approach to user education.
La empresa de la actualidad, a medida que adopta la transformación digital, necesita abordar una série de retos para avanzar.
En esto webinar los especialistas de CA muestran como el CA Live API Creator es una manera increíblemente rápida de crear API's.
This webinar will provide tips for successfully navigating the expanding role of the Chief Information Security Officer as an essential business leader. Explore leading practices for managing cybersecurity risk as a people, process and IT leader. Get tips for building a working relationship with other executive stakeholders in audit, compliance and enterprise risk. And hear how other CISOs are establishing more productive reporting relationships with the board of directors. Whether you’d like to expand your role as a risk and security professional, gain more executive support for key initiatives, or improve your relationship with the board, you’ll take away actionable insights to apply to your own journey as an essential business leader.
Ransomware is currently one of the most disruptive security challenges for enterprises. As it moves from an individual employee's PC to the corporate network, the impact can be significant. Despite research and analysis by security firms and analysts, most don't have a good idea of how a piece of ransomware actually operates, i.e. what is affected and when, what signals to look for, etc. Exabeam researchers have detonated nearly 100 strains of ransomware in the labs and produced a detailed analysis of how a ransomware attack actually unfolds, and how an organization might respond to shut it down. Join Exabeam and (ISC)2 on July 21, 2016 at 1:00PM Eastern and gain a better understanding of the mechanisms of ransomware, how to detect it and shut down an attack.
Thanks to advances in attack distribution, anonymous payments, and the ability to reliably encrypt and decrypt data, ransomware is on a tear. To protect your organization from having to pay attackers to free your data, you need to evolve beyond a layered security approach to a prevention-oriented architecture – or face threats of Jurassic proportions.
Learn more about the right architectural approach for effectively preventing ransomware infections and other sophisticated threats, even across distributed IT environments.
Many enterprise organizations are moving beyond antivirus software, adding new types of controls and monitoring tools to improve incident prevention, detection, and response on their endpoints. Unfortunately, some of these firms are doing so by adding tactical technologies that offering incremental benefits only.
So what’s needed?
A strategic approach that covers the entire ESG endpoint security continuum from threat prevention to incident response. A truly comprehensive solution will also include advanced endpoint security controls that reduce the attack surface and tight integration with network security, SIEM, and threat intelligence to improve threat detection and response processes.
Join ESG senior principal analyst Jon Oltsik, Intel Security, and Bufferzone on a webinar on July 21 at 10am PT/1pm ET to learn more about next-generation endpoint security requirements and strategies.
Today's supply chains are faced with an increasing number of distribution channels, a broader set of suppliers and ever decreasing product cycles. A new approach is required that delivers a step change in agility. MuleSoft's API-led approach delivers up to 200% faster development cycles through leveraging re-usable assets. Join us for a walkthrough of this approach, including a demo of Anypoint Platform and Anypoint B2B.
Cybersecurity Webcast co-hosted by SANS and Palo Alto Networks
In financial institutions, investments in cybersecurity may occur in fits and starts due to actual incidents, media coverage, or perceived risk. This presents challenges in maintaining a consistent security posture, especially as the threats and the attack surfaces evolve continuously.
In this webcast you will learn about the value of constant monitoring and awareness of your network traffic, the role and relevance of anomalies, and the benefits of an overall security architecture for financial institutions.