Enter the BYOD - Assessing the Risk of Infected Smart devices at the Workplace
Every day more of your users are bringing their personal ‘smart’ devices to work and connecting them to corporate resources. But what happens when one of these devices is infected with a malicious app? Join us as we discuss the various flavors of malicious apps and the impact they can have in a your
Every day more of your users are bringing their personal ‘smart’ devices to work and connecting them to corporate resources. But what happens when one of these devices is infected with a malicious app? Join us as we discuss the various flavors of malicious apps and the impact they can have in a your IT environment. We will provide useful recommendations to IT administrators who have concerns about data leakage, phishing and other malicious activities which target these devices.
RecordedSep 14 201243 mins
Your place is confirmed, we'll send you email reminders
Join Keyaan Williams, Senior Executive, C|CISO Programs at EC-Council for his Corporate Governance for CISOs webinar series! The second webinar in the series will cover the topic of Board Presentations from an IS executive perspective. This session focuses on reporting the right metrics to the right people. What metrics should the CISO collect? Where do these metrics exist? What are the best ways to present this information to the board of directors and other organizational leaders?
You should assume that during 2016 your data will be subject to an attack from Cyber Criminals. Therefore you need to ask yourself… Where are you most vulnerable? What door has been left open?
We launched on February 18th our Webinar Series entitled Assumption of Attack, demonstrating how our market leading Smart Protection Suite delivers multi-layered protection for your business.
Our fifth webinar will look behind Door 5, Central Management. How can you centrally manage threat and data policies across your IT infrastructure? What are the benefits of a user-centric visibility across your environment?
The proliferation of Ransomware has ushered in a new wave of extortionware and a new generation of malware attacks. While these types of attacks are not new, they have become more insidious and sophisticated, growing in popularity in concert with the expansion of electronic payment systems such as bitcoin. In April, the US and Canada both issued formal warnings and suggestions, but how much that is reported about this new malware is true? Are we being naïve in our efforts to block these Ransomware attacks?
Attend this webcast to learn not only the truth behind Ransomware attacks, but also how to protect your organization utilizing a holistic and unifying visibility into your network and endpoints. Secureworks Security Analysis Senior Consultant, Harlan Carvey will answer vital questions about the nature of Ransomware and provide more insight into the actors, their methods, and their motivations:
- What is Ransomware?
- How does it proliferate?
- How do I detect and block it?
- How do I know what systems are compromised or how the attacker got in?
- Do I pay the ransom if I am attacked?
- How do I ensure that I don’t become a victim (again)?
Despite increasing cloud adoption in IT departments, many organizations are still concerned with data security. Those concerns are amplified by the loss of physical control over data and the potential for mismanagement of those assets when migrating to the cloud. As a result, this is often the top barrier to cloud deployment. However, with cloud innovations growing exponentially, the new wave of security solutions is breaking down those barriers.
In this webinar, Alert Logic cyber security evangelist, Paul Fletcher, will provide you with insight on how to get over hybrid cloud security hurdles and discuss:
• Common misconceptions surrounding hybrid cloud security
• Key strategies to secure a hybrid cloud environment
• Solutions to security threats within multiple hybrid cloud environments
As organizations migrate to services like Google Apps and Office 365, there is a growing need to secure data both in the cloud and across mobile devices. With CASB, IT administrators can distinguish between managed and unmanaged mobile devices without invasive agents, yet are able to limit access to sensitive data using granular policy controls. CASBs even enable control over data once downloaded to an end-user's device. Join Bitglass and (ISC)2 on May 5, 2016 at 1:00PM Eastern for the final part of our three-part webinar series, where we discuss the drawbacks of existing mobile security solutions and the ease of deploying a CASB to secure BYOD without hassles.
The first rule of data analytics for fast-growing companies? Measure all things. When putting in place a robust data analytics strategy to go from measurement to insight, you’ve got lots of options for tools -- from databases and data warehouse options to new “big data” tools such as Hadoop, Spark, and their related components. But tools are nothing if you don’t know how to put them to use.
We’re going to get some real talk from practitioners in the trenches and learn how people are bringing together new big data technologies in the cloud to deliver a truly world class data analytics solution. One such practitioner is Celtra, a fast-growing provider of creative technology for data-driven digital display advertising. We’re going to sit down with the Director of Engineering, Analytics at Celtra to learn how they built a high-performance data processing pipeline using Spark + a cloud data warehouse, enabling them to process over 2 billion analytics events per day in support of dashboards, applications, and ad hoc analytics.
In this webinar you’ll:
* Build a simpler, faster solution to support your data analytics
* Support diverse reporting and ad hoc analytics in one system
* Take advantage of the cloud for flexibility, scaling, and simplicity
* Evan Schuman, Moderator, VentureBeat
* Grega Kešpret, Director of Engineering, Analytics, Celtra
* Jon Bock, VP of Marketing and Products, Snowflake
Register today and learn how the top SaaS strategies can streamline your business.
Customers expect a seamless experience across services and devices, critical to ensure successful conversions and renewals in e-commerce. At the same time, the impact of disconnected user experience on employee productivity can have significant financial implications. Big egos, politics, a shortage of skilled talent, legacy systems and complexity can also conspire to undermine the success of your IAM program unless you plan for and take massive action today. Join Steve Tout as he presents Identity Coherence, a blueprint for creating massive value and success with IAM in a multi-vendor, multi-cloud environment.
As the Internet of Things encourages businesses to embrace big data, IT professionals turn to online resources to house and manage applications. However, cyber attacks are increasingly becoming a matter of “when,” not “if,” leading IT professionals to seek robust security solutions. Still on the fence about whether your small to medium sized enterprise really needs that much protection? Join Tricia Pattee, Product Manager at HOSTING, for a 30 minute webinar about scary facts about online security you need to know. Bring your questions – we’ll host a Q&A at the end of the presentation.
Secure clouds don't exist in a vacuum. The very nature of a secure cloud relies on effective standardized, interoperable, and scalable Internet security. As the cloud metaphor displaces the concept of proprietary point-to-point networked servers, the key to its value can be found in the interoperability of service protocols. Securing these connections requires understanding and deploying standards such as TLS HSTS, CT, CSP, DMARC, and FIDO. Each protocol addresses specific security concerns encountered when you extend your security perimeter to include external cloud services. Developing and deploying technologies like these requires a holistic view of the security landscape, and working within a robust Internet security ecosystem.
Key Talking Points:
- Cloud security relies on standardized Internet security protocols.
- Developing Internet security protocols requires multistakeholder involvement.
- Key areas of focus include securing: transport, content, communication, and authentication.
- Case studies presented in developing CT, CSP, DMARC, FIDO, and TLS 1.3
- Internet security is constantly evolving; adapt or perish.
Tyler Moffitt, Sr Threat Research Analyst at Webroot, Inc.
Today's advanced malware is increasingly difficult to remove and often even harder to detect in the first place. In this presentation, we examine the modern threat landscape and discuss the shortcomings of traditional antivirus; as well as how organizations can stay ahead of the malware curve. Malware authors aren't too concerned about what your traditional AV is capable of blocking since they've formed reliable tactics to circumvent that protection. Either through social engineering or advanced evasive tactics, traditional antivirus technology is fighting an uphill battle to defend against it. Learn about highlights and revelations from Blackhat 2015; specifically about the 1.4 million Chrysler vehicle hack, how windows software update services can be hacked, the future of biometrics, and the progress encrypting ransomware. We also will talk about updates on law enforcement's attempts to catch cybercriminals. We will also discuss the startling trends we've seen from phishing attacks and mobile malware and what it means for an end user.
Grayson Milbourne, Security Intelligence Director at Webroot, Inc.
2015 was yet another record setting year in the world of Internet security. More malware, malicious apps, websites, IP’s and phishing sites were discovered than in any previous year. At the same time, attacks on businesses and individuals continue to increase at an alarming rate.
This presentation will look at data from Webroot’s 2016 Threat Brief and examine threat trends and draw comparisons to data from Webroot’s 2015 Threat Brief. Most notable is the near complete utilization of polymorphic distribution models for malware whereby over 97% of infections today are intentionally unique for each infected system. Attend to learn about the impacts of this strategy as well as many other aspects of the constantly evolving threat landscape.
Andrew Bagnato, LabTech Technical Account Manager at Webroot, Inc.
Today’s MSPs face a world full of malware, and not many options when it comes to productive and profitable endpoint security. Join us as we dive into the wants, needs and challenges of MSPs, and how Webroot SecureAnywhere Business Endpoint Protection uses a smarter approach to address these pain points. During this webinar you will learn how endpoint security can be profitable for MSPs with the following features:
•Real time threat intelligence
•Detection with a 99.7%+ efficacy
•Multi-tenant cloud based management console
George Anderson, Director Product Marketing and Tyler Moffitt, Senior Threat Research Analyst
Due to the ever-changing nature of the Crypto* family and other ransomware, the sad truth is that no vendor can guarantee 100% protection. But, between advanced defenses with heuristic detection and a solid cybersecurity best practices strategy, it is possible to protect your business and data from these insidious threats.
This webinar will examine:
» How ransomware is developed, and who the newest players are
» Why ransomware is so good at getting around the usual defenses
» Your best chance at beating the threat (and minimizing the impact in the case that you don’t)
Grayson Milbourne, Security Intelligence Director at Webroot, Inc.
While many are familiar with the more mainstream security conferences, such as RSA, BlackHat and Virus Bulletin, AVAR is an international conference put on by the Association of Anti-Virus Asia Researchers, meeting for the 18th year, which focuses on the specific topic of malware research and analysis.
This presentation will review the content delivered at this conference and highlight the challenges and successes researchers have faced over the past year when analyzing malware to secure our online future.
Tyler Moffitt, Webroot Senior Threat Research Analyst
2015 has been a huge year for malware. Learn about highlights and revelations from Black Hat 2015, specifically how the windows software update services can be hacked, the future of biometrics, and the progress of scams and other victim-initiated payments like ransomware.
We will also discuss the spikes we've seen from phishing attacks this year and what it means for an end user.
George J. Anderson, Product Marketing Director at Webroot Inc.
Web security is back on the IT Security agenda in a big way. With breaches caused by web usage at an all-time high security professionals are realizing that relying solely on endpoint security to protect their users is downright negligent.
This presentation explores why with this reappraisal is happening and why so many companies are opting for SaaS cloud-based Secure Web Gateway solutions. It also looks at how Webroot, using its BrightCloud Threat Intelligence platform, have completely updated their existing cloud-based web security service to provide a new logical first line of security defense for web users.
1.Why web security should be the primary user security defense layer?
2.The advantages of cloud-based web security over traditional on-premise solutions.
3.The benefits your organization will see as a result of cloud-based web security.
David Dufour | Senior Director of Security Architecture
Traditional cybersecurity approaches aren’t effective in the world of IoT with the vast disparity in device capabilities, resource constraints and architectural designs. This diversity has created an environment where attacking the IoT infrastructure of an organization will become more common place. This presentation will discuss what can be done in the near term to help protect against attacks on the varying device types and their ecosystems.
Grayson Milbourne, Security Intelligence Director at Webroot, Inc.
This year’s BlackHat conference was the largest ever in both attendance and vulnerabilities disclosed. From the Fiat Chrysler recall of 1.4 million vehicles due to a remote hacking security gap, to the nearly billion Android devices that needed updating against an MMS flaw in the Stagefright engine, the issues facing our digital world are only becoming more severe. This presentation will review the hottest discussion topics from BlackHat, as well as provide updates and insights on the current threat landscape and the security issues the future may hold.
Rick Holland - Principal Analyst, Forrester Research and David Dufour - Sr. Director of Security Architecture, Webroot
In 2014, Forrester Research saw a significant shift in customers’ awareness of cybersecurity risks. In response, Forrester has developed strategic and tactical recommendations for enterprise security programs in a March 2015 report entitled “Twelve Recommendations For Your Security Program In 2015.” In this webcast, guest speaker Rick Holland from Forrester and Webroot’s David Dufour will review and discuss those recommendations, with a particular focus on the use of big data and threat intelligence, and the impact of IoT.
David Dufour, Senior Director of Security Architecture, Webroot
This presentation will provide an overview of contextualization and how contextualized data can be used to prevent both known and unknown threats. It will dive deep into the technologies used in the collation and analysis process across both single and multiple threat types. It will conclude with real world use cases where contextualized data can help identified and prevent threats.
Tyler Moffitt and Cameron Palan, Senior Threat Research Analysts at Webroot
With the mobile platform now outpacing desktop users it's important to be informed on what type of threats utilize the smartphone as a vector of attack. This presentation will look at the mobile threat landscape at a glance with statistics over the past couple years as well as its growth to what it is today. We'll also take a few specific threats and take an in-depth look to show the differences compared to PC that have been developed to take advantage of the Android.
Steve Piper, CEO, CyberEdge and Hal Lonas, CTO, Webroot
This presentation provides key findings from the 2015 Cyberthreat Defense Report from the analyst firm CyberEdge. Based on a survey of IT security decision makers and practitioners across North America and Europe, the report examines the current and planned deployment of security measures, including the use of threat intelligence. It also provides developers of IT security technologies and products with answers they need to better align their solutions with the concerns and requirements of end users.
David Dufour, Senior Director of Security Architecture, Webroot
With the rapidly accelerating nature of attacks on network infrastructure and software systems approaches such as static block lists, manual policy configurations and other current prevention techniques have become outdated. Through the use of distributed computing, contextualization and machine learning it is possible to build tools that analyze data across multiple threat vectors allowing for the development of predictive algorithms and a greater understanding of an organizations threat landscape. We will walk through common machine learning techniques, discuss contextualization, how predictive logic works and see a demonstration of contextualized threat intelligence.
This presentation provides an overview of the threats against a wide range of organizations and individuals during 2014. This overview is based on research and analysis conducted by the Webroot Threat Research team. The report includes analysis of IP addresses associated with malicious activity, details on the reputation of URLs by category and location, phishing detection statistics, insights into file reputation and encounter rates with malware and PUAs and information on mobile app security for Android devices. All data presented comes from Webroot’s Intelligence Network and was observed during 2014.
Tyler Moffitt, Senior Threat Research Analyst, Webroot
You only have two lines of defense when it comes to blocking threats. Beyond relying on your security solution for protection the only safeguard is you and your decisions. Malware authors aren't too concerned about what your AV is capable of blocking since they've formed reliable tactics to circumvent that protection. Their focus now is social engineering. You'd be surprised what the average user, and even the experienced user might fall for when it's presented in a professional fashion. We'll talk about tactics involved with phishing attachments, Fake AVs, PUAs, Cold Calls, and Encrypting Ransomware. This Webinar will go into detail on the different types of social engineering used in each of these threats to turn you into a reliable clicker.
With the exponential growth and sophistication of malware today, the security industry can no longer afford to ‘bury its head in the sand’. The bottom line is that traditional endpoint security protection has now become ineffective due to the sheer volume, quality, and complexity of malware. New threats have stretched the capabilities of "fat client" security architectures to the limit, making it impractical to keep endpoints updated with signatures for all the new viruses.
Please join us for a live demonstration of Webroot SecureAnywhere® Business – Endpoint Protection.
Grayson Milbourne, Director of Security Intelligence, Webroot
There was more Malware in 2014 than all Malware measured since 1984! Today's malware now hides not only in blacklisted websites and email attachments - it may emanate from the Web's most popular sites, from "Friends" on popular social networking sites, or from bots that reside on the own corporate network. In this special webcast the presenter will take a step back and review the history of malware, its purpose then, and its purpose now.
George Anderson, Director Product Marketing, Webroot
Traditional endpoint security has failed to keep up with today’s threats and is exposing organizations to unacceptable levels of risk. It’s time for smarter, next-generation malware prevention to replace or supplement traditional defenses. New approaches to malware can wrest back control and give security administrators greater visibility and control over their endpoints at a lower cost than traditional solutions.
This webinar will look at the endpoint threats organizations are facing, the means to combat those threats, and why next-generation, cloud-driven protection offers the smartest way to prevent endpoint malware infections.
George Anderson, Director, Product Marketing,Webroot
In 2014 we’ve already seen about 35% of the new malware ever seen!
In this webinar you’ll learn what has created this perfect storm of new malware?
What sort of malware it is? What it’s doing? And where Webroot believe this is going in the next 12 months into 2015.They say knowledge is power this webinar will give you the understanding to go with it and help you defend your organization.
Webroot delivers next-generation endpoint security and threat intelligence services to protect businesses and individuals around the globe. Our smarter approach harnesses the power of cloud-based collective threat intelligence derived from millions of real-world devices to stop threats in real time and help secure the connected world. Our award-winning SecureAnywhere® endpoint solutions and BrightCloud® Threat Intelligence Services protect tens of millions of devices across businesses, home users, and the Internet of Things. Trusted and integrated by market-leading companies, including Cisco, F5 Networks, Aruba, Palo Alto Networks, A10 Networks, and more, Webroot is headquartered in Colorado and operates globally across North America, Europe, and Asia. Discover Smarter Cybersecurity™ solutions at www.webroot.com.