Kinshuk Pahare, Director of Pruduct Development, LookingGlass
The cyber threat landscape is constantly evolving and conventional security products (Firewalls, IPS/IDS and web proxies) are unable to address emerging threats in a fast and efficient manner. LookingGlass’ newest threat mitigation appliance, the ScoutShield Threat Intelligence Gateway, provides a zero-touch solution to automate the threat response.
Join our Director of Product Management, Kinshuk Pahare as he discusses the:
1. Challenges with conventional security appliances and the need for a Threat Intelligence Gateway.
2. Importance of having high quality threat intelligence.
3. Must-have characteristics of a Threat Intelligence Gateway appliance.
Security teams continually look for better ways to collect, analyze, and apply threat intelligence. Join our webcast with industry experts Mike Rothman and A.J. Shipley in their lively discussion of building, optimizing, and getting more value from your threat intelligence program. They’ll explore:
•Evaluating data quality
•Understanding threat context, relevance and priority
•Key use cases around threat prevention, detection, and remediation
•Best practices and advanced tools & technologies.
Although it’s been around for years, phishing is still one of the most common and effective online scams – and it just continues to grow. In Q1 2016 alone, phishing attacks grew approximately 250 percent. There were more phishing attacks during that three-month span than any other since 2004.
Phishing scams are increasingly difficult to detect. Using information freely available on the internet about you or your organization, cyber criminals carefully craft a message that contains real information that you are inclined to trust. It can come to you in many ways including emails, SMS messages, phone calls, or impersonating websites. Often, there is a sense of urgency that’s paired with a message that makes you react with your emotions instead of thinking. So, how do you protect yourself and your organization from phishing scams?
Join LookingGlass cyber security experts James Carnall and Greg Ogorek as they explore the world of phishing scams and phishing protection solutions. To set the context, the diverse types of phishing scams will be outlined along with very realistic examples that make these lures come to life. Next, we will investigate the growing risks by highlighting the changing cyber threat landscape specifically attributed to phishing. We will wrap up by discussing a wide range of phishing protection solutions.
Join us to learn about recent analyst research and real-world use cases to help you better Operationalize Threat Intelligence.
Jon Oltsik, Senior Principal Analyst at Enterprise Strategy Group (ESG), will set the stage with research results on the state of the threat intelligence market.
Jon and A.J. Shipley, VP of Products at LookingGlass Cyber Solutions, will then dive into a lively discussion on the role of threat intelligence in incident response, securing the perimeter, supply chain management, and compromised credentials.
Key use cases will include closing the gap in DNS, leveraging APIs for SIEM, addressing protocol-specific infrastructures, and much more.
Sign up today to ensure you receive all the valuable insights, strategies, best practices and key use cases on operationalizing threat intelligence to help improve your organization’s cybersecurity posture and lower risk.
No matter the size, location, or type of business you have, cyber criminals are constantly looking for security gaps to exploit for the criminal’s gain. In recent years this problem has only gotten worse and it has been found to be harder to protect our information online. While investments in security increase, the paradox is that breaches continue to increase too – which affects everyone – the company, their partners, and their customers. So, it is extremely important to stay ahead of threats. LookingGlass Cyber Solutions, has become a leader in this industry, and is helping both companies and governments do just that with “threat intelligence.”
“Just like business intelligence help organizations really optimize their business processes, threat intelligence can provide the same value to how an organization manages risk from the perspective of brand reputation and overall security operations. LookingGlass helps security teams keep their organizations safe by really allowing them to have the visibility that threat intelligence provides and not just the visibility but being able to make that operational in their processes whether that be the traditional IP security, operations set, or into other buying centers such as physical security and brand and reputation. The LookingGlass solution approach to the market is different from a lot of our competitors because we have really assembled a comprehensive portfolio that allows us to address the customer based on their maturity, so we can address customers all the way down to small novelty manufacturers up to large scale governments.” – Chris Coleman, CEO LookingGlass Cyber Solutions
Learn how DNS firewalls enable better network protection from 1) malware, 2) spear phishing, 3) DDoS attacks, and 4) data exfiltration. Also learn how by leveraging threat intelligence, DNS firewalls can 5) mitigate threats in an even more automated, informed way.
For example, you’ll learn that to protect from malware and data exfiltration, a DNS firewall is used to stop communication between malicious software or infected host and the malware command and control (C2) server. Without an outside connection or instructions, the malware is stopped in its tracks and ready for clean up. Or, that by adding a DNS firewall to your existing infrastructure, you can close the dangerous gap when NGFWs allow the TCP handshake to complete prior to enforcing policy. If you find these examples compelling, join us. You’ll never look at network security in the same way again.
Eric Olson, VP of Product Strategy & James Carnall, VP of Cyber Security Center
Defense in depth is another one of those often-used, but rarely-defined, terms in Information Security circles. Sure, it means a layered defense, that’s obvious. But what makes up the layers? How do they interact for better security? And what does a best-practice implementation look like today vs. even a few years ago?
Eric Olson, VP Product Strategy & James Carnall, VP Cyber Security Center
"Intelligence-led security" is a hot topic, but what, exactly, does it mean? In this webinar, we'll define the term and provide real-life examples of what an intelligence-led security plan looks like, and how you can implement a program for your organization utilizing internal and external data.
Eric Olson, VP of Product Strategy, Cyveillance + Haig Colter, Director of Partnerships, Centripetal
Join Cyveillance and Centripetal Networks as we explore the challenges in closing the breach detection gap, managing large dynamic sets of threat intelligence, and how to operationalize threat intelligence in a perimeter defense strategy. Additionally, we will demonstrate how leveraging threat intelligence in the security stack is providing large enterprises with real-time active network defense.
In this webinar we will examine what information security and threat analysts can expect in 2015. Topics will include using threat intelligence before and after data breaches, information sharing, the Internet of Things, and the role of the CISO.
In an era of advanced threats, awareness is the utmost security measure. Awareness of potential or imminent threats can enable improved preparation, and improved preparation can lead to more effective mitigation and prevention tactics. Fortunately, many outside threats, actors and methods can be detected and studied in advance through Internet monitoring and intelligence analytics. In this webinar, we’ll discuss how can security professionals make a practical case for threat intelligence.
Many security professionals find it challenging to keep up with vast amounts of data from multiple sources without hiring additional analysts to analyze it and find what’s most important. We’ll be discussing this topic in our next webcast, as we present a case study of how Open Source Intelligence (OSINT) can help you better protect your organization, and how you can turn data into threat intelligence faster.
Protecting your business — including its information and intellectual property, physical infrastructure, employees, and reputation — has become increasingly difficult. Among thought leaders and advanced organizations, the consensus is now clear. To adequately protect company assets and ensure business continuity, organizations must be more proactive and make effective use of threat intelligence. But on a practical level, how can you do this?
We’ll discuss practical considerations evaluating what to build and what to buy, how to define and manage the scope and mission of the Threat Intelligence program, and operate it for effect and business impact – regardless of your company size or budget.
What you’ll learn:
•How the business objectives define the scope and mission of the program
•Developing metrics that support the mission and communicate value
•How to build a spend plan and articulate budget needs
•Build, Buy and Hybrid implementation models
•Why skilled cyber analysts are a critical component of any program, and what skills they will need
LookingGlass Cyber Solutions delivers comprehensive threat intelligence driven security through a scalable solution portfolio of machine readable threat intelligence (MRTI), threat intelligence management with 140+ data sources transformed into global Internet and threat intelligence, threat intelligence services, and network threat mitigation.
By addressing risks across structured Indicators of
Compromise (IoCs), unstructured
and open source data (OSINT), internal network telemetry, and network threat mitigation, customers gain unprecedented understanding into threats that may impact their business including cyber, physical assets, and third party partners.
Prioritized, relevant and timely insights enable customers to operationalize threat intelligence in an effective and efficient way throughout the threat lifecycle.