How Are You Managing Cyber Risk From Your Third-Party Relationships?
Outsourcing and strategic partnerships have become a staple in today's business climate, enabling organizations to drive business value and stay ahead of the competition. However, moving company information outside of its own defense perimeter opens an organization up to a myriad of cybersecurity vulnerabilities. Organizations need to have the tools and resources to determine the risk from 3rd party relationships and manage that risk in a timely and consistent manner.
In this webinar, Senior Sales Engineer Ryan Curran will help you learn how to:
~ Identify and monitor threats targeting your extended ecosystem
~ Use a threat intelligence platform for third-party risk management workflows
~ Leverage Threat Indicator Confidence Scoring and pre-packaged threat intelligence to start monitoring 3rd parties within minutes
RecordedMar 30 201742 mins
Your place is confirmed, we'll send you email reminders
Neera Desai, Threat Researcher, LookingGlass Analytics & Research Operations
We face unprecedented times as security teams race to enable the rapid digital transformation efforts of organizations while also protecting them from the creative advances of threat actors.
LookingGlass researchers are seeing a dynamic start to 2020 as they monitor major global events, the dark web, changes in cybercrime tactics, and nefarious threat actor behavior. In this webinar, Neera Desai, LookingGlass Threat Researcher, will share her analysis of the key activities that LookingGlass has been tracking and included in our Quarterly Threat Landscape Review.
Find out what you need to know to protect your organization against a changing threat landscape, including:
· Advances in social engineering techniques
· Pivots in threat actor behavior to capitalize on COVID-19
· An early look at emerging and advancing threats for the rest of 2020
· Key recommendations to keep your organization safe
Allan Thomson, LookingGlass, CTO; Chris Dahlheimer, LookingGlass, Aeonik Product Owner, Sahir Hidayatullah, Smokescreen, CEO
LookingGlass Cyber and Smokescreen invite security teams who have already invested in deception technology to improve its effectiveness in deceiving and deterring adversaries, and use it to support other security processes in your organization.
Allan Thomson and Chris Dahlheimer, LookingGlass Chief Technology Officer and Aeonik Product Owner, and Sahir Hidayatullah, Smokescreen CEO, will team up to discuss the underpinnings of our integrated deception technology and how the following advantages can enhance your existing solution:
· An invisible MAC/IP layer that allows you to proactively target and lure adversaries into deception decoys
· Forensic intelligence on your adversaries to better understand their motivations and plan more effective defense strategies
· Targeted mitigation options that enable you to delay or avert adversary attacks, and refine your response based on their behaviors
The team will provide multiple, live demonstrations so you see how these technologies can improve your existing security threat detection and mitigation activities.
Allan Thomson, LookingGlass, CTO; Chris Dahlheimer, LookingGlass, Aeonik Product Owner; Sahir Hidayatullah, Smokescreen, CEO
LookingGlass Cyber and Smokescreen invite security practitioners who are currently not using deception-based threat defenses to discover how it can reduce operational complexity. Through targeted luring, invisible decoy routing, and behavior-based threat mitigation, you will bring greater visibility and intelligence into your security operations.
Allan Thomson and Chris Dahlheimer, LookingGlass Chief Technology Officer and Aeonik Product Owner, and Sahir Hidayatullah, Smokescreen CEO, will team up to take you under the hood of our integrated deception technology and discuss the following advantages:
Forensic intelligence on your adversaries to better understand their motivations and plan more effective defense strategies
An invisible MAC/IP layer that allows you to proactively target and lure adversaries into deception decoys
Targeted mitigation options that enable you to delay or avert adversary attacks, and refine your response based on their behaviors
The team will provide multiple, live demonstrations so you see how these technologies work together to enhance your day-to-day security threat detection and mitigation activities.
Olga Polishchuk, Senior Director Threat Analysis and Investigations
The COVID-19 pandemic has suddenly and dramatically changed the way we live and work. As Internet dependency surges, gaps in security and cyber safety protocols have opened the door to increased malicious exploitation from actors and groups looking to take advantage of new security vulnerabilities.
Financial organizations are seeing a drastic spike in online transactions during this new normal of working, banking, and shopping from home. With a huge surge in online payments and massive increases in the volume of financial transactions, the potential for fraud, BEC, skimming or other threats is more severe than ever.
In our upcoming webinar on May 13, LookingGlass’ Senior Director of Threat Analysis and Investigations, Olga Polishchuk, will discuss:
•COVID-19 exploitation schemes and campaigns we’ve observed
•Emerging and ongoing trends that could impact financial organizations
•How to remain cyber resilient in light of the crisis
Olga Polishchuk, Senior Director of Threat Analysis and Investigations
The COVID-19 pandemic has suddenly and dramatically changed the way we live and work. As Internet dependency surges, gaps in security and cyber safety protocols have opened the door to increased malicious exploitation from actors and groups looking to take advantage of new security vulnerabilities.
Healthcare organizations are on the frontline of COVID-19 pandemic. With a huge surge in demand, massive increases in the volume of communications, the potential for fraud, BEC, or other threats is more severe than ever.
In our upcoming webinar on April 29, LookingGlass’ Senior Director of Threat Analysis and Investigations, Olga Polishchuk, will discuss:
•COVID-19 exploitation schemes and campaigns we’ve observed
•Emerging and ongoing trends that could impact healthcare organizations
•How to remain cyber resilient in light of the crisis
Your organization has become a vast ecosystem of suppliers, investors, partners, and business interests, all of which make up your global attack surface. Each of these entities presents a unique set of cyber risks and weaknesses. Managing these risks can be a full-time endeavor, no matter the size of your organization. What tools are in your arsenal to defend against these risks? In this webinar, Dan Martin, Product Manager, and Neera Desai, Threat Researcher, will demonstrate how you can maintain situational awareness across your attack surface. You will learn how to:
•Continuously assess and manage cyber risk
•Prioritize risks that are most relevant to your organization
•Maintain a broad view of potential risk impact
Register now to save your spot for this webinar on March 18, 2020 at 1pm ET. Attendees will be eligible to receive one hour of CPE credit towards their professional certificate.
Tom Creedon, @n300trg, Senior Managing Director, APAC
Cyber influence campaigns have plagued countries across the globe in the past few years, with foreign policy objectives, economic goals, and public opinion caught in the crossfire. LookingGlass is currently tracking over 2000 People's Republic of China-related influence operators to better understand the current landscape. In this webinar, Tom will speak about the overall nature of influence operations associated with the People’s Republic of China, with a specific focus on their recent Twitter campaigns. During this webinar, you will gain an understanding of operator account patterns, targets, and modus operandi. Join LookingGlass on February 6 at 1pm ET for our webinar, Project Tweetbox: Investigating China’s Cyber Influence Operations
Attendees will be eligible for one hour of CPE credit.
Neera Desai, Threat Researcher & Marc Larson, Senior Intelligence Analyst
Each year, the cybersecurity industry is bombarded with threats to be concerned about. In the beginning of 2019, we heard about threats like artificial intelligence, machine learning, and ransomware attacks that would plague cyber professionals all year long. As we move into the new year, we want to look back at the trends that stood out to LookingGlass researchers, how they were different than the threats of years past, and which type of threats we can expect to see in 2020. Join LookingGlass’ Neera Desai, Threat Researcher, and Marc Larson, Senior Intelligence Analyst, at 2 pm on January 16th for our next webinar.
Attendees will be eligible for one hour of CPE credit.
James Carnall, Vice President of Customer Support Group, and Eric Olson, Vice President of Product Management
The modern workplace is infiltrated everyday -- bring your own device policies and increased vendor access have introduced a whole new layer of cyber risk to the office environment, whether it’s from malicious insider threat, or accidentally bringing an infected device into the corporate environment. As vendor and third party service provider lists grow longer, so too does the list of related breaches. Since no vendor or customer should be automatically trusted, Zero-Trust frameworks have become more prevalent. How can organizations best protect themselves and their borderless networks? Join LookingGlass’ VP of Product, Eric Olson, and VP of Customer Support Group, James Carnall for a webinar discussing Zero-Trust best practices and war stories at 1 pm ET October 31, 2019.
Attendees are eligible for one hour of CPE Credit.
Chris Dahlheimer, Product Owner, LookingGlass Cyber Solutions & Paul Roberts, Editor in Chief, The Security Ledger
Today, it is not enough to protect your assets by collecting high quality threat intelligence – organizations need inline detection and mitigation at line-speed to fully protect themselves from incoming or existing threats on the network. As cybersecurity strategy shifts towards a “Zero Trust” model, your organization needs to ensure that every device, user, workload, or system is being monitored, both within and without your network perimeter. Implementing this model with existing point solutions without creating security gaps is difficult – which is where the Cybersecurity Fabric comes in. With a Cybersecurity Fabric draped over your existing network architecture, each disparate piece of the security stack can now alert the others to defend and protect your organization.
Join LookingGlass Product Owner, Chris Dahlheimer, with Paul Roberts of Security Ledger as they discuss how weaving a strong Cybersecurity Fabric protects your organization by integrating the network protection your organization has already invested in.
LookingGlass’ Vice President of Customer Support, James Carnall, and CyberEdge’s Co-founder & CEO, Steve Piper
As we move toward the halfway point in the year, it might be a good time to evaluate the effectiveness of your organization’s security posture. According to CyberEdge’s 2019 Cyberthreat Defense Report, 78% of enterprises were victimized by a successful cyberattack last year. Is your organization next?
CyberEdge surveyed 1,200 IT security professionals from 17 countries and 19 industries and learned:
-56% of organizations were compromised by ransomware
-45% of ransomware victims paid the ransom
-13% of a typical IT budget is spent on security
-84% of organizations are experiencing an IT security skills shortage
-Malware, ransomware, and spear-phishing cause the most headaches
Join LookingGlass’ SVP of Delivery & Support, James Carnall, and CyberEdge’s Co-founder & CEO, Steve Piper, as they review insights from CyberEdge’s sixth-annual research study. They’ll also provide answers to important questions, such as:
-What are the weakest links in current security postures?
-What’s standing in the way of IT security professionals?
-What are the hottest security technologies for 2019?
All webinar registrants will receive a complimentary copy of CyberEdge’s 2019 Cyberthreat Defense Report. Register now!
Brandon Dobrec, LookingGlass Cyber Solutions and Paul Roberts, Security Ledger
Vendors, suppliers, and independent subsidiaries are gaining more and more access to your network and sensitive data because today’s business models include outsourcing of non-mission critical programs and tasks, which brings a whole new world of risk to your organization. These not so new cyber risks make traditional perimeter defense no longer enough. Companies need continuous visibility and monitoring of their external partners threat landscapes. Use a cyber situational awareness platform that provides you with a map of your cyber risks you can identify vulnerabilities before the adversary does.
In this webinar, LookingGlass Product Manager, Brandon Dobrec and Security Ledger Editor-in-Chief, Paul Roberts will discuss what you need to assess vendors in the modern cyber environment, providing you with the right map to assess your external risk.
This webinar will answer:
- Why point-in-time scorecards are a necessary component of third party risk management, but are woefully inadequate for proactively defending against future attacks
- How a cyber situational platform delivers an outside-in view of your network, allowing you to see gaps in your network
- Tools, capabilities, features, and functionalities are needed to assess vendor risk – continuous monitoring, alerting, reporting, and dynamic collection & scoring, among others
- Common attack vectors, why these vectors remain open, and what attack vectors are emerging regularly
Cyber threats are becoming more frequent and more targeted. Bad actors are more adept at social engineering and investigating your network and infrastructure to understand your organization’s cyber strengths and weaknesses. Security teams need to focus on who or what will seek to exploit them and how they are likely to do so, instead of being hyper-focused on just the threat itself.
This webinar delves into how one of the world's top financial services firms developed and implemented a robust threat model capable of repelling the world's most sophisticated hackers and nation-state actors. Join LookingGlass Product Manager, Dan Martin, and Security Ledger Editor-in-Chief, Paul Roberts for an introduction to ScoutThreat™, a threat management platform that helps security analysts streamline threat analysis work and extract the maximum value from threat intelligence.
In this webinar you will learn:
- Advantages of modeling adversaries to get ahead of threats to your IT environment
- Structuring threat models to account for a myriad of sophisticated cyber risks
- How to overcome hurdles in creating robust threat models that address real-world risks
- How ScoutThreat can help you build a proactive security posture
LookingGlass Senior Vice President of Product, Eric Olson, and Vice President of Customer Support, James Carnall
It’s 2018 and threat actors continue to leverage the same tactics – phishing, ransomware, botnets, etc. – against their targets. They’ve using the same techniques for years, yet it’s still working. Do we sound like a broken record yet?
With October being National Cyber Security Awareness Month, it’s an ideal time to re-evaluate the cyber threat landscape and your cybersecurity hygiene. Topics like fake news, privacy, and the Internet of Things are “hot” topics in mainstream culture, and you need to know their impacts on your organization.
Join LookingGlass’ Senior Vice President of Product, Eric Olson, and Vice President of Customer Support, James Carnall, in a lively discussion about the hottest cybersecurity topics and what your organization can do to protect itself against them. Wednesday, October 24 @ 2PM ET.
This webinar will also cover:
· Business Email Compromise (BEC)
· Single Sign-On and Password Managers
· Information Warfare
· Third Party Risk
Matt Bromiley SANS Instructor and Allan Thomson, LookingGlass Cyber Solutions CTO
It’s 2018 – why are we still manually blocking firewall ports, manually ingesting threat feeds, and manually implementing blocks from well-known, trusted sources? Automation and integration allows security professionals to keep up with the pace of today’s threat landscape. The two go hand in hand but are they right for every organization?
This webcast explores the pros and cons of automation and integration, focusing on what an organization needs to consider before implementing such an approach. Most important, the webcast and associated white paper will help answer these key questions:
What would it take to manually do what automation does?
How can I protect my assets?
How do I get actionable threat intelligence?
IDC Research Director Chris Kissel and LookingGlass Product Manager Brandon Dobrec
Traditional cybersecurity leads with a “block & tackle” strategy. But as threats become more complex, targeted, and sophisticated, security operations centers (SOC) require a better understanding of how threats beyond the perimeter interact with their network. Join IDC special guest, Research Director Chris Kissel and LookingGlass Product Manager Brandon Dobrec in a discussion on modern-day SOC needs for a threat platform that marries automated intelligence tradecraft with the human element.
Michael Suby, VP of Research at Frost & Sullivan, and James Carnall, VP of Customer Support Group at LookingGlass
In the highly dynamic online landscape of misinformation, fake news, gossip, and the trading of absconded data, organizations must expand their cybersecurity arsenals in protecting their brands, personnel, facilities, and sensitive information. They must take into account what exists outside the perimeter in the greater cyber ecosystem: the surface, dark, and deep web. Locating and assessing these threats, however, is a challenge for even experienced threat hunters. The tools and techniques are non-standard. You should ask yourself, “Is my security team ready to tackle what lies beyond the perimeter?” If not, let us shed light on this topic. Register for LookingGlass' "Threats Beyond the Perimeter" webinar on Tuesday, July 17 @ 2 pm ET to hear Michael Suby, VP of Research at Frost & Sullivan and James Carnall, VP of Customer Support Group at LookingGlass discuss how these scenarios may affect your brand, employees, and facilities.
Paul Roberts, Security Ledger & Brandon Dobrec, LookingGlass Cyber Solutions, & special guest Chris Roberts
Cyber threat intelligence – when properly gathered, refined, and applied – can help organizations identify business risks and target both protections and mitigations. But what distinguishes high-quality and actionable threat intelligence from low-quality security "noise"? How are cutting edge CISOs and IT security teams applying threat intelligence to respond to incidents and slam shut windows of compromise?
Find out in this webinar moderated by Paul Roberts, the Editor in Chief at The Security Ledger. Paul will be joined by LookingGlass’ Brandon Dobrec, and counter threat intelligence & vulnerability research expert Chris Roberts. Together they will review the value of threat intelligence to organizations, discuss how cutting edge firms are using threat intelligence to their advantage, and review how to orchestrate threat intelligence to automate mitigation and combat third party risk.
Olga Polishchuk, LookingGlass Sr. Director of Investigation, and Rob DuBois, Founder of Impact Actual
Hundreds of thousands of fans and their personal devices. Increased political tension. International boycotts. What is at stake at the 2018 FIFA World Cup? This webinar will examine the cyber and physical risks surrounding this year’s upcoming World Cup in Russia including the likelihood of a large-scale cyber attack and a simulation of how a possible attack might play out – how it could be launched and the steps to taken to ameliorate the effects.
Join LookingGlass’ Sr. Director of Investigation, Olga Polishchuk, and special guest speaker Rob DuBois of Impact Actual on Wednesday, June 6 @ 9am ET/ 2pm GMT as they explore elevated threats that may play out during one of the world’s largest and most treasured sporting events. Register now!
Vice President of Customer Support James Carnall and Vice President of Intelligence Operations Eric Olson
Phishing, ransomware, and data breaches plague organizations of all sizes and industries, but the financial services market has always had the largest target on its back. As a mid-market financial organization, how do you fend off these attacks when you don’t have the budget for everything you need: data feeds, tools, analysis and mitigation?
The answer: “Threat Intelligence-as-a-service.” This, robust, cost-effective option, brings together dozens of structured threat intelligence feeds, online monitoring of social media and the dark web, and round-the-clock human review to give you vetted, relevant intelligence specific to your organization. Even better, there is no hardware or software to install, this is a completely managed service that can be up and running in hours or days. It finally puts “big bank” threat intelligence capabilities within the reach of smaller organizations.
Join LookingGlass’ Vice President of Customer Support James Carnall and Vice President of Intelligence Operations Eric Olson on Wednesday, March 21 @ 2pm ET as they discuss how threat intelligence can be affordable for mid-market organizations with LookingGlass’ Information Security-as-a-Service package, a new offering tailor made for your organization’s cybersecurity needs.
LookingGlass Cyber Solutions delivers comprehensive threat intelligence driven security through a scalable solution portfolio of machine readable threat intelligence (MRTI), threat intelligence management with 140+ data sources transformed into global Internet and threat intelligence, threat intelligence services, and network threat mitigation.
By addressing risks across structured Indicators of
Compromise (IoCs), unstructured
and open source data (OSINT), internal network telemetry, and network threat mitigation, customers gain unprecedented understanding into threats that may impact their business including cyber, physical assets, and third party partners.
Prioritized, relevant and timely insights enable customers to operationalize threat intelligence in an effective and efficient way throughout the threat lifecycle.
How Are You Managing Cyber Risk From Your Third-Party Relationships?Ryan Curran, Senior Sales Engineer[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]42 mins