Hackers, Threats and Cyber Defense

We’ve all seen the bake-offs - vendor against vendor, the ‘latest’ malware samples run raw and then packed, and who apparently wins the race against hackers. But there is one major flaw in these tests - they’re only covering a fraction of attacks that occur in the wild. What about exploits? What about script-based attacks, including powershell and VMI? What about attacks that leave no file indicators - how does your security stop them? Join SentinelOne’s Eran Ashkenazi, VP of Field Services and Support, as he discusses the full spectrum of attacks that are currently out in the wild and what you can do to protect against them. What you’ll learn: - The types of attacks, or attack vectors, you should include in your evaluation testing - Real-world attacks that utilize methods that leave no file-based indicators - How SentinelOne’s next generation endpoint protection protects against a file-less attack in a live demo

March 14, 2017

 

Related Webinars

February 21, 2018 5:17am EST

We’re often effective at handling replicable, deliberate security situations, but time and time again, human error has been the number…

March 16, 2017 5:00pm EDT

Join Daniel Smallwood, Sr. Security Engineer at Jask.IO for an interactive session on the key threat detection techniques on Hadoop….

March 16, 2017 3:00pm EDT

What is it like to find out you’re on the trail of an advanced cyber criminal? What are the tools…