Events

UBM TECH EVENTS

Black Hat USA
August 2-7, 2014 | Las Vegas, NV
Black Hat USA is the show that sets the benchmark for all other security conferences. As Black Hat returns for its 17th year to Las Vegas, we bring together the brightest in the world for six days of learning, networking, and skill building. Join us for four intense days of Trainings and two jam-packed days of Briefings.

Register Now!

 
 

Black Hat Europe
October 14-17, 2014 | Amsterdam, NL
The premier conference on information security returns to the beautiful city of Amsterdam, Netherlands in October, 2014. Professionals from all over the world gather for two days of intense Trainings and two thought-provoking days of Briefings brought to you by some of the brightest minds in the industry.

Register Now!

 
 

Interop
New York: September 29-October 3, 2014
Interop is the leading independent technology conference and expo series designed to inform and inspire the IT community. Through in-depth educational programs, workshops, real-world demonstrations and live technology implementations in its unique InteropNet program, Interop provides the forum for the most powerful innovations and solutions the industry has to offer. Interop Las Vegas is the flagship event held each spring, with Interop New York held each fall and annual international events in London, Mumbai and Tokyo, all produced by UBM Tech.
Register Now!

 
 

WEBINARS

Data Privacy: 2014 Forrester Survey Results
A Dark Reading Webinar
Sponsor: IBM

The value of information is rising rapidly. This holds true for both the enterprises uncovering new insights, and those seeking to steal, manipulate or otherwise misuse sensitive data for personal gain. Forrester has recently completed a Data Security & Privacy study to determine how business leaders are responding to the threat of sensitive data exposure. In this new era of increased regulation, frequent data breaches and new technology platforms (including cloud, big data, mobile and others) are we doing enough to protect our most valuable asset?

Attend this webinar to learn:

  • Learn about the latest findings from Forrester’s Data Security Survey
  • Hear about newest technologies designed to ensure sensitive data protection
  • Gain insight into the privacy and security perspectives of peers around the world
  • Leave with actionable steps to protect your organization’s most valuable asset
Register for this webinar to learn about Forrester's survey findings on data security and privacy.

Wednesday, September 17, 2014 -- 9:00 AM PT / 12:00 PM ET -- 60 minutes
Register Now!

 

Multi-Variant Phishing and the New Reality of Mail-Based Threats
A Dark Reading Webinar
Many organizations have recognized the threat posed by phishing and have deployed a combination of technology and training to combat what remains the number one threat vector for most organizations. The recent increase in instances of "multi-variant" phishing are now challenging many of these defenses by leveraging a complex, service-based delivery infrastructure to deliver a variety of payloads to victim computers.

Attend this webinar to learn:

  • Understand the phishing tools & techniques used by hackers
  • Protect your users, data and organization
  • Get examples of multi-variant phishing campaigns
Register for this webinar to learn more about multi-variant phishing and how to protect your company.

Wednesday, September 16, 2014 -- 10:00 AM PT / 1:00 PM ET -- 60 minutes
Register Now!

 

Protecting Your Data from Third-Party Vulnerabilities
A Dark Reading Webinar
Sponsor: IBM

Recent major security breaches, including a compromise at the Target retail chain, have demonstrated the potential for cyber attackers to reach their targets through business partners and contractors. In this webcast, experts discuss methods for auditing supplier connections to expose potential vulnerabilities before they are exploited.

Attend this webinar to learn:

  • Discuss the various ways that an enterprise might be compromised through partner connections.
  • Highlight recent attacks and exploits that occur through third-party systems and applications.
  • Offer recommendations on how to check/audit third-party systems and applications to expose potential vulnerabilities.
  • Provide tips on how to partner with third parties to ensure better security across the supply chain.
  • Outline methods for working with partners on incident response in the event that a breach does occur.
  • Cyber attackers are increasingly seeing opportunities for exploiting weaknesses in the 'soft spots' of the supply chain. This webcast will help you find ways to defend your enterprise.


Wednesday, September 15, 2014 -- 11:00 AM PT / 2:00 PM ET -- 60 minutes
Register Now!

 

From Zero-Day Attacks to exploit kits: How to Contain Advanced Threats
A Dark Reading Webinar
Security technology is increasingly sophisticated and continues to evolve quickly – so why do attacks still succeed with such alarming frequency? The threat landscape is quickly evolving. Today’s network-based advanced threats are more diverse, more numerous, more refined, more targeted, and more persistent than ever before.

Attend this webinar to learn how to:

 - Understand the nature of advanced threats and why they are difficult to contain with today’s signature-based tools
 - Understand how to maximize the value of the security systems and solutions they already have in place at the web gateway
 - Step through the various methods of attack ranging from basic data theft, Zero-Day attacks, advanced malware, exploit kits and more

Register for this webinar to learn the key questions you must address to strengthen your defenses against advanced attacks.

Wednesday, September 03, 2014 -- 10:00 AM PT/ 1:00 PM ET -- 60 minutes
Register Now!

 

Stop Malware in its Tracks with Crowd-Sourced Threat Intelligence
A Dark Reading Webinar
Threat sharing networks have been around for a long time; however they have typically been "invitation-only", available to only large companies, or those within a particular industry. AlienVault OTX is different. It is one of the first (and most diverse) threat sharing networks, open to everyone.

Attend this webinar to learn:

  • How threat intelligence is gathered and vetted in the Open Threat Exchange
  • How to use the threat data provided by OTX free services
  • Examples of the types of threats you can identify with OTX
  • Best practices to investigate and mitigate threats, including a quick tour of AlienVault USM
Register for this webinar to join AlienVault VP of Product Strategy, Russ Spitler, and Systems Engineer, Tom D'Aquino for a practical session covering how to use crowd-sourced threat intelligence to improve network security.

Thursday August 12 -- 10:00 AM PT / 1:00 PM PM ET -- 60 minutes
Register Now!

 

Game Over for Gameover Zeus: Disrupting a Global Cybercriminal Operation
A Dark Reading Webinar
On June 2, 2014, Operation Tovar was announced, a multi-national initiative to disrupt the Gameover Zeus botnet and seize infrastructure supporting Cryptolocker ransomware. This initiative was, in part aided by security experts from the Dell SecureWorks Counter Threat Unit (CTU). Gameover Zeus and Cryptolocker were part of a larger cybercriminal ecosystem representative of threats faced by many organizations today.

During this interactive webcast, Ben Feinstein, Director of CTU Operations and Development, will discuss details of the adversary’s operations and tradecraft behind Gameover Zeus and Operation Tovar. Ben will also share clear guidance on how to defend against similar threats in the future. As a result, security professionals can draw lessons on how to better defend against and respond to this broader class of threats. The webcast will answer key questions such as:

  • How did the Gameover Zeus botnet operate and deliver its malware payloads to thousands of systems worldwide?
  • How was the Gameover Zeus threat group monetizing their botnet?
  • What was Operation Tovar and how did it work?
  • Why do these threats matter to your organization?
  • What concrete actions should your organization be taking to address this class of threats?
Thursday July 31 -- 11:00 AM PT / 2:00 PM PM ET -- 60 minutes
Register Now!

 

Keep your data safe with Dell Endpoint Encryption
A Dark Reading Webinar
Overcome encryption challenges of the past, with Dell Data Protection | Encryption. From easy deployment to a single management console, learn about the most comprehensive data protection platform to help protect data across your organization.

Attend this webinar to learn how to:

  • How to securely manage your endpoints from a single console while simultaneously providing self-service features for your end-users
  • Best practices for protecting data on PCs, Macs, tablets, external media, phones and the cloud
  • How to easily manage the encryption you already have
  • Plus, how to efficiently audit, report and meet compliance
Register from this webinar to learn from a thought leading security professional with well over 12 years’ experience in network and endpoint security.

Thursday July 24 -- 11:00 AM PT / 2:00 PM PM ET -- 60 minutes
Register Now!

 

Zero-Day Attacks: Are You Really Ready?
A Dark Reading Webinar
The HeartBleed bug and then the IE vulnerability brought many companies to their knees. Were you impacted? While you are still working to defend your infrastructure from these two critical threats, the cybercriminal community is working just as hard trying to exploit the weaknesses of your network. So how well are you prepared for the next zero-day attack?

Attend this webinar to learn how to:

  • Get up to speed on the current threat landscape
  • Discover ways to take advantage of modern-day network security tools and services for ongoing protection against new threats
  • Understand why it truly counts to have a nimble threat research and response team working for you
  • Truly make a big difference to have multiple layers of threat protection to bolster your security posture
Register for this webinar to understand the building blocks of developing a resilient security defense system to help you effectively combat evolving threats as they emerge.

Wednesday July 16 -- 11:00 AM PT / 2:00 PM PM ET -- 60 minutes
Register Now!

 

5 Identity and Access Management Myths Debunked
A Dark Reading Webinar
We’ve all heard the excuses:

  • “Identity and Access Management (IAM) is too hard and too complex”
  • “IAM is too expensive for me”
  • “It takes too long to achieve success with IAM”
  • “I trust my users, so I don’t need IAM”
  • “IAM doesn’t make me more secure”
We’ve all probably even used one or two of them at times. But whether you believe IAM is just too much for your organization or if you have been “once bitten, twice shy” with a “traditional” IAM solution, the need for identity and access management as a critical component of your security plan will not go away.

Attend this webinar to join Marc Potter, the IAM expert from Dell Software, as we bust the top five IAM myths. Each myth will be explored in detail and debunked using actual stories from real-life organizations – just like yours. As a bonus, every web seminar attendee will be sent a copy of Dell Software’s newest book, “IAM for the Real World”. Register today, spaces are limited!

Wednesday July 9 -- 11:00 AM PT / 2:00 PM PM ET -- 60 minutes
Register Now!

 

Stop Letting Security Threats Stop You from Advancing Your Business
A Dark Reading Webinar
We all have to protect our environments and ensure internal and external compliance requirements are met. But, how well-equipped are you to transform your security role to one of not just protection and assurance, but of business enablement?

Attend this webinar to learn how to:

  • Eliminate silos of security information in your organization
  • Connect security across your data, infrastructure and applications
  • Protect your data and systems by enabling users to get the right access at the right time
Register for this webinar to learn more about connected security, including network security, identity and access management and data encryption, while also gaining ways to look past the scare tactics, fear, uncertainty and doubt, and focus on the business first.

Tuesday July 01 -- 11:00 AM PT / 2:00 PM PM ET -- 60 minutes
Register Now!

 

How to Protect Your Company from Ever-Changing Mobile Threats
Sponsor: Lacoon
With the mobile threat landscape evolving with new malware, phishing and advanced threats, enterprises need be more proactive at protecting both their enterprise and their end users. How should you augment your current Mobile Device Management (MDM) environment to provide the mobile security and risk management you need?

Attend this webinar to learn how to:

  • Detect and prevent advanced and malicious mobile threats from exploiting corporate data and applications
  • Implement advanced mobile security that preserves end user experience and privacy
  • Gain visibility into malicious mobile threats for use in broader security and risk management strategy
  • Turn your MDM into dynamic risk based management
Register for this webinar to hear from our panel of security experts from Forrester Research, Intel, and Lacoon Mobile Security to gain practical insight on the steps and tools you need to protect your enterprise from the evolving mobile threat landscape.

Thursday, June 17 -- 8:00 AM PT / 11:00 AM ET -- 60 minutes
Register Now!

 

Why Simple Security is Better Security
Sponsor: Sophos
Small and mid-sized businesses (SMBs) were the victims in 40% of all data breaches last year, yet security vendors seem to ignore the needs of these businesses when designing their products. Hackers are taking note and actively targeting this big market.

Attend this webinar to learn:

  • Why enterprise-class security offerings are a bad bet for smaller businesses
  • Tips on evaluating and selecting the right security solution
  • The benefits of cloud-managed security
Register for this webinar to join IANS Faculty Member Kevin Johnson and Marty Ward, VP Product Marketing & Corporate Communications at Sophos as they break down the one-size-fits-all approach to enterprise-class security and offer solutions to help simplify your security.

Thursday, June 12 -- 11:00 AM PT / 2:00 PM ET -- 60 minutes
Register Now!

 

How to Detect SQL Injection & XSS Attacks
A Dark Reading Webinar
Two of the oldest and most common attacks used against web applications -- SQL injection attacks and cross-site scripting attacks (XSS) -- continue to impact thousands of websites and millions of users each year. Finding these exposures quickly is essential in order to prevent system compromise and avoid information leakage. SIEM solutions can be invaluable in this effort by collecting and correlating the data you need to identify patterns that signal an attack.

Watch this webinar on-demand to learn:

  • What data you need to collect to identify the warning signs of an attack
  • How to use event correlation to detect cross-site scripting (XSS) and SQL Injection attacks
  • How to identify impacted assets so you can quickly limit the damage
View this webinar now to gain a clear picture of how to use SIEM technology to prevent SQL Injection and XSS attacks.

Tuesday, June 3 -- 10:00 AM PT / 1:00 PM ET -- 60 minutes
Register Now!

 

Agile + DevOps = More Secure Applications
A Dark Reading Webinar
Sponsor: IBM
Most IT pros understand the benefits of Agile development, and how it can streamline application delivery. What many organizations don't realize, however, is that integrating DevOps with Agile can also increase the security team’s visibility into the dev process. The key is learning to take advantage of these opportunities.

Attendees at this InformationWeek webcast will learn:

  • What benefits DevOps offers the security team.
  • How, and where, to integrate security skill into the process.
  • How to make the most of DevOps. More communication and collaboration equates to more secure development and implementation.
Join Brad Causey and Wendy Schuchart for this informative webcast.

Tuesday, June 3 -- 10:00 AM PT / 1:00 PM ET -- 60 minutes
Register Now!

 

Targeted Attack Defense: Why Humans are the Worst Threat
A Dark Reading Webinar
How attackers exploit end-users have significant security implications for enterprise preparedness and defensive strategies. The vast majority of hacks and data breaches can be traced to phishing emails that were opened by employees in the targeted organization. This webinar will help IT and Information Security decision-makers understand the nature of the generation of targeted phishing attacks, the impact of end-user behavior on their effectiveness, and the limitations of end-user-focused training and awareness efforts.

Attend this webinar to:

  • Learn a data-driven perspective on end-user behavior and targeted phishing campaigns
  • Identify the highest-risk users within your organization-who is clicking and why
  • Defend your organization against sophisticated new “longlining” targeted phishing campaigns
  • Plan for an effective, long-term strategy to adapt to constantly evolving targeted attacks
Register for this webinar to learn how you can mitigate the human factor to improve your defense against targeted attacks. Once you are armed with the details of these potential attacks, you can better arm your security team on where to focus their efforts and how to mitigate the risks with immediate action.

Tuesday May 20 -- 10:00 AM PT / 1:00 PM ET -- 60 minutes
Register Now!

 

New Incident Response Model Enables Rapid Response to Advanced Attacks
A Dark Reading Webinar
Sponsor: Bit9
Many enterprises are now realizing that it is no longer a matter of if they will get breached, but rather a matter of when.

Because of this, organizations need security solutions that enable them to rapidly respond to attacks as they happen, as opposed to relying on outdated and expensive incident response services that typically come in post-breach - after data is already out the door.

Learn how to save your enterprise time and money while dramatically improving their overall security posture. Register today.

Thursday, May 8 -- 11:00 AM PT / 2:00 PM ET -- 60 minutes
Register Now!

 

X-Force Threat Intelligence: Protecting Sensitive Data
A Dark Reading Webinar
Sponsor: IBM
To effectively combat the rapid increase in attacks, organizations need attack insights from today’s security threat landscape.

Join world renowned experts from the IBM X-Force research team to hear about the latest findings in the latest X-Force Threat Intelligence Report - and discuss how the latest vulnerabilities and security breaches are impacting organizations.

Join this important webinar to:

  • Uncover which attack trends you need to be prepared to address, and explore options to protect against these threats.
  • Gain best practices for implementing an end-to-end data protection strategy including data encryption, monitoring, masking and vulnerability assessment for all data sources and repositories.
  • Learn why the number of overall incidents has increased and the number of leaked records has been steadily rising
  • Discover how more than half a billion records of personally identifiable information - including credit card numbers and passwords - were leaked in 2013
  • Discuss how the actual risks around cloud and mobile are greater than what they are perceived to be
A holistic approach to data security approach is essential for the protection of the entire ecosystem.

Register for this webinar now and find out why data attacks continue to be pervasive and how you can combat them.

Tuesday, May 6 -- 10:00 AM PT / 1:00 PM ET -- 60 minutes
Register Now!

 

Identify Targeted Attacks In Banking With Threat Intelligence
A Dark Reading Webinar
Sponsor: BAE Systems
Banks and financial institutions have begun to recognize more sophisticated exploits that not only target specific companies, but take advantage of specific vulnerabilities and target specific individuals within the organization.

This webcast offers a closerlook at these attackers, their methods, and some ways to defend against them.

Join "Analyzing Security Data and Threat Intelligence to Identify Targeted Attacks In Banking," webinar that will reveal how banks and financial institutions can:

  • differentiate targeted attacks from random hacks
  • leverage tools and best practices that protect against sophisticated attacks
  • use threat intelligence data with internal security information to ferret out targeted attacks
  • respond to targeted attacks - and how they can buildstronger defenses against them
This webcast will help you understand the methods and tools used by cyber attackers, and how you can tie your existing security tools to emerging threat intelligence capabilities to improve your cyber defense strategy.

Tuesday, April 8 -- 10:00 AM PT / 1:00 PM ET -- 60 minutes
Register Now!

 

Understanding and Prioritizing Today's Threats
A Dark Reading Webinar
Security is no one-size-fits-all endeavor. In this Webcast, you will learn from the experts how to determine and prioritize which threats apply to your enterprise and how to build in the appropriate defenses against today's constantly evolving attacks.

This webinar will provide insight and advice from renowned security experts on how to:

  • identify which new and existing threats could be used against your organization
  • prioritize these applicable threats
  • pinpoint the proper security practices and processes to protect your resources
  • find possible weak links in your infrastructure that could be abused
  • establish a strategy for triaging new threats
With the overload of information today on new threats, vulnerabilities, and attack campaigns, taking action to protect your organization can be an overwhelming and daunting task. This webinar will help you sift through the growing threat landscape in order to more efficiently and properly prepare your infrastructure for potential attacks.

Thursday, March 27, 2014 -- 10:00 AM PT / 1:00 PM ET -- 60 minutes
Register Now!

 
 

On Demand Webinars

Lessons Learned from the Top Security Breaches of 2013
A Dark Reading Webinar
Sponsor: IBM
Security breaches in industries like Retail and Financial Services hit home because, on a consumer level, the impact is personal as is the financial loss. But they also highlight the need for strong security policies and procedures regardless of industry. Anywhere valuable information is stored, there is the constant threat of attack. So what can be learned from the top security breaches of 2013? And how can you take action to better protect your business today?

Attend this webinar to learn how to:

  • Understand the threat landscape – have you tested your network for existing vulnerabilities or potential issues? How do you compare with peers and other organizations in your industry?
  • Prepare for the possibility of an attack – do you have an incident response plan in place? How mature are your processes and procedures?
  • Know when to seek help – are you aware of the growing skill gap in the cybersecurity space? Do you understand the impact Security Services can have on extending your capabilities?
Don't end up in the headlines. Don't be the next target. Watch this webinar to learn more, and take action to protect your organization today.

Tuesday, March 4, 2014 -- 60 minutes

View Archived Webinar Now

 
 

Security Intelligence Solution for System z and the Enterprise Abstract
A Dark Reading Webinar

Relying on the security of the mainframe infrastructure is no longer adequate to meet contemporary challenges.

Mainframe data is now assessable via web services, web browsers and mobile devices from anywhere in world. A more holistic approach to security that considers the entire enterprise is warranted.

According to the 2011 Verizon Data Breach Investigations Report, greater than 85% of breaches go undetected by the affected organization. Coupled with the fact that 70% of the world's production data originates from the mainframe, and then you understand why mainframe customers have a renewed concern about security.

IBM's Security Intelligence solution provides a massively scalable, real time enterprise security solution that, through the use of advanced analytics, can reduce hundreds of millions security events received daily in to a handful of meaningful events that require action

  • Recognize the changing risk landscape that now threatens mainframe application and dat
  • Recognize the new potential attack surfaces for mainframe applications and dat
  • Understand the multi-tiered architectural requirements to monitor and protect the mainframe from more sophisticated attacks
  • Appreciate the role of Security Intelligence in optimizing and simplifying enterprise security and complianc
Mainframe and enterprise security is a complex, three dimension puzzle: 1) The entire environment must be instrumented to collect security events; 2) Security event information must aggregated to understand the security profile across the enterprise; and 3) Advanced analytics must be applied to the massive amounts of security information to identify those events that require attention. This webinar will present IBM's Security Intelligence solution for the mainframe and the enterprise.

Date: Thursday, February 6, 2014 -- 60 minutes

View Archived Webinar Now

 
 

Adapting Incident Response to Meet the Threat [and Minimize the Impact of a Breach]
A Dark Reading Webinar

As the frequency and sophistication of cyber attacks continue to evolve, so too must your capabilities to respond. The reality of security today is that a breach is inevitable. But is your organization prepared for a major compromise today and how will it adapt to a changing threat in the future? Do you really know your environment? Do you really understand the threat? Do you know where to focus your limited incident Response Capabilities? Do you know how to measure the success of your Incident Response and Security plan?

In this webcast, Jeff Schilling - Director of Incident Response and Digital Forensics at Dell SecureWorks, provides a vision for how security must evolve to combat the changing nature of the threat. Jeff will discuss the best methods for layering incident response into the security stack and developing a proven capability to handle a major data breach. Sharing examples of actual incidents, Jeff will provide practical recommendations you can implement quickly to minimize the "detection to response" window and better protect your networks, servers, hosts and end users.

Tuesday, January 28, 2014 -- 60 minutes

View Archived Webinar Now

 
 

Smarter, Shadier, Stealthier Malware: The Latest on Today's Threats
A Dark Reading Webinar

Advanced botnets, exploit kits and Cryptolocker ransomware were a few of the big malware headlines in 2013. And web-based attacks continue to be the delivery mechanism favored by cybercriminals, making them the biggest threat to your security today. To stay secure, you need to understand the risks and know how these threats work.

Join Sophos security experts Maxim Weinstein and John Shier for a live webcast to learn about the latest trends in malware and what you can do to protect your organization. They will discuss:

  • Recent trends in the threat landscape
  • The complex network of malware distribution
  • An inside look at Cryptolocker ransomware
  • How to stay ahead of the latest sophisticated attacks
  • Predictions for 2014
Register today and be prepared for tomorrow.

Wednesday, January 22, 2014 -- 60 minutes

View Archived Webinar Now

 
 

Beyond Log Management: How Evolving SIEM Defends against Advanced Persistent Threats
A Dark Reading Webinar

The threat landscape is constantly evolving, with Advanced Persistent Threats and zero-day exploits challenging our best abilities to keep systems and data safe and secure. As a result the way we monitor and manage security events is also evolving - and SIEM, which used to be synonymous with log management has evolved to meet today's threats and prepare for tomorrow's as well. Join our complimentary webinar sponsored by Dark Reading and HP to hear from Forrester security expert Edward Ferrara who will discuss how SIEM is evolving and how to best take advantage of the new security tools that puts at your disposal.

Attend this event to learn:

  • How SIEM is evolving in conjunction with the threat landscape
  • Ways application monitoring impacts security management
  • The role of Big Data in correlating security events
  • What do to now to be prepared for the evolution of SIEM
Register now for this important event and bring your questions for our panel of experts to address during the live Q&A following the presentation.

Wednesday, January 15, 2014 -- 60 minutes

View Archived Webinar Now

 
 

Top Big Data Security Tips and Ultimate Protection for Enterprise Data
A Dark Reading Webinar

Organizations are leveraging increasing varieties and large volumes of information to gain deeper insight into their business. In today's data intensive environment, data protection is a requirement to reduce business risk particularly as customers undertake big data initiatives. Join us for this webinar so you can discover how you can:

  • Ensure real time monitoring and reporting of security related events
  • Protect a wide range of data sources across many platforms and database vendors
  • Lower the cost of compliance with prebuilt policies, reports and automation
  • Discover sensitive data and categorize vulnerabilities
  • Monitor for suspicious behavior and can block activity
Lower the cost and effort of compliance and take a proactive approach to protecting your many data sources. BONUS: All attendees will also receive a complimentary copy of the ebook: Top Tips For Securing Big Data Environments.

Tuesday, December 10, 2013 -- 60 minutes

View Archived Webinar Now

 
 

How to Stop Web Application Attacks
A Dark Reading Webinar

Attend this webinar to learn how to:

  • Identify potential attacks on your Web applications
  • Recognize vulnerabilities in your Web applications
  • Remediate websites and Web applications that have been compromised
Register for this webinar to learn how to better understand how attackers find weaknesses in your Web applications, and how you can stop them.

Date: Tuesday, December 3, 2013 -- 1:00 PM PT / 4:00 PM ET

Register Now!

 
 

Defense Against the Dark Arts
A Dark Reading Webinar

The recent arrest of the Blackhole kit developer Paunch suggested to less-informed observers the potential for a significant reduction in targeted malware attacks.

Unfortunately, fame does not equate to efficacy -- and the void left by Blackhole's absence is being rapidly filled by potentially even more effective and stealthy exploit kits. Register for "Defense Against the Dark Arts" to learn about the previous use and history of Blackhole and its creator Paunch, changes in the threat landscape after Blackhole efficacy ceased and much more.

Join us for a discussion led by an industry expert; Wayne Huang, co-founder and CTO of Armorize & VP Engineering at Proofpoint as he discusses this evolution in kits and some of his recent observations of such malware usage in the wild. Register Now.

Date: Thursday November 21, 2013 -- 11:00 AM PT / 2:00 PM ET

Register Now!

 
 

CSI Techniques for IT Security
A Dark Reading Webinar

Attend to learn how to:

  • Take proactive measures to guard against data breaches, rogue employees, and other security risks
  • Determine the value of persistence technology for a constant connection to devices that store corporate data
  • Decide how war zone IT security measures can work for corporate
  • Gain real life examples of security incidents and how they can be mitigated or avoided altogether
Register for this webinar to join Lance Mueller, Director of Forensics at Magnet Forensics for a fascinating look at investigative and other techniques IT can use to safeguard sensitive data, intellectual property, and corporate equipment.

Date: Thursday, November 21, 2013 -- 11:00 AM PT / 2:00 PM ET

Register Now!

 
 

Taking the Cloak off Targeted and Sophisticated Threats
A Dark Reading Webinar

Organizations must marshal change in their operations to move 'in lock-step' with sophisticated attackers that pose a direct and credible threat to their operations, reputations and financial performance. Attend this webinar so you can get a clear understanding of what makes these attacks get into your system. Jon Ramsey, Chief Technology Officer at Dell SecureWorks in Atlanta, GA and a Dell Fellow, will analyze a real-world example of detected activity by a sophisticated adversary.

Date: Tuesday, November 19, 2013 -- 9:00 AM PT / 12:00 PM ET

Register Now!

 
 

How to Defend Your Network from Advanced Persistent Threats (APTs)s
A Dark Reading Webinar:
Register for this webinar to learn:

  • Why and how malicious actors are targeting your endpoints
  • Strategies for integrated detection and defense that leverage next-generation firewalls and malware detonation technologies
  • How organizations like yours have deployed a unified solution to prioritize alerts, accelerate incident response, and drive down operational costs
Attend this webinar with Ruby Sharma, Technical Alliances at FireEye, and Michael Bilancieri, Director of Product Management at Bit9, to get the latest intelligence on advanced attack scenarios and how FireEye and Bit9 are working together to deliver an integrated malware defense platform.

Date Thu, Nov 14, 2013 -- Time 01:00 PM EST

Register Now!

 
 

The Wild Web: Inside the Latest Web Threats
A Dark Reading Webinar

Join Chris McCormack, web security expert at Sophos to understand each step in a modern web attack and what you can do to employ a layered protection strategy to stop these threats and secure your organization. Chris will discuss:

  • Web malware by the numbers
  • The anatomy of a modern web attack from entry to execution
  • A checklist of protection strategies
Register today and be prepared for tomorrow.
Tuesday, October 15, 2013 -- 9:00 AM PT / 12:00 PM ET

Register Now!

 
 

Inside Threats: Is Your Company at Risk?
A Dark Reading Webinar

You may be surprised to learn that the worst threats to your company are your own employees. Insider threats consist of a "bad guy" who maliciously steals sensitive data or, conversely, something that is done inadvertently through employees who lose data or who don't realize that what they are doing could be putting the company at risk. Attend this live webinar to learn ways to keep your company safe from both types of these insider threats.
Wednesday, September 25 2013 -- 10:00 AM PT / 1:00 PM ET

Register Now!

 
 

Spear Phishing and APTs from A to Z
A Dark Reading Webinar

IT departments should take it seriously when employees report odd emails. They may be receiving spear phishing emails, which are an advanced, persistent threat (APT). What exactly is an APT and how does it impact your organization?

Register for this webinar to learn how to recognize an APT, protect your organizational data and best utilize log analysis and risk analysis.
Tuesday, September 24, 2013 -- 11:00 AM PT / 2:00 PM ET

Register Now!

 
 

Understanding and Selecting IAM for Cloud Services
A Dark Reading Webinar

Join Adrian Lane, Analyst and CTO, Securosis and Darren Platt CTO of Symplified Software for the first part of this series, Explanations: Solutions Space, Architecture and Design, to get conceptual awareness of IAM terms and concepts, bring them into sharp focus
Tuesday, September 17, 2013 -- 9:00 AM PT / 12:00 PM ET

Register Now!

 
 

Vulnerability Management Challenges and Best Practices Revealed
A Dark Reading Webinar

Attend this webinar to discover:

  • How security teams can move from a reactive to proactive security strategy
  • Methods for determining the magnitude and severity of risks and vulnerabilities across your organization
  • Importance of an integrated approach for turning a sea of vulnerabilities into a swimmable lake
  • How enterprise visibility to all sources of vulnerability data is the key to success
Wednesday, August 21, 2013 -- 9:00 AM PT / 12:00 PM ET

Register Now!

 
 

Exposing the Hidden Costs of Database Security Solutions
A Dark Reading Webinar

In this webinar, we will provide a framework to calculate the financial impact of any database security solution, and evaluate the attributes and features:

  • Tool monitoring and configuration management
  • Reporting capabilities
  • Solution administration and management
  • APIs and integration methods
  • Architecture
  • Alerts, policies, and audit reports
Thursday, August 1, 2013 -- 11:00 AM PT / 2:00 PM ET

Register Now!

 
 

Get Actionable Insight with Security Intelligence for Mainframe Environments
A Dark Reading Webinar

For the last 50 years the IBM Mainframe has been the most secure computing platform to run critical applications and host essential business data. Customer's business requirements are constantly changing to support new growth opportunities, which in turn affects Mainframe security risks. The resulting security requirements include:

  • Access to applications and data by Customers and Business Partners outside the traditional enterprise.
  • End user deployment of more vulnerable mobile endpoints (BYOD) to access applications and data.
  • Utilization of Mainframe to consolidate workloads providing a virtualization platform for Cloud.
  • Need to address worldwide security regulations and industry standards for enterprise security audits and compliance.
Mainframe customers must ask themselves several questions:
  • Are mainframe security capabilities aligned to business requirements?
  • What are you doing to secure this new interconnectedness?
  • Can unauthorized users get to your mainframe data?
  • Can authorized users be monitored to detect privileged user abuse?
  • Can you automate enterprise event analysis and alerts to react quickly?
  • How do you detect risky security configuration settings and changes?
  • Can you consolidate security operations and reduce costs?
IBM recommends that customer's employ multiple layers of defense to protect their mainframe assets. These layers of defense address four security domains: People, Data, Application, and Infrastructure. This webinar describes IBM's integrated solution to protecting the mainframe assets, addressing compliance, and reducing costs.

Thursday, August 1, 2013 -- 9:00 AM PT / 12:00 PM ET

Register Now!

 
 

Why is Information Governance So Important for Modern Analytics?
A Dark Reading Webinar

The data that feeds your analytics solutions can include everything from customer details to financial records to employee data. The impact of this data getting into the wrong hands either internally or externally can have a major impact on the organizations success and can cost many millions of dollars, which brings information governance and analytics to the forefront for many organizations. Register for this teleconference to learn how to:

  • Reduce business risks and costs
  • Deliver the business insights your users need to drive optimal business performance
  • Decrease the opportunity for critical data to be exposed and put at risk
Join this teleconference and learn how the combination of IBM information governance offerings and analytic solutions on the z Enterprise platform can help you to enhance information integrity, availability and quality.

Wednesday, June 12, 2013 -- 9:00 AM PT / 12:00 PM ET

Register Now!

 
 

Getting a Grip on Mobile Malware
A Dark Reading Webinar

With iPads, iPhones and other smartphones and tablets accessing your network, there's much more to consider than simple device management. The corporate use of these devices makes them an increasingly attractive target for malware writers. So what can you do to keep mobile malware at bay?

Join Sophos mobile security experts Barbara Hudson and Vanja Svajcer to learn about the most common types of Android malware and how they are distributed, as well as some simple tips to avoid malware and the available solutions to protect your devices.

Thursday May 23, 2013 -- 11:00 AM PT / 2:00 PM ET

Register Now!

 
 

How Attackers Identify and Exploit Software and Network Vulnerabilities
A Dark Reading Webinar

Every attack on an enterprise begins with a single vulnerability -- usually a hole in an application, an open port on a network, or a misconfigured device. But how do the bad guys find these vulnerabilities? What methods do they use to seek out potential entry points, and how do they use those flaws to crack your enterprise data? In this fascinating webcast, top security experts look at the latest trends and techniques in vulnerability detection and offer a detailed look at the latest methods for exploiting vulnerabilities in enterprise applications.

Wednesday, May 22, 2013 -- 8:00 AM PT / 11:00 AM ET

Register Now!

 
 

Cloud Security: It's Not Just for IT Anymore
A Dark Reading Webinar

Security has always been a concern for IT when considering a move to the cloud.

  • Does the provider meet industry standards for security and compliance?
  • Is the data center secure?
  • Is there spam and virus protection?
But Human Centric Security is also top of mind for many in Line-of-Business (LOB) roles. Knowledge workers on all levels are looking for cloud collaboration tools that allow them to be more productive in their day-to-day activities, but won't get them in hot water with their CIO. While IT worries about protecting data, LOB is focused on controlling their information.

Attend this webinarto learn more about social cloud solutions with application security that meet the needs of both IT and LOB.

Wednesday, May 22, 2013 -- 11:00 AM PT / 2:00 PM ET

Register Now!

 
 

IBM X-Force 2012 Annual Trend Report: Data Breach Issues and Solutions
A Dark Reading Webinar

Cyber-attacks continue to grow in volume and sophistication -- relentlessly evolving to bypass traditional IT defenses. At the same time, risks associated with system interconnectedness, poor policy enforcement and human error are also growing as every organization's productivity, revenue, compliance, customer relationships and brand value become more dependent on trusted information.

To defend against this threat landscape, IT security, compliance and data management professionals must continue to ask the hard questions about how to secure an enterprise that is interconnected by means of cloud, mobile, and outsourcing technologies.

Join Robert Freeman of IBM X-Force® Advanced Research as he presents an in-depth analysis of recent public vulnerability disclosures and discusses important lessons learned.

By attending this free, highly informative webinar, you'll discover:

  • Five common mistakes IT organizations make when it comes to data security
  • Why the cloud makes it more important than ever to understand how users access data
  • How to implement evolving best security practices despite limited IT resources
Webcast attendees will receive a complimentary copy of IBM X-Force 2012 Annual Trend Report.

Thursday, May 9, 2013 -- 2:00PM ET/ 11:00 AM PT

Register Now!

 

Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0485
Published: 2014-09-02
S3QL 1.18.1 and earlier uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object in (1) common.py or (2) local.py in backends/.

CVE-2014-3861
Published: 2014-09-02
Cross-site scripting (XSS) vulnerability in CDA.xsl in HL7 C-CDA 1.1 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted reference element within a nonXMLBody element.

CVE-2014-3862
Published: 2014-09-02
CDA.xsl in HL7 C-CDA 1.1 and earlier allows remote attackers to discover potentially sensitive URLs via a crafted reference element that triggers creation of an IMG element with an arbitrary URL in its SRC attribute, leading to information disclosure in a Referer log.

CVE-2014-5076
Published: 2014-09-02
The La Banque Postale application before 3.2.6 for Android does not prevent the launching of an activity by a component of another application, which allows attackers to obtain sensitive cached banking information via crafted intents, as demonstrated by the drozer framework.

CVE-2014-5136
Published: 2014-09-02
Cross-site scripting (XSS) vulnerability in Innovative Interfaces Sierra Library Services Platform 1.2_3 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.