Webinar Archives
Upcoming Webinars
“Businesses @ Work” Report Revealed: How Enterprises Use (and Secure) Cloud and Mobile
Date: Sep 30, 2015

View archived webinar

Join this webinar and hear about the results of a recent “Business @ Work” study conducted by Okta, the leading identity and mobility management company.  This webinar will discuss how the report was compiled and review the key findings, which include leading enterprise applications, mobile adoption by industry and region, and how organizations are leveraging certain security features.

Attend and learn how:

  • Traditional enterprise apps are being ousted by disruptive competition
  • Your peers are adopting the cloud to enable employees to securely connect to business critical applications
  • You can get single sign-on, automated user management, Active Directory integration and multi-factor authentication for web-based applications, both in the cloud and behind the firewall

Don’t miss this in-depth look into how organizations and people work today!

Targeting Events That Matter: The Next Generation of SIEM
Date: Sep 29, 2015

View archived webinar

Today’s IT security organizations are not only fighting cyber attackers – they are fighting a deluge of information from their own systems. Security logs, threat intelligence feeds, cyber forensics tools – all of these emerging systems are creating such a morass of information that many enterprises – including Target – are missing key data that may indicate a major data breach. The result: the bad guys continue to get through and wreak havoc, unfettered.

For many years, the security information and event management (SIEM) system has acted as the conduit for security information. Today’s SIEM systems are evolving rapidly to embrace new capabilities such as behavioral analytics. And security information itself is also evolving: enterprises are adding new event information, such as authentication data, to help detect potential threats sooner and stop attacks *before* they turn into major breaches.

Join security experts from SecureAuth and Comm Solutions an informative webcast in which they discuss the rapid growth of security information, the recent evolution of SIEM systems, and how your enterprise can implement new technologies and best practices that help you manage the wealth of security data you’re collecting – and recognize attacks before they impact your critical data.

Measuring Cyber Risk Through Security Data Analysis
Date: Sep 29, 2015

View archived webinar

No matter what the industry, most CEOs have the same question about cyber security: How safe is our data?  Yet measuring IT security risk remains a difficult and elusive task, because there are so many technologies and variables involved.

In this unique webcast, editors at Dark Reading will join top IT security experts to discuss ways that your organization can mine and harvest security data to provide a clearer picture on the cyber risk faced by your organization. You’ll get insight on ways that you can correlate and integrate a variety of information about your current threat environment, and how you can martial that internal data to create reports that measure your organization’s current cyber risk. You’ll also get tips on how you can use existing data to report on your enterprise’s current security posture, and offer forecasts on future risk.

Improving Cyber Security Through Next-Generation Network Defenses
Date: Sep 23, 2015

View archived webinar

Enterprises continue to struggle with the many options available for endpoint and application security. But for many attackers, the first goal isn’t a device or an app – it’s your corporate network. The network is the entry point that allows a criminal to move laterally through your enterprise – and access any data, regardless of the hardware involved.

Attacks on the enterprise network are becoming increasingly sophisticated – and a new generation of tools and strategies is available to help combat them. What do the latest network-borne attacks look like? What new methods are cyber criminals using to gain access? And what can IT security and network staff do to combat these latest attacks?

In this informative webcast, top security experts will discuss the latest research on network attacks, and the attackers who launch them. The experts will also discuss emerging methods for defending against these attacks, including next-generation network segmentation methods.

Using Threat Intelligence To Improve Enterprise Cyber Defense
Date: Sep 16, 2015

View archived webinar

Many enterprises are adding threat intelligence feeds and external threat data to their cyber defense arsenal. But how can security teams integrate this new threat information with their own security data to build a stronger defense? How can they mine security intelligence data to find the threats that pose the greatest danger to their specific environments?

Join DomainTools and industry analyst Michael Osterman as they offer insight into the latest trends in threat intelligence, and how enterprises can use that intelligence to measure risk and prioritize their defenses. Osterman will share the results of a new survey on how organizations purchase and use threat intelligence, as well as the pitfalls and payoffs of using threat data wisely. The experts will also offer advice on how domain and DNS-based threat information can help organizations assess risk, assess potential indicators of compromise, and even anticipate and block future attacks.

Attendees will learn:

  • The right and wrong ways to make use of threat intelligence data;
  • Results of a major survey showing how enterprises are implementing threat intelligence services and technology;
  • The pitfalls and payoffs of using threat intelligence;
  • How domain and DNS-based threat data can help organizations see threats coming by detecting, investigating, and acting upon threat indicators.
How Enterprises Are Attacking the Cloud Security Challenge
Date: Sep 16, 2015

View archived webinar

No matter what their size or industry, most enterprises today are employing multiple cloud services and applications. But with their data running across many “clouds” that employ varying approaches to security, how can the enterprise ensure that its data is safe?

Join Dark Reading and CloudPassage for an insightful look at best practices and technologies for securing data in a multi-provider cloud environment. In a webcast featuring cloud security experts Michael Cobb and Sami Laine, Dark Reading and CloudPassage will offer a deep dive into issues such as how to: 

  • Monitor key cloud security indicators 
  • Enforce security policy across multiple cloud services
  • Build an incident response plan that enables internal security teams to work hand-in-hand with cloud service providers
  • Build dashboards that enable the enterprise to monitor security across multiple cloud providers
Protecting E-Commerce In High-Traffic Environments
Date: Sep 15, 2015

View archived webinar

In this important webinar, top security experts will discuss the ways attackers seek to exploit companies at their weakest – and most critical – moments of operation.

Gain insights on the ways that attackers target their exploits during the holiday seasons or other crucial business times, and how adversaries may take advantage of heavy traffic periods to launch malware or sophisticated attacks.

You’ll also get advice on how you can bolster your IT defense strategy to provide additional resources during critical periods and prevent these untimely attacks from affecting your business.

Topics covered will include how to:

  • Understand & avoid social exploits during high-volume periods
  • Create & enforce an internal security policy that works when staffing and time are in short supply
  • Harden your DNS to protect your Internet-based transaction traffic
  • Detect fraudulent transactions quickly
  • Stop Phishing and protect your brand

Register today and join us as we explore ways to ensure 100% uptime even when traffic and threats are at their peak!

Windows Server 2003: How To Avoid Vulnerabilities In A Post-Support World
Date: Aug 27, 2015

View archived webinar

Still running Windows Server 2003 and unsure how you'll pass your next IT compliance audit?

With an estimated 2.7 million servers still running Windows Server 2003, many organizations continue to run W2K3 in production but do not yet have a rock solid plan to deal with the never-ending stream of new exploits, vulnerabilities, and zero-day malware that come with running an unsupported operating system. Worse yet, many still do not have strategies for passing their upcoming fall IT compliance audits.

In this educational webcast, join Bit9 + Carbon Black Senior Director of Compliance, Chris Strand, for a discussion around what you need to do to keep W2K3 secure and compliant in a post-support world and the solutions and services that are available to help you. There are options beyond upgrading or spending a fortune on Microsoft extended support.

Topics will include:

  • Who’s Still Running W2K3? – A Look at the Numbers
  • Why You Need A Vulnerability Mitigation Strategy
  • Rapid Implementation Strategies to Stay Compliant
  • How Bit9 Can Help
Understanding The Board’s Perspective On Cybersecurity
Date: Aug 26, 2015

View archived webinar

Following the onslaught of high-profile cyberattacks reported in the past twelve to eighteen months, cyber security has become a more frequent topic in board-level conversations. This has created a need for CISOs to better understand board member perceptions and become more effective at communicating their cybersecurity strategies.

How can CISOs respond to these new challenges and pressures? Using data from an NYSE survey of nearly 200 corporate directors, two of the industry’s best-known voices – Andy Ellis, CSO of Akamai and Chris Wysopal, CTO & CISO of Veracode – will discuss how CISOs can elevate the security conversation to a board-level discussion.

During the live-streamed videocast at 12:00 pm on August 26, sponsored by Veracode and moderated by Dark Reading, Wysopal and Ellis will share recommendations based on their own experiences presenting to boards, ongoing conversations with fellow CISOs and the results of the NYSE survey.

Wysopal and Ellis will also discuss key questions such as:

  • What are board members’ biggest fears regarding cyberattacks?
  • Who do board members hold accountable when a major breach does occur at your company?
  • How do board members prefer information be presented about risk posture and strategies?
  • What metrics are most effective for gaining buy-in for your risk reduction strategy?

The world of IT security is changing, both for the CISO and for the business. By examining the survey results, and discussing Wysopal’s and Ellis’s own experiences, you’ll hear practical tips to help make your boardroom security discussions more productive.

If you want to get a first-hand viewpoint on what these changes may mean for your organization and your career, register to watch this special live-streamed videocast!

Impostors, Rogue Users, And Other Unwelcome Guests On Your Network
Date: Aug 25, 2015

View archived webinar

Today’s cyber criminals have one dream: to navigate your enterprise’s network like a privileged user. Unfortunately for your business, there is a growing number of exploits that enable these criminals to do just that. And once they’re in, it can be hard to tell them from legitimate end users.
How do you know when an impostor is on your network? What tools and techniques do they use to gain user credentials and capabilities? More importantly, how can you detect unauthorized users and lock them out – before they steal your data? In this timely webcast, three top security experts will discuss the methods that attackers use to assume a trusted identity on enterprise networks, and how they behave once they gain access. The panel will also discuss methods you can use to identify behaviors and actions that might tip off a malicious user – and enable you to stop them before they can exfiltrate sensitive information.

The Fantastic Four: Metrics you can’t ignore when reducing application-layer risk
Date: Jul 30, 2015

View archived webinar

You’re starting to get the hang of application security as an organization. Maybe you’re testing a few applications, or a few hundred (or thousand). But you have these nagging thoughts in the back of your mind: Are my applications better or worse than everyone else’s — especially my competitors? How can I convince my software suppliers to move faster? And, how am I going to prove to my management — even to the board — that our appsec program is making a difference?

This webinar will provide an overview of the state of software security across different industry verticals, and talk with security experts from some of the world’s leading organizations on the four metrics they use to benchmark their performance, measure success, report up to the board, and motivate development teams to fix vulnerabilities.

You’ll learn

  • How your industry compares to others in the quality, threat landscape, and rate of remediation of its applications 
  • How your peers are measuring the success of their application security programs 
  • What measures can organizations take to reduce risk in their applications
Myths of Cloud Security Debunked!
Date: Jul 23, 2015

View archived webinar

Despite the meteoric rise of cloud based applications and services, as well as its subsequent adoption by a significant number of enterprises, security still remains a major concern for many organizations.  The elephant in the room is the misconception that the cloud is less secure than on-premise capabilities. Gartner eloquently describes this as “more of a trust issue than based on any reasonable analysis of actual security capabilities”.

A recent global study by BT revealed that 76% of large organizations cited security as their main concern for using cloud-based services. 49% admitted being “ very” or “extremely anxious” about the security complications of these services.  However according to Gartner, the reality is “most breaches continue to involve on-premises data center environments”

Where do you stand on this issue?

Join Michael Sutton, Chief Information Security Officer, Zscaler, for a compelling webcast debunking the top myths of cloud security. He will address the following myths:

  1. Cloud-based infrastructure is inherently more vulnerable than a traditional IT infrastructure
  2. Cloud vendors lack transparency when it comes to understanding their security posture
  3. Physical management of data and hardware means better security
  4. Cloud security is difficult to manage
  5. Moving security to the cloud results in a loss of control over the security architecture

Michael will also provide concrete steps you can take to keep your organization safe in today’s cloud and mobile first IT landscape. 

Intelligence-driven Incident Response
Date: Jul 22, 2015

View archived webinar

Cybersecurity teams today are swamped with disparate point tools, manual processes, and minimal access to critical enterprise data.  This existing situation hinders analysts' ability to quickly develop the real-time actionable intelligence that’s necessary for fast, effective cyber incident response.
It’s time to change that to better address today’s advanced threats.

In this webinar, top cybersecurity experts will discuss how incident responders can make faster, better-informed decisions using new tools and techniques applied to existing systems and data.

Attend this 60-minute webinar, which will:

  • Outline why today’s cyber attacks are often able to circumvent traditional defenses
  • Offer an overview of emerging technologies and best practices for turning disparate data sources into actionable intelligence
  • Discuss the effectiveness of these techniques in the context of well-known case studies
  • Provide tips on how to be better prepared to address attacks as they occur, not hours, days, or months later
Winning the War Against Cyber Attackers
Date: Jul 22, 2015

View archived webinar

Despite spending record amounts on IT security technology, enterprises continue to fail in their efforts to expediently stop sophisticated cyber-attacks. Recent studies indicate that most major security compromises take weeks – even months – to discover, and are often found by third parties, rather than the victim organizations. Why do current enterprise defense strategies continue to fall short, and what can IT security teams do to speed the process of detection and remediation?

In this special videocast, two top experts on information security strategy will join Dark Reading senior editor Sara Peters in a frank discussion of methods for improving the detection and containment of cyber-attacks – before they become headline-inducing data breaches.

The experts will explore why threat detection alone is insufficient, debunk current myths around enterprise defenses, and outline the reasons why existing technologies and practices today fail to detect or stop sophisticated cyber-attacks. Just as importantly, the experts will discuss tools and methods for shortening the time between a security compromise and its detection and eradication. Viewers will receive advice and recommendations for speeding the identification of a sophisticated threat, and for blocking or eliminating the threat before critical data is lost.

The Internet of Things, the Software Supply Chain and Cybersecurity
Date: Jul 15, 2015

View archived webinar

The number of connected devices is set to explode, with Gartner forecasting it will reach 25 billion by 2020 – of which 250 million will be connected vehicles.

The Internet of Things (IoT) affects virtually every industry and domain in our society including our homes, health, hospitals, factories and critical infrastructure as well as our planes, trains and automobiles.

We’re not just talking about fitness trackers and smart TVs anymore – IoT-enabled devices now include industrial machinery, patient diagnostic machines and corporate door-locking systems.

And this new binding of the digital and physical worlds means that, for the first time in history, cyberattacks can easily traverse from the digital domain to the physical realm and impact our physical assets and safety. This has been shown in numerous hacks on medical devices as well as in the 2014 cyberattack on a German blast furnace.

As enterprises increasingly rely on digital technology to drive their businesses, CISOs and CIOs must begin to understand the direction and critical implications of cybersecurity for the IoT.

Join Dark Reading for a live-streamed videocast featuring two of the industry’s best-known voices: Chris Eng, VP of Research at Veracode and former NSA engineer; and Josh Corman, CTO of Sonatype and former security strategist at Akamai and IBM Internet Security Systems.

You’ll get first-hand insights into key questions such as:

  • How does the scale and complexity of the IoT lead to changes in the way we develop software applications and assess them for risk?
  • As software increasingly becomes assembled from reusable third-party and open source components and frameworks, how do we minimize risk from the software supply chain?
  • What is a basic cybersecurity checklist for developing secure IoT systems (e.g., encryption, authentication, segmentation, patching mechanisms, etc.)?
  • What are other attack surfaces beyond the endpoint device itself (web and mobile apps, back-end cloud services, etc.)?
  • With so many different platforms and protocols, how do you assess the maturity of suppliers in your supply chain?
  • What role should industry standards and government regulations play?
The New School of Cyber Defense
Date: Jul 09, 2015

View archived webinar

The old school of cyber defense emphasized securing infrastructure and restricting data flows.  But data needs to run freely to power our organizations.  The new school of cyber defense calls for security that is agile and intelligent.  It emphasizes protecting the interactions between our users, our applications and our data.  

The world has changed, and we must change the way we secure it.  Join Frank Mong, VP & General Manager of Security Solutions and hear why you need to secure your:

  • Cloud services
  • Data wherever it is
  • Apps wherever they run
Optimizing Your Security Defenses For Today’s Targeted Attacks
Date: Jun 25, 2015

View archived webinar

Cyber attacks, once designed to infect as many systems as possible, are becoming increasingly targeted and unique. Yet today’s enterprise defenses, originally built to stop those older, broader exploits, aren’t keeping up. What’s your organization’s strategy for stopping targeted attacks? Do you have the tools and skills you need to protect your data?

Join Jon Oltsik, Principal Analyst at Enterprise Strategy Group, along with Ben Johnson, Chief Security Strategist with Bit9 + Carbon Black, as they discuss new strategies for defending enterprise data against targeted attacks.  Jon and Ben will share stories from real customers who are using new and innovative methods for detecting sophisticated exploits, improving layered defenses, and developing customized data protection strategies that are better able to stop targeted attacks. They will also discuss next-generation tools and practices that could give enterprises a leg up on targeted attackers.

Security Threats: Is the Attacker Right in Front of You?
Date: Jun 18, 2015

View archived webinar

Despite the fact that external attacks often get more attention in the media, recent data is proving that the threat posed by malicious, negligent or compromised insiders is indeed significant.

The best way to detect and prevent insider threats is to have in-depth visibility into the internal environment and a means of filtering and prioritizing the massive amount of data available on the network into concise, actionable intelligence.

You’ll learn:

  • How to detect insider threats
  • How to identify suspicious network activity
  • Strategies for managing the insider threat problem from both a business and technical point of view.
  • Different techniques for identifying suspicious activity in large collections of data
  • Tips to incorporate best practices to protect your organization from the insider threat

Insider threats is critical so that you can minimize the amount of data that can be compromised.

Could you find the insider threat if there was one? Would you know what steps to take to determine how much data had been breached? Join this webinar to learn how to detect insider threats and ways to protect against them.

Register & Get "The Reality of Insider Threats" complimentary Infographic Today!

Making the Most Out Of Threat Intelligence Services
Date: Jun 17, 2015

View archived webinar

Threat intelligence services are enabling enterprises to incorporate information about external cyber threats into their IT defense strategies. But as this new category of services evolves and becomes more widely implemented, enterprises are searching for ways to make better use of the wide range of threat data.

What are the primary advantages of using a threat intelligence service? How many such services should enterprises employ, and how can they coordinate the data from multiple services? What are the best practices for interpreting and customizing threat intelligence data, and how can enterprises automate this analysis?

In this informative Dark Reading webcast, experts will offer insights and recommendations on:

  • How to use threat intelligence for maximum benefit
  • How to automate the analysis of threat intelligence data to help identify sophisticated attacks more quickly and efficiently.
Tune in for the Ultimate WAF Torture Test: Bots Attack!
Date: Jun 16, 2015

View archived webinar

Think your Web Application Firewall is ready for the next bot attack? Think again.

Meet John Stauffacher – a world renowned expert in web application security, and the author of Web Application Firewalls: A Practical Approach. John is a certified Network Security and Engineering specialist with over 17 years of experience in IT Security.

But wait… are WAFs the best approach for defending your website against malicious bots? Rami Essaid, Co-Founder and CEO of Distil Networks, doesn’t think so and he’s challenged John to a lab test to prove it. Who will win the battle of the bots? Tune in live to find out!

Key Takeaways:

  • How to optimize your WAF for bot detection and mitigation
  • Why whitelisting is always better than blacklisting
  • WAF best practices plus the one thing you should never do
  • Optimizing web application security based on your vulnerability profile

Attend this webinar and learn practical tips on how to defend your web infrastructure against the OWASP Top 10 as well as brute force attacks, web scraping, unauthorized vulnerability scans, fraud, spam and man-in-the-middle attacks. 

Moving Beyond AV: Closing the Endpoint Security Gap
Date: Jun 02, 2015

View archived webinar

Organization continues to rely upon antivirus as a first line of defense to protect endpoints today. Yet recent attacks have shown that organizations require more than traditional signature-based detection. So why are you still paying for AV? Discover how Bit9 + Carbon Black and Microsoft are working together to help organizations move beyond signature-based detection.

Join EMA Analyst, David Monahan as he explains:

  • Why you need to think differently about nuisance malware and target threats
  • Why antivirus is insufficient to protect organizations from advanced threats
  • What organizations are doing to address this endpoint security gap and improve their security ROI
  • Why open API solutions are critical to a defense-in-depth strategy

If you continue to rely upon antivirus as your primary line of defense, your options will be increasingly limited. This webinar will outline how you can save money and improve security by investing in Bit9 + Carbon Black and Microsoft.

Secure Agile & DevOps: How It Gets Done
Date: May 21, 2015

View archived webinar

There’s no point trying to ignore the elephant in the room. Everyone knows there’s historically been friction between security professionals and development teams. This isn’t because of inherent animosity, but conflicting priorities. Development needs to ship functioning code on time and within budget. Security needs to manage risks to the organization, including risks introduced by new code. One needs to go as fast as possible; the other needs to keep from smashing through the guardrails and flying off the road.

Further complicating the picture, Agile is now the dominant process for code development, with DevOps emerging as a new framework to help the entire organization be just as agile. These two trends radically alter the way we build, test and secure code. More importantly DevOps has the potential to mitigate several problems with secure Agile development, helping foster cooperation and reduce integration issues between security, operations and development. As a result, secure development and deployment practices must fit within Agile and DevOps processes — not the other way around.

Moderated by Dark Reading , this live-streaming videocast features two well-known security and development experts: Chris Wysopal, Veracode CISO & CTO, and Adrian Lane, Securosis CTO, who’s also been a CIO and managed development teams.

This videocast is for both security and development professionals who want to understand how Agile and DevOps driven development alter security integration — and help both teams work together better.

We’ll discuss:

  • Rapid development process evolution, feature prioritization, and how cultural differences can create friction between security and development.
  • Why speed and agility are essential to both sides.
  • How automation and well-defined processes allow security issues to be detected and recovered from earlier in the lifecycle.
  • How to communicate what needs to happen to reduce application-layer risk — without slowing down development or putting developers on the defensive.

Get ready for a lively conversation about pragmatic best practices for embedding security into Agile SDLC and DevOps processes!

The Human Factor 2015: Cybercriminals Go Corporate, and How to Fight Them
Date: May 20, 2015

View archived webinar

The Human Factor Report 2015 reveals that last year was the year attackers “went corporate” by changing their tactics to focus on businesses rather than consumers, exploiting middle management overload of information sharing, and trading off attack volume for sophistication. Organizations that had spent the year training their employees to recognize phishing techniques used by cybercriminals the previous year were not ready for the new delivery methods, email lures and other techniques used by attackers to trick end-users into clicking on links in malicious emails.

Key findings from the report include:

  • Learn how attackers have decreased the time-to-click: 2-out-of-3 end-users click on malicious emails the day they receive them.
  • Understand how and why end-users click on 1-in-25 malicious links in emails: every organization still clicks.
  • See this year’s most popular and effective phishing templates: business-oriented lures such as message notifications and corporate financial notifications.
  • Defend against campaigns that blend in with normal business email traffic and piggyback on legitimate web marketing emails to reach end users and drive clicks.

Users are learning how to recognize email-borne threats but attackers are adapting faster, and as the high-profile data breaches from last year show, the costs of a bad click continue to mount. Attend this webinar to learn more about the latest threats targeting organizations and how to combat them.


Has Your Cyber Security Program Jumped The Shark?
Date: May 19, 2015

View archived webinar

Most enterprise security programs are designed to prevent attackers from getting inside the network. This 30-year-old strategy prevails even though advanced malware regularly evades perimeter defenses. While the hope of a ‘prevention pill for all your ills’ has gone by the way of Fonzie’s waterskies, enterprise security is not a lost cause. Detection is the “new cool.”

Learn how to make your security program relevant in 2015 and beyond. Join technology trend-setter Stephen Newman, VP of Product Management at Damballa, for a live discussion about the use of advanced detection techniques to find unknown and hidden threats. At the end of this webinar you will understand how to:

  • Rate your current tools’ effectiveness versus advanced threats
  • Recognize the difference between preventing attacks and detecting infections
  • Take a forward-thinking approach to stopping data theft after compromise occurs
  • Shift your Tier 2 & Tier 3 security teams from chasing alerts to solving long-term security challenges 
Modern vs Traditional SIEM – What You Need to Know
Date: May 13, 2015

View archived webinar

Security information and event management (SIEM) tools provide a robust collection of data sources that can help companies take a more proactive approach to preventing threats and breaches. However, implementing a SIEM often brings the challenges of a lengthy implementation, costly investment and the need for skilled security analysts to maintain it. Also, many SIEMs have been used in on-premise data centers, so what steps will you need to take if you want your SIEM to move with your data into the cloud?

In this webinar you will learn:

  • The key components to make a traditional SIEM work
  • The characteristics of a modern SIEM
  • Your options for building and investing in a modern SIEM
Why DDoS Attacks Are A More Serious Threat Than Ever
Date: May 05, 2015

View archived webinar

Neustar's annual DDoS Attacks Report presents the latest critical DDoS trending data from real companies across industries.  Learn how companies are ramping up their DDoS protection tactics and why they are working.

  • Hear about current DDoS attack metrics including size and duration
  • Learn why DDoS attacks aren’t just a problem for the IT security team
  • Find out the true costs of DDoS attacks in terms of lost revenue and erosion of brand confidence
  • Optimize your DDoS plan with industry-proven protection tactics

Don’t miss this unique opportunity to learn about the latest DDoS attack trends and how to defend against them. 

Monitoring and Enforcing Security Policy In Cloud Environments
Date: Apr 16, 2015

View archived webinar

Enterprises are deploying cloud services and applications across the enterprise, but using cloud technology can make it difficult to monitor and ensure that data security policies are enforced. In this webcast, cloud security experts will discuss methods and practices for monitoring and securing data in environments that involve multiple cloud providers or applications.

This webcast will help attendees:

  • Gain an understanding of the security vulnerabilities inherent in many cloud services
  • Learn how to monitor data that is in the cloud and identify potential threats
  • Identify and overcome the obstacles associated with creating security policies in multi-provider environments
  • Develop a plan for enforcing those policies across the enterprise
  • Build a strategy for ensuring data security compliance in cloud environments and meet the requirements of compliance auditors

Cloud service providers may offer security capabilities in a variety of form factors, but each enterprise must develop its own policies and strategies that work across provider environments.  This webcast will help you build strategies for enforcing security strategies in your own enterprise, no matter how many service and application providers you employ. 

The Changing Role of the Chief Information Security Officer: What Every CISO Should Know
Date: Apr 14, 2015

View archived webinar

In past years, the job of the enterprise chief information security officer (CISO) was to establish and maintain a security perimeter around corporate data and a strategy for defending it. But today’s CISO is faced with a wide variety of new challenges that the security department has never seen before. While cloud computing, open source, distributed and outsourced software development, bring-your-own-device policies, and other initiatives create “shadow IT” environments that often take control out of the CISO’s hands, the steady barrage of high-volume, high-publicity security breaches in the headlines are putting unprecedented pressures on the CISO’s office. The reality is that today’s CISO is under more scrutiny than ever – including from the board – and yet, he/she has less control over the IT environment than ever before.

How should the CISO – indeed, the entire IT department – respond to these new challenges and pressures?  In a special live videocast on Apr. 14, industry experts will discuss these very questions.

In this special videocast sponsored by Veracode and moderated by Dark Reading, two of the IT security industry’s best-known voices – Chris Wysopal, CTO & CISO of Veracode and Jim Nelms, CISO of The Mayo Clinic – will discuss the changing role of the CISO and how the importance of that role is growing within the organization.

You’ll get first-hand insights on the responsibilities and challenges assumed by today’s CISOs, and how today’s IT security departments are adapting to the new pressures being applied by new technology and attackers. You’ll also get some real-life advice on how your organization can respond to these challenges and how to explain your strategy and risk posture to business executives.

The world of IT security is changing, both for the CISO and for the business. If you want to get a first-hand viewpoint on what these changes may mean for your organization, register to watch this special videocast today! 

Zscaler vs FireEye - Insights from the Experts at Miercom Labs
Date: Apr 08, 2015

View archived webinar

Advanced Persistent Threats (APTs) are sophisticated, stealthy, and extremely difficult to stop - so a number of different approaches to combat them have emerged. That's why Miercom, a leading security testing firm, recently performed a head-to-head security efficacy analysis of all leading network-based breach detection and protection solutions - including FireEye, Checkpoint, Cisco, Fortinet, and Zscaler.

Please join Robert Smithers, CEO of Miercom, and Dan Maier, Sr. Director of Product Marketing at Zscaler for a compelling webcast to discuss the detailed results of head-to-head testing between Zscaler and FireEye.  They will also discuss:

  • The current APT protection landscape
  • Best practices for combating APTs
  • Why cloud-based solutions are better equipped than appliances and hybrid solutions at protecting against APTs
  • How Zscaler outperformed FireEye in both performance and accuracy


Building and Enforcing Mobile Application Security Policy in a BYOD World
Date: Mar 31, 2015

View archived webinar

The rapid proliferation and use of personal and work-related mobile applications is one of the reasons a typical large enterprise may have up to 2000 or more unsafe applications installed in their environment. (^1) In fact, a typical user accesses an average of 24.7 mobile applications per month.,(^2) Worse yet, traditional approaches taken by security teams, such as manually testing and blacklisting or whitelisting applications, are proving inadequate to keep up with the number of applications and rate of change in the mobile landscape.

Come hear guest Forrester Research analyst Tyler Shields and Veracode mobility expert Theodora Titonis discuss the state of securing BYOD and new approaches to secure enterprises.   

In this webinar, you will:

  • Understand the potential risks from unsafe mobile applications
  • Learn common failure points for BYOD initiatives
  • Learn how to use new approaches to keep up with mobile application security

^1: Veracode, "Average Large Enterprise Has More than 2,000 Unsafe Mobile Apps Installed on Employee Devices." March 11, 2015.
^2: Shields, Tyler. "The Future of Mobile Security: Securing the Mobile Moment." Forrester Research, February 17, 2015, p. 2. 

Actionable Network Visibility: Empowering the Security Analyst
Date: Mar 25, 2015

View archived webinar

Today’s threat actors are organized, well-funded, and more sophisticated than ever; with the goal of stealing sensitive data for profit. As such, dedicated security teams are charged with preparing organizations for the most advanced of attacks. Unfortunately, if you can’t see network intruders, you definitely can’t detect or prevent data theft.

Join Kurt Bertone, Chief Security Strategist, Fidelis Cybersecurity and learn more about:

  • The current threat landscape and approaches to advanced threat defense
  • Best practices for defending the network and establishing network resiliency
  • Implementing and executing a cybersecurity defense plan to reduce time to discover threats in your network
  • Actionable visibility empowering analysts to detect and prevent threats across the network 
Finding And Responding To Attacks In The Cloud
Date: Mar 12, 2015

View archived webinar

Enterprises today are adopting cloud services and technology at a rapid pace, seeking to take advantage of the flexibility and cost savings that the cloud provides. But IT and security professionals are deeply concerned about the loss of visibility that the cloud sometimes creates – they are uncertain as to whether or not they will be able to spot potential online threats, or how they will respond to them.

In this webcast, experts on cloud security will discuss methods that enterprises can use to monitor, detect, and respond to security threats in the cloud. They will offer an in-depth discussion on tools that can be used to monitor data and detect anomalies in the cloud, and how to deploy them. They will discuss best practices for working with cloud service providers on how to identify potential attacks, and how to develop an incident response program that works across both the enterprise network and the cloud service. Most importantly, they will discuss the latest threats to cloud services users, and how to stop security information from "falling through the cracks" between the enterprise and the service provider. 

How to Keep Your Company Safe & Out of the Headlines
Date: Feb 26, 2015

View archived webinar

Advanced threats are on the rise, and large-scaled security breaches keep happening, so what can IT security teams do to keep their organizations out of the headlines? Join Mike Horn, Proofpoint’s Vice President of Threat Response Products, as he explains common threat scenarios and how to quickly verify if a user was infected and instantly contain verified threats.

Attend this webinar to learn how to:

  • Address the current security landscape with key security controls
  • Mitigate risks from advanced threats by responding at the speed of your attackers
  • Leverage context, automation and incident management to stop attacks before they become headlines
  • Instantly verify, prioritize and contain advanced threats and targeted attacks  

Register for this webinar to learn how organizations are using advanced threat response solutions to dramatically reduce the time it takes to verify and respond to detected security threats.  

Stop Cyber Attackers in Their Tracks with Adaptive Authentication
Date: Feb 25, 2015

View archived webinar

Join SecureAuth, an innovator of access control solutions, along with Norse Corporation, the leader in live attack intelligence as we take a deeper look at how adaptive authentication techniques can enable your organization to stop attackers in their tracks. With live intelligence data as a part of your authentication workflows, you can easily identify suspicious actors before they enter your network, not after they violate a policy.  

In this webcast we’ll explore:

  • Emerging techniques for adaptive authentication
  • Why leveraging an identity provider delivers the best results for you
  • How you can easily integrate live intelligence into your authentication strategy

Attacks on organizations are in the news every day. How can your organization keep from becoming tomorrow’s headline?  Attend this webcast and find out.

Implementing a Security Maturity Framework: 5 Levels to Improving Your SOC
Date: Dec 16, 2014

View archived webinar

Whether you are a small business or a large organization, having a highly effective security program is critical. Join Bit9 + Carbon Black’s CSO, Nick Levay to learn how you can leverage the Security Maturity Framework to evaluate and improve the effectiveness and efficiency of your security operations team.

Nick Levay, Chief Security Officer, for Bit9 + Carbon Black will discuss:

  • The 5 Step Security Maturity Framework
  • How to utilize a Risk Assessment Matrix to prioritize projects
  • Why governance is critical to an effective SOC
  • Why real world tests are key to a successful and agile SOC

Register now to learn more about how you can utilize the Security Maturity Framework to improve your security operations team.

Security Matters: Threat Assessments for 2015
Date: Dec 11, 2014

View archived webinar

This year has brought profound changes to the security landscape, especially in the area of Distributed Denial of Service (DDoS) attacks. Aside from the traditional saturation objectives of such assaults, DDoS attacks are increasingly used as cyber “smokescreens” to mask more intrusive and more destructive penetration operations. Join Neustar and media leader, Cox Communications, in a forward-looking discussion on what you should consider to safeguard your business in 2015.

During this session, you’ll hear about:

  • 2014 security trends and lessons
  • 2015 DDoS threat assessments
  • Real-world approaches to help keep you safe

Don’t miss this chance to participate in one of the most important conversations you will have this year. Get ready for 2015 by registering today!


The DNS Blind Spot: You haven't been looking at DNS in the past - why start now?
Date: Dec 09, 2014

View archived webinar

The Domain Name System (DNS) is a layer of critical infrastructure for how the Internet works. So, it’s not surprising that IT teams allow DNS’s port 53 to be wide open across all networks and systems. According to our survey, 75% of security practitioners do not filter DNS traffic for malicious Internet connections. And it’s rare that DNS activity is used during incident response. This is surprising given that 97% of advanced malware use DNS as part of the attack.

This DNS blind spot has become a hot topic for many security vendors and security practitioners. As the pioneer in DNS-based security, join OpenDNS CTO, Dan Hubbard, as he explains why it’s critical to monitor DNS and examine it in forensic investigations.

In this webinar, you will:

  • See why nearly every Internet connection over TCP/IP, including connections initiated by malware, starts with a DNS request.
  • Learn how DNS, together with other data sources, reveals where on the Internet attacks were launched in the past and where malicious infrastructures are staged for future attacks.
  • Find out how the majority of attacks today can be prevented or contained using DNS.
How to Speed Up Detection of Advanced Attacks
Date: Dec 03, 2014

View archived webinar

Enterprise cyber security breaches often take weeks or months to identify and remediate, causing untold damage to company data. In this special webcast, top cyber forensics experts discuss the methods you can use to find compromises faster, analyze their impact more effectively, and limit the damage they may cause.

Attend this webinar to learn how to:

  • Determine how cyber attackers obfuscate their attacks to make them difficult to detect
  • Recognize information and patterns in existing logs and security data to help identify an attack
  • Uncover best practices for shortening the time period between detection of an attack and remediation of cyber defenses
  • Gain a better understanding of how to use existing security tools and systems to improve incident response times

Register for this webinar to learn how to better recognize sophisticated attacks and more swiftly respond to them, potentially limiting the damage caused by a cyber attack.

Point of Sales System: Architecture and Security
Date: Dec 02, 2014

View archived webinar

To most people, Point of Sale (POS) systems with integrated payment processing are a black box where magic happens. Financial criminals breach hundreds of merchants each year, displaying a better understanding of how these systems operate than the dealer technicians that install and maintain them. With an understanding of POS architecture, integrated payment processing, and weaknesses in the technology, security professionals can better protect local businesses, major retailers, and developers handling payment card information.

Attend this webinar to:

  • Understand how opportunistic attackers breach small businesses and highly skilled targeted attackers bypass multiple layers of defense at large businesses.
  • Fill in your knowledge gap on point of sale systems and the flow of sensitive card data.
  • Dispel common misconceptions on payment security, attacker methodology, and how to see through security vendor hype.
  • Learn effective and efficient risk mitigation strategies for both opportunistic and targeted attackers.

Register for this webinar to learn why detection and response is paramount to a successful defensive strategy.

How to Best Fight Today’s Threats with Next-Gen Threat Response
Date: Nov 20, 2014

View archived webinar

While many organizations understand that today's advanced threats require purpose-built solutions to detect and stop them, the need to complement next-generation threat detection with next-generation incident response capabilities seems to be less well-understood. Instead, organizations try to carry out incident response with outdated manual processes, resulting in high costs from inefficient operations and unresolved incidents.

Attend this webinar to learn how to:

  • Understand what a typical advanced threat looks like and how to detect it
  • Protect your organization against the next generation of rapidly evolving advanced threats
  • Investigate, verify, prioritize and contain security incidents faster and more efficiently

Register for this webinar to learn how an optimized and streamlined approach accelerates incident response time by up to 20X.

Stay Ahead of the Adversary with Network Security Analytics
Date: Nov 19, 2014

View archived webinar

Threat actors often modify their tactics, but their techniques have a longer lifecycle. With network security analytics you can track events over time, empowering you to stay one step ahead of the adversary.

Attend this webinar to learn how to:

  • Establish the benefits of capturing rich metadata
  • Proactively hunt your adversary with network security analytics
  • Utilize network security analytics to solve current industry-wide problems

Register for this webinar to learn how to use network security analytics to stay ahead of the adversary and protect your corporate sensitive data, intellectual property and sensitive information.

Customer Identity: How to Take A Strategic Approach
Date: Nov 13, 2014

View archived webinar

Customer-focused companies strive to make their content available to an ever-growing number of connected users and devices on a much larger scale than ever before. Fortunately, a new consumer-facing solution is gaining currency and has earned a name unto itself: Identity Relationship Management.

Attend this webinar to learn how to:

  • Seamlessly connect customers, devices & things
  • Build relationships
  • Enhance brand equity & grow revenue

Register for this webinar to learn more about the current digital landscape and the business requirements necessary to stay ahead the curve.

How to Take the Complexity out of Compliance
Date: Oct 30, 2014

View archived webinar

Mainframes are well-known for hosting mission-critical corporate information and production applications for many financial, healthcare, government and retail companies that require highly secure systems and regulatory compliance. Demonstrating compliance for your industry can be complex and failure to comply can result in vulnerabilities, audit failures, loss of reputation, security breaches, and even system shut down. How can you simplify enforcement of security policy and best practices? How can you automate security monitoring, threat detection, remediation and compliance reporting? How can you demonstrate governance, risk and compliance on your mainframe?

Attend this webinar to learn how to:

  • Collect and integrate security-relevant events
  • Automate audit analysis to detect potential threats and remediate risks
  • Demonstrate compliance for Sarbanes-Oxley Act (SOX), Payment Card, Industry Data Security Standard (PCI DSS) and Security TechnicalImplementation Guide (STIG).

Register for this webinar to learn how to extend your modern mainframe to help comply with industry regulations, reduce costs and protect your enterprise, while supporting cloud, mobile, social and big data environments.

How to Secure Your AWS Cloud
Date: Oct 28, 2014

View archived webinar

With AWS cloud adoption rapidly growing, you need to make securing your cloud a priority. A breach in security not only endangers your internal network, but can also put your customers’ data in jeopardy. Learn how to build on the AWS security model to protect your data and applications.

Attend this webinar to learn more about:

  • The latest cloud security threat trends
  • Cloud security best practices
  • Leveraging automation

Register for this webinar to learn more about the key steps to securing your AWS Environment.

Card Trends and Payments Fraud in 2014: What You Need to Know
Date: Oct 23, 2014

View archived webinar

With the pressure to adopt EMV in the U.S., the increase in mobile transactions, and growth in alternative payments such as digital wallets, the payments industry is at a crossroad of change. In 2014, one out of every four transactions is conducted on a mobile device. Alternative payments for e-commerce are expected to grow to a $90 billion market by 2017, according to Forrester Research.

Attend this webinar to learn:

  • The latest in EMV adoption and effects of card-not-present fraud
  • How cybercriminals are reacting to emerging market trends
  • Best practices for managing fraud risk

Register for this webinar to learn about the current state of affairs – and the future of cybercrime and fraud – in the payments industry. 

Register for Dark Reading Newsletters
White Papers
Current Issue
Dark Reading Tech Digest September 7, 2015
Some security flaws go beyond simple app vulnerabilities. Have you checked for these?
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-09
Simple Streams (simplestreams) does not properly verify the GPG signatures of disk image files, which allows remote mirror servers to spoof disk images and have unspecified other impact via a 403 (aka Forbidden) response.

Published: 2015-10-09
The Telephony component in Apple OS X before 10.11, when the Continuity feature is enabled, allows local users to bypass intended telephone-call restrictions via unspecified vectors.

Published: 2015-10-09
IcedTea-Web before 1.5.3 and 1.6.x before 1.6.1 does not properly sanitize applet URLs, which allows remote attackers to inject applets into the .appletTrustSettings configuration file and bypass user approval to execute the applet via a crafted web page, possibly related to line breaks.

Published: 2015-10-09
IcedTea-Web before 1.5.3 and 1.6.x before 1.6.1 does not properly determine the origin of unsigned applets, which allows remote attackers to bypass the approval process or trick users into approving applet execution via a crafted web page.

Published: 2015-10-09
The Safari Extensions implementation in Apple Safari before 9 does not require user confirmation before replacing an installed extension, which has unspecified impact and attack vectors.

Dark Reading Radio
Archived Dark Reading Radio
What can the information security industry do to solve the IoT security problem? Learn more and join the conversation on the next episode of Dark Reading Radio.