Webinar Archives
Upcoming Webinars
How to Build and Maintain an Effective Cyberthreat-Hunting Team
Date: Dec 07, 2016

View archived webinar

As online attackers and exploits get more sophisticated, many enterprises are discovering that more traditional, passive methods of detecting cyberthreats arent working as well as they used to. To help find and eradicate sophisticated threats more quickly, enterprises are building threat hunting programs to actively analyze internal telemetry and external threat intelligence data, and to better prevent the compromise of critical business data.


What goes into building and maintaining a threat hunting program? And how can a security operations team change traditionally passive forensics processes to become more proactive and immediate?

In this webinar, top security experts will give you:

  • Methods used to create threat hunting programs
  • Ways to staff and resource these programs
  • New tools to help identify and root out sophisticated attackers including those that can go beyond traditional, first-line incident response

 

Taking the Mystery out of Ransomware
Date: Dec 07, 2016

View archived webinar

Lost data. Systems locked down. Whole companies coming to a grinding halt. When it comes to ransomware, the damage it can do to your company is immense. Many companies are perplexed by ransomware and don’t know how to best protect themselves – but there’s no reason to remain in the dark.

Join us for this informative webinar presented by Michael Mimoso from Kaspersky Lab’s GReAT team as we take the mystery out of this growing threat. We’ll shine a light on the most common tactics cybercriminals use to infiltrate an organization and the concrete steps you can take to protect your company.

Attend this webinar and you will:

  • Understand how ransomware works
  • Learn common tactics that cybercriminals use to infiltrate an organization
  • Get concrete steps to protect your company from ransomware
7 Bug Bounty Myths: Busted
Date: Dec 07, 2016

View archived webinar

Despite thousands of large and small organizations running bug bounty programs, there is still a lot of fear and uncertainty about these in the cybersecurity community. In this webinar we will explore 7 myths about Bug Bounty programs, the hackers who are involved, and the impact they are having on the security posture of organizations around the world.

When you attend this webinar you will:

  • Learn if a bug bounty program is right for your organization
  • Understand if a bug bounty encourages hackers to attack your systems
  • Explore the real benefits of bug bounty programs – and find out if they actually work
  • Get insight on whether these programs are too hard and costly to manage
How Automation Can Dramatically Improve your Security Response Program
Date: Dec 06, 2016

View archived webinar

Automation in Security. Most enterprises talk about it – but are they really doing it? And if so, where does good automation end? Tools that enable automatic blocking or isolate a compromised system can inadvertently take down critical business applications. However, there are security tasks that can be safely automated, giving back time to security teams – without putting systems or jobs at risk.

Attend this webinar and you will:

  • Learn why automation is critical for efficient enterprise security response
  • Explore practical approaches to no-risk automation
  • Find out which repetitive, but necessary tasks can be automated easily
  • Get the steps you need to start using automation in your security program
Secure Your Organization against Phishing Attacks
Date: Dec 06, 2016

View archived webinar

Most major cyberattacks on enterprises begin with a social engineering attack, in which an employee is fooled into downloading malware or giving up online credentials. These attacks often come as realistic-looking phishing emails that purport to be from a colleague or trustworthy source.

To prevent these attacks, you need to know who attackers are looking for inside your organization, how they choose their phishing victims, and what methods they use.

Attend this webinar and you will:

  • Learn about the most common attacks
  • Understand the goals and process of the phishing attacker
  • Explore the potential impact of a phishing compromise
  • Get expert recommendations on how to minimize the impact of phishing attacks
  • Walk away with best practices on how to secure your organization
Containerized Applications Changing Security Landscape
Date: Dec 01, 2016

View archived webinar

Traditionally, application developers' security focus has been limited to static code analysis and fuzzing techniques. Today's reality is that secure application deployment principles must extend from the infrastructure layer through the application and include how the application is deployed.
 
With continuous deployment of micro-services and Docker containers becoming mainstream, it’s imperative that security initiatives include security scanning and monitoring. Increasingly, known open source vulnerabilities have been the "way in" for attackers. This is a major concern for organizations worldwide at a time when exploits of open source vulnerabilities are proving both costly and embarrassing.

Attend this webinar and you will:

  • Find out how security scanning and monitoring can help keep attackers out of your applications
  • Walk away with an up-close view on the attacker mind-set
  • Get an understanding of how vulnerabilities increase risk of attack
  • Learn which infrastructure elements minimize risk
  • Understand the role of SAST/DAST and vulnerability management in decreasing the impact of a compromise
The 5 Keys for Dealing with an Email-Borne Ransomware Attack
Date: Nov 30, 2016

View archived webinar

Email-borne ransomware attacks are on the rise. An average of +4,000 ransomware incidents have occurred daily since the start of 2016*. What should you do if your organization is hit by ransomware? The key is to have a plan before it happens because the bad guys wont give you much time to react.

Attend this webinar and you will:

  • Get the 5 keys you need for your ransomware response plan
  • Learn how to minimize the chances of a successful attack
  • Know how to continue operating during an attack and how to recover quickly
  • Find out who should make the business decisions on what to do when an attack occurs

* How to Protect Your Networks from Ransomware, US Government interagency technical guidance document, https://www.justice.gov/criminal-ccips/file/872771/download

Resilient Security Monitoring: One Step at a Time
Date: Nov 17, 2016

View archived webinar

Your security architecture was designed to protect your business, but does it have the resiliency to deliver results in the event something doesn’t go as planned? Can you maintain network availability and full security inspection during component outages and planned upgrades, or recover instantly from catastrophic failures? Resiliency is attainable – even on a budget – when you take it step by step.

Attend this webinar and you will:

  • Get techniques to increase the resiliency of your security fabric
  • Find out how to eliminate downtime during regular maintenance
  • Learn what you can do to prevent dropped packets from impacting your security posture
  • Discover how to achieve cost-effective high availability to further protect your business
Simplify Security and Management of Office 365
Date: Nov 17, 2016

View archived webinar

If your organization is moving to Office 365, youre facing the challenge of dealing with identity management and end users accessing Office applications and corporate data from potentially insecure devices. Yet these challenges in endpoint security can be managed by simplifying the Office 365 deployment and implementing secure controls to protect sensitive information.

Attend this webinar on November 17th and you will:

  • Learn how to enable secure access to email and content from any device including unmanaged devices
  • Find ways for end users to get a simple experience when accessing Office 365 apps
  • Get an in-depth understanding of IT capabilities such as conditional access and data leakage protection
  • Review best practices to easily enable your mobile workforce and BYO efforts
  • See how Workspace ONE enables IT to streamline the migration to Office 365
How to Get Cloud Security into Your Budget
Date: Nov 16, 2016

View archived webinar

If you’ve made the move to the cloud, you’re facing new security risks – and you may not have budgeted for a solution that will secure your entire cloud footprint. In order to secure all of your cloud services, you and your team must make a bulletproof business case to include cloud security in your budget.

Attend this informative webinar and you will:

  • Get new ways to align cloud security spending with business objectives
  • Discover how to demonstrate savings in cyber security expertise through automation
  • Learn how to demonstrate the financial exposure of not having a Cloud Access Security Broker (CASB)
  • See how Levi Strauss & Co. successfully made the case for a CASB
Re-Thinking Your Enterprise IT Security Strategy
Date: Nov 15, 2016

View archived webinar

Each year, enterprises spend more money than they have ever spent before on cybersecurity, yet the number of businesses breached -and the number of records lost-continues to grow. Whats wrong with our current enterprise IT security thinking? More importantly, how can we re-shape that thinking to develop better cybersecurity strategies, tactics and technologies?

AGENDA


Keynote
: 11:00 AM 11:45 AM ET

Re-Thinking The Philosophy Of Enterprise Security
Not so many years ago, IT departments believed they could build a secure perimeter and defend it with technology, teach users to embrace and use sophisticated endpoint technology, and develop a layered defense that would stop even the most determined attacker. Today, many of these beliefs are changing. In this eye-opening keynote presentation, a top security visionary explains why these fundamentals no longer apply and offers some new thinking around enterprise defense.

Keynote: 12:15 PM 1:00 PM ET
Why Security Departments Fail (And What You Can Do About It)
Why do enterprise security technologies and practices fail? Is it the technology thats failing, or is it people and processes? Most importantly, what can IT organizations do to change this trend? What tools and practices should they keep and which ones should they get rid of? One of the industrys leading security thinkers offers some practical advice.

Keynote: 1:30 PM 2:15 PM ET
Preparing A Next-Generation IT Security Strategy
One of the main reasons why information security is so hard to achieve today is that IT itself is changing so rapidly. How can IT organizations build a security strategy that works when so much of the computing environment is outside their span of control? How can security departments implement technologies and practices that will work not only in todays IT environment, but in tomorrows dynamic, multi-dimensional computing world as well? A forward-looking security expert offers some insight on how to develop a futureproof enterprise IT security plan.

Panel: 2:45 PM 3:30 PM ET
How To Build And Maintain A Comprehensive Enterprise Security Architecture
When it comes to security, todays IT organization spends most of its time finding breaches and vulnerabilities and remediating them before the bad guys can find them. But wouldnt it be more efficient to develop a comprehensive set of tools, practices, and processes a security architecture that could provide the basic building blocks of enterprise defense? Top security experts discuss ways that IT organizations can reduce the daily panic by implementing a more well-considered, comprehensive line of defense.

Panel: 3:45 PM 4:30 PM ET
The Future Of The Online Threat
In order to develop a more comprehensive, futureproof IT security strategy, its important to know threats are evolving. Where will cybercrime be in three years? In five? What new exploits will attackers be using and what vulnerabilities will they be seeking? In this provocative panel, forward-thinking security experts will offer a glimpse of the future of online attacks and how your organization can prepare today for tomorrows new exploits.

Spearphishing, Whaling, and Other Targeted Social Engineering Attacks On Your Users
Date: Nov 10, 2016

View archived webinar

Most major enterprise data breaches begin with an attempt to fool a single user on your network. Whether they are targeting top executives, financial decision makers, or IT people who maintain passwords and credentials, todays cyberattackers often are going after specific individuals in your organization. And as the holiday shopping season begins, these attacks on individuals may become easier and more frequent.
 
In this eye-opening webinar, top experts on phishing and social engineering will discuss the motives and methods that attackers use to execute these targeted spearphishing attacks. Youll get insight on how the attackers choose their social engineering targets, the methods they use to find out about those individuals, and the exploits they execute to fool specific users into giving up sensitive information. Youll also get recommendations on how to prevent this early reconnaissance, as well as the attacks themselves, and how to train your users to recognize an attack before it creates a compromise.

Malware: New Threats and Trends
Date: Nov 09, 2016

View archived webinar

The malware hitting today’s enterprises is very different from the malware they were fighting a year ago. New methods of disguise, new types of behavior, and new methods of automated malware generation mean that every day, most organizations are facing malware that is more effective, in forms that they have never seen before, in volumes that are overwhelming to current defenses. How can enterprises detect and eradicate these new threats?
 
In this fascinating webinar, top malware experts discuss the latest developments in malware, including new methods of obfuscation, polymorphism, and ransomware. You’ll get a look at how the most current malware behaves, and how it adapts to the environment it infects. Best of all, you’ll get insight on how to detect the latest exploits, and how to build up your anti-malware defenses to help mitigate the effects of new attacks.

Outsmart Ransomware Attacks with the Right Protection Strategy
Date: Nov 03, 2016

View archived webinar

No longer content to just steal data, criminals are deploying ransomware everywhere and holding businesses hostage on a daily basis. To minimize the fallout of an eventual attack, Security and IT teams need to think and respond differently, and Boards and the C-Suite must understand the real risk of these threats. By doing so you can choose the right protection strategy to help your organization outsmart ransomware attacks.

Attend this webinar and you will:

  • Find out what’s different about the latest crop of Ransomware and Extortionware cases
  • See how IT Risk teams are approaching the problem
  • Explore regulatory environment recommendations and gain perspective on how these can quickly move to regulatory requirements
  • Discover what you can do to protect your environment and prevent attackers from achieving their objectives
  • Get remediation best practices and what you can do to recover from an attack
  • Learn about the concept of an Isolated Recovery vault in combination with an “air gap” as an ultimate layer of protection for your data
Mythbusting the Hackers Playbook
Date: Nov 01, 2016

View archived webinar

Exactly how hard is it to attack an organization? What types of breach methods are most effective? What critical errors are security defenders making when securing their organization? In order to defend yourself, you’ll need to understand how attackers view you and your enterprise.

When you join us for this exclusive webinar you will:

  • Get best practices to stay several steps ahead of your attacker
  • Discover common errors made by IT security teams
  • Learn successful infiltration, lateral movement and exfiltration methods of defense
  • Get insights from the Hacker’s Playbook (which incorporated the analysis of more than 3,985,011 breach methods executed in enterprise deployments)
  • Get a chance to “play the hacker”
  • Mythbust common assumptions on security in the enterprise
How Bad Breaches Happen to Good Companies
Date: Oct 27, 2016

View archived webinar

Nearly every day, a major data security breach is disclosed or appears in news headlines. But these breaches don’t just happen – they are often a product of weeks or months of reconnaissance, planning, and social engineering. But how do attackers conduct this research and planning?  And how can organizations disrupt the process – and prevent breaches before they start?
 
In this comprehensive webcast, top security experts will join with Dark Reading editors to discuss how breaches begin – and what you can do to stop them. You’ll get a look at new Dark Reading research that reveals the latest trends in data breaches and how companies respond to them. You’ll get insight on how attackers choose their targets, and how they research and test those targets before they launch an exploit. And you’ll get recommendations on how your organization can interrupt the attack chain – and potentially stop a breach from occurring in the first place.

How to Survive a Data Breach
Date: Oct 25, 2016

View archived webinar

Data breaches happen more frequently than we think and the aftermath can be disastrous with many companies suffering losses and reputational damage. What you do after a breach is critical. Join us for this comprehensive webinar where well discuss exactly what your team needs to do in the event of a breach.

Attend this webinar and you will learn:

  • What to do as soon as you detect a breach
  • Who your breach team should consist of and how to assemble them
  • What time sensitive artifacts you should be collecting
  • How to monitor the breach and stop the bleeding
  • How to get back to normal operations
Cybersecurity: How to Win the Big Game
Date: Oct 20, 2016

View archived webinar
All winning teams start with a game plan. When youre captain of your IT team  you need to make acybersecurity game plan to protect against advanced threats. Schools are prime examples of targetsfor evolving threats. With tight budgets, wide open campuses, and diverse endpoints  its nowonder attacks on schools, like ransomware, have multiplied in recent months. Despite thechallenges, its up to IT and security professionals to gain a clear understanding of their securitythreats and create a winning game plan for their team. 

Whether youre an IT security professional working for an organization or an educational institution,attend this webinar to see what schools are doing to protect against cyberthreats and discover gamechangers you can bring to your team to create a winning cybersecurity game plan.

Attend this webinar and you will:
  • Learn solutions to prevent and remove threats
  • Identify the key security threats IT teams face
  • Get insight and advice from those who have addressed cybersecurity challenges
  • Walk away with a game plan on how to win back control of your endpoints
Attend this webinar and if youre going to EDUCAUSE 2016 stop by the Malwarebytes booth to getyour golden ticket to the big game (a lifetime personal copy of Malwarebytes).
Security For the Internet of Things The Missing Link
Date: Oct 19, 2016

View archived webinar

Whether your business makes connected cars, uses connected medical devices, or employs any other "Internet-enabled" technology, you could be a target for online attackers. As the Internet of Things becomes a broader reality in business, IT and security professionals are being challenged to find ways to secure Internet-enabled technology in all types of non-computer devices.
 
How can Information Security and DevOps  develop and manage an effective security strategy for technology? Join IoT security expert John Pironti to discover the five key ways you can make your IoT-connected devices less risky and more secure.

  • Discuss the most effective approaches to securing Internet-enabled systems
  • Get advice on monitoring and protecting next-generation IoT technology
  • Establish a collaborative approach between business and IT for protecting IoT devices
  • Learn ways to automate and manage your expansive Internet-enabled network
Fooling The Hacker: What Your Enterprise Can Learn
Date: Oct 18, 2016

View archived webinar

Enterprises spend most of their time avoiding deception and exploits from online attackers. But what happens when the tables are turned?

Many are improving their cyber defenses by using “honeypots” and other deceptive techniques to go on the offensive against hackers, gaining insight on their methods before they can do damage to enterprise data.

Join us for this eye-opening webinar, where you’ll:

  • Get insights on how to use offensive techniques like “honeypots” to learn more about your attackers
  • Develop new, more effective methods for defending your data
  • Get tips on how and when to employ offensive strategies
  • Learn how these strategies can help your enterprise to develop more efficient security practices
Identifying and Remediating Vulnerabilities Hiding In Your Applications
Date: Oct 13, 2016

View archived webinar

Fixing vulnerabilities isn’t just a job for your in-house development team and the giants of Silicon Valley. It’s a job for all the developers of the third-party software components embedded in countless applications and services – from open-source, to commercial off-the-shelf, to custom.

So, when there’s a vulnerability in one of those libraries, languages, or frameworks – it could be lurking in scores of your applications…do you know which ones? And how do you identify the affected systems, remediate the problem, and secure your company?

Attend this webinar on October 13th and you will:

  • Learn more about different types of vulnerabilities that may affect your application, including component vulnerabilities
  • Understand the most common third-party components, the vulnerabilities that have affected them, and how long it’s taken to fix them
  • Explore ways to make a more effective inventory of all your software – and the components inside that software
  • Get plans for remediating the vulnerabilities within your software, regardless of whether it’s open-source, commercial, or home-grown
Building and Instrumenting the Next-Generation Security Operations Center
Date: Oct 11, 2016

View archived webinar

To handle the skyrocketing volume of malware and cyber exploits that hit them each day, many enterprises are building security operations centers (SOCs) that provide a central place for detecting, diagnosing, and remediating online attacks. But thanks to the development of new capabilities and technologies, today’s SOC looks very different than those that were built even a few years ago. In this webcast, top experts on building and managing security operations centers will discuss best practices for building and staffing today’s SOC, as well as some of the essential tools needed to make the SOC effective.

Social Media Fraud: Uncovering Targets, Tactics and Trends for Cybercrime on Social Media
Date: Oct 06, 2016

View archived webinar

Social media has taken the world by storm. The number of social media users is expected to grow to a third of Earth’s population by 2018. Organizations are preparing to utilize this opportunity – and are expected to spend 21% of their marketing budgets on social media in the next 5 years.

Unfortunately, cybercriminals are creating fraudulent accounts to masquerade as corporate brands and defraud unsuspecting fans. In order to stay protected, you’ll need to understand how social media threats can impact your organization.

Attend this interactive webinar and you will:

  • Get top motives and methods that fraudsters are using today
  • Know the types of fraudulent accounts used to target your organization
  • Understand how to best protect your social presence from security risks
  • Explore the tools, resources and strategies necessary to stay protected
Making IT Security Part Of Your Business Culture
Date: Oct 04, 2016

View archived webinar

Your enterprise may have an IT security awareness program, but is it really working? Do your end users understand the threats posed by online attackers?  Are you confident your users can spot a potential security threat and that they will report it if they do?

Join us for this webinar as top speakers on social engineering and security awareness discuss how to increase IT Security for your enterprise. Attend and you will:

  • Understand how to raise consciousness about IT security across your enterprise
  • Discover unique ways your organization can educate users on security threats and appropriate responses
  • Learn to build effective programs that can enable employees to be aware and willing to report potential threats
  • Go beyond basic classes to truly change the thinking in your organization so employees and executives become more aware of IT security

 

What Enterprises Can Learn From the Deep Web and the Dark Web
Date: Sep 29, 2016

View archived webinar

You never know when attackers will strike or what data they will be targeting. The unknown is what makes IT security such a challenge for enterprises. To combat this, security researchers have started studying the behaviour, activity and virtual lair where the bad guys lurk the Deep Web and the Dark Web to gain insight that can improve enterprise defenses.

Join us for this eye-opening webinar, along with experts on the Deep Web and the Dark Web, and you will:

  • Learn how these specialized and anonymized environments work
  • Know the types of data they contain
  • Understand how cyber criminals might use this data to attack an enterprise
  • Get insight on how you can use search tools and other technologies to spot trends in online exploits
  • Learn how to find information on your own organization that might be available to attackers
How to Do More with Less for a Better Incident Response
Date: Sep 28, 2016

View archived webinar

A shortage of skilled security staff, and criminals finding new ways to infiltrate corporate networks, is causing security alert fatigue at many organizations. Too many alerts and too few staff members to give all of these potential infiltrations the attention they deserve is resulting in staff cutting corners - at times processing only 5% to 10% of security alerts - in an attempt to keep up.

In this webinar on September 28th, Duane Kuroda will shine a light on this problem and provide best practices to help you take charge. Results of a just-completed survey of your peers about the state of the problem will be shared, as well as actionable tips and tricks, to help you begin to gain control of your incident response process and keep you secured against advanced threats.

Join us to help your security operations team learn:

  • How security alert fatigue impacts them
  • Techniques to apply intelligence and slash investigation time by 50% or more
  • How to contain user or system threats faster
  • Ways to reduce exposure and risk, to deliver more security using existing staff

 

How To Effectively Analyze Threat Intelligence Data
Date: Sep 28, 2016

View archived webinar

Today’s enterprises have a wide variety of threat intelligence available to them: threat feeds, internal security event information, CERT and other vulnerability reporting sites. How can you correlate this information to identify sophisticated cyberattacks? What processes can you use to ferret out the relevant threat data and stop the most complex exploits before they result in a data breach?
 
In this in-depth webinar on September 28th, top security experts will:

  • Outline a wide range of tips and best practices for analyzing threat information
  • Identify the red flags that might indicate a compromise of your enterprise

Attend and you will:

  • Get insight on how to filter out the most relevant threat data
  • Learn how to correlate that data with other indicators of compromise
  • Learn how to pinpoint an attack quickly – before your critical data is breached
Outsmart Hackers with Deep Learning Artificial Intelligence (AI)
Date: Sep 27, 2016

View archived webinar

Attend to learn about the first application of deep learning artificial intelligence to cybersecurity!

Deep learning, a novel branch of AI, is inspired by the brain’s ability to learn. Once a brain learns to identify an object, its identification becomes second nature. As a deep learning-based artificial brain learns to detect any type of cyber threat, its prediction capabilities become instinctive. As a result, the most evasive and unknown cyber-attacks are immediately detected and prevented.

Dr. Eli David, one of the leading global experts on deep learning, will present the ground-breaking results exhibited by deep learning when applied to computer vision, speech, text understanding - and for the first time to cybersecurity.

Join us on September 27th to:

  • Learn how AI evolved from old rule-based systems to state-of-the art deep learning
  • Understand key differences between machine learning and deep learning
  • Discover the unprecedented results exhibited by applying deep learning in various domains
  • Hear background on the first application of deep learning AI to cybersecurity
  • Learn how deep learning enables real-time prediction of unknown threats with unmatched accuracy
Choosing The Right Data Encryption Strategy For Your Enterprise
Date: Sep 22, 2016

View archived webinar

As more and more enterprises fall victim to cyber breaches, many IT security experts say that data encryption is the best solution to protecting critical data. But whats the right encryption strategy for your organization? There are a broad range of choices, and making the wrong one could affect network performance and administrative complexity as well as the security of your data.

In this comprehensive webinar, top security experts will discuss critical issues in choosing an encryption strategy. 

Join us for this webinar and you will:

  • Get answers to your data protection questions such as whether to do full-disk encryption or file encryption.
  • Find out which encryption standards to use
  • Learn how and when to do encryption for data in motion as well as data at rest
  • Know how to manage encryption keys in your IT environment
  • Get a list of key questions to address when developing an encryption strategy
  • Gain a general understanding of the tools and technologies currently available to protect your critical data
How to Develop an Effective Ransomware Defense Strategy
Date: Sep 20, 2016

View archived webinar

Online criminals have recently ramped up attacks via ransomware, in which critical business data is encrypted by an outsider and then held hostage until a payment is rendered. To mitigate the impact of a ransomware attack, enterprises of all sizes must develop an effective defense plan.

In this comprehensive webcast, industry experts will discuss how your organization can build defenses that will help you prevent being infected by ransomware in the first place. The experts will also describe scenarios and give insight to help you decide what action you should take when facing an attack.

Attend this webinar on September 20 and you will:

  • Get expert advice on how to handle ransomware before, during, and after an attack
  • Understand how to assess an attack and whether or not to pay the ransom
  • Learn how to prevent criminals from re-using their attack against you in the future
Decoding Ransomware: How to Reduce Your Risk of Attack
Date: Sep 14, 2016

View archived webinar

2016 has been the year of ransomware.  According to the FBI, theres an average of 4,000 ransomware attacks per day since January. Numerous organizations have been forced to pay ransoms to regain access to critical files and systems. But ransomware attacks are not a new phenomenon; why are they booming now? 

Simply put, ransomware works. Everyone is dependent on the online world. That access makes all of us potential targets for ransomware. Attackers will target anything (and anyone) with access to data that can be monetized - no one is immune.

Join Rick McElroy and Ryan Nolette of Carbon Black, along with the senior director of security operations at a fortune 500 oil and gas company to learn:

  • How ransomware works.
  • What makes everyone a target.
  • The anatomy of Locky and a shadow copy attack.
  • What you can do today to minimize the ransomware risk to your organization. 
How to Build a World-Class Network Defense Organization
Date: Sep 08, 2016

View archived webinar

Join us on September 8th for a webinar where Leidos cybersecurity experts will share practical, real-world tips on tackling the top three myths encountered while working with fortune 500 cyber teams. You will leave with clear direction on how to apply lessons learned from the anecdotes shared, to build your world-class network defense organization. Attend and you will:

  • Discover the three stages of cybersecurity risk awareness
  • Hear the two most important questions organizations should be asking relating to Cybersecurity
  • Experience what a typical response to a major cybersecurity incident looks like
  • Learn the three pitfalls and three associated myths and misconceptions regarding network defense, leading to a false sense of cybersecurity
  • Get steps to selecting a cybersecurity framework and rolling it out amongst the organization
  • See an example of a campaign heatmap; used to maximize whats learned from previous events
  • Get a list of consistent attributes for sourcing and retaining top-echelon cybersecurity talent

and more!

How to Build a Successful Insider Threat Team
Date: Sep 07, 2016

View archived webinar

You may think of insider threats as just another security problem, but youd be wrong. In fact, under NISPOM Conforming Change 2, all federal government contractors will be required to have an insider threat program in place by Nov 1, 2016. Thats because the federal government, along with many Fortune 500 companies, realizes that insidersemployees, contractors and partnersknow your business better than any outside attacker ever could. They are trusted with access to sensitive information and assets, which, if mishandled, can cause major security breaches and result in serious harm to your organization.

To make matters worse, because insiders are your teammates, you can't run the risk of mistakenly accusing an insider of wrongdoing or letting the details of an investigation leak out to other employees. Thats why organizations need a great insider threat team in place. But what goes into creating that great insider threat team and where do you even start? 

Join us for this enlightening webinar where guest speaker and Forrester analyst Joseph Blankenship will give you insights into:

  • What to consider when building your insider threat team
  • How to run an insider threat program
  • Why insider threat teams need to analyze both structured and unstructured data
  • How to ensure employee privacy while also protecting your organization

We look forward to seeing you there!

API vs. Proxy: Understanding How To Get the Best Protection From Your Cloud Access Security Broker (CASB)
Date: Aug 31, 2016

View archived webinar

Join us on August 31st and you will learn the pros and cons of API and Proxy-based Cloud Application Security Brokers so you can choose the right option for your enterprise. You will also get answers to the following questions:

  • Which one will enable me to secure unmanaged traffic?
  • Which one will enable me to maintain network performance?
  • How can I protect Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS) against threats in the cloud?

This webinar is perfect for those under pressure to secure cloud infrastructure in an era when theres no longer an identifiable network perimeterWhen more than a quarter of 3rd party apps connected to corporate environments are considered "high-risk.

Youll discover that, while deploying a CASB is one option to help secure your full cloud footprint, not all are created equally. Some use API-mode and others use proxy-mode. Join us to get the information you need to aid you with deciding method you should choose.

Using Threat Intelligence to Stop Cyber Attacks
Date: Aug 30, 2016

View archived webinar

How can enterprises use threat intelligence data to detect and stop attackers more quickly and efficiently? How can security teams identify the relevant threat information and use it to develop a swift defense? What specific threat information is needed, and how can enterprises use it to stop a particular attacker or exploit?

In this informative webinar on August 30th you will hear security experts discuss practical ways to use threat intelligence from the web to identify the methods used by online attackers and to ferret out sophisticated attacks that wouldnt be recognized by traditional information security defenses.

You will also:

  • Learn how to integrate threat intelligence into your current practices for enterprise data defense and incident response
  • Gain specific advice on how you can use real-time threat intelligence to fight new attacks targeted at your enterprise
A Multilayered Defense for Securing Your Enterprises Digital Workspace
Date: Aug 25, 2016

View archived webinar

Client computing is increasingly providing a back door into the enterprise for the compromise and infiltrating of sensitive or valuable information, including patient and customer data, and intellectual property.  A holistic security approach that provides real-time, dynamic, and intelligent controls that extend contextual policy from client devices to the datacentre is an enterprise’s best defense. 

Attend this webinar to learn how to deliver a defense-in-depth approach that improves overall security posture, while ensuring the best user experience possible. You will also get:

  • An Understanding of the State of Security for End User Computing
  • An ‘Anatomy of a Breach’ Example
  • A Holistic Approach Perspective – From Data Center to Device
  • Ways for Securing End User Computing
  • Recommendations as to How to Get Started on Building a Holistic Security Approach
How to make security part of your development process
Date: Aug 18, 2016

View archived webinar

Secure software development doesn’t need to be a conflict between pushy security teams and resistant developers. In this webinar, find out how to enable developers and development teams in making security an easier and more seamless part of the software development lifecycle (SDLC).

Attend this webinar to learn:

  • How to test code for security risks earlier and more often – resulting in safer code while maintaining or improving development cycles.
  • A way to test applications and remediate issues early in the SDLC, with no impact on policy or compliance requirements, so you can deliver secure applications on time.
  • Examples and use cases of how development teams have automated finding and fixing security vulnerabilities as an integrated part of agile and DevOps processes.
  • Sample results and metrics you can expect to find when scanning for vulnerabilities early in the SDLC (i.e., cost reduction, application security risk reduction and more seamless integration between development and security).
  • Ways you can improve efficiency in security testing within your development environment.
Hacker vs. Defender: How Threat Actors Attack Vulnerabilities and How to Defend Against Them
Date: Aug 17, 2016

View archived webinar

When it comes to cyber security, you’ll find there’s no shortage of experts with information as to how to prevent breaches from happening. But what does an impending attack look like from a threat actor’s perspective?

In this enlightening webinar on August 17th you will hear from both sides – hacker vs. defender, exploitation vs. prevention, exfiltration vs. remediation.

Join us and you will get the backgrounds of recent data breaches, plus:

Hear a “threat actor” perspective:

  • How they observe and select the target – the “slow gazelle”
  • Why they select certain targets
  • Their definitions of an opportunistic vs. targeted victim
  • How they complete the kill chain (attack structure)

Hear a “defender” perspective:

  • How they detect and remediate; disrupting the kill chain
  • How they purge any path the threat actor sets up for future access
  • How they apply the security measures to recent data breaches and how these breaches could have been prevented
Protect Yourself from Antivirus
Date: Aug 17, 2016

View archived webinar

Traditional antivirus (AV) is not the solution to breach prevention on the endpoint – it’s the problem. In fact, conventional AV no longer offers any real security value. 

To prevent security breaches, you must protect yourself not only from known and unknown cyber threats, but also from the failures of any traditional AV solutions deployed in your environment.

In this webinar, you’ll learn:

  • Why conventional AV can no longer prevent security breaches
  • Which three factors govern the effectiveness of any security solution
  • What hidden costs your organization will eliminate by replacing AV
  • Which five capabilities the ideal AV-replacement product must possess
  • How Palo Alto Networks customers prevent security breaches without AV
The Power of Retrospection: Find Threats That Have Been Lurking in Your Network
Date: Aug 16, 2016

View archived webinar

Complex threats execute over time and the traditional security solutions model is limited to visibility of the present and immediate past. We should all be demanding tools and solutions that give us the freedom to move along the dimension of time. The ability to look back at your network across time allows you to see security events as they manifest and develop. It gives you a unique perspective to evaluate the seriousness of threats relative to each other. Let's take a look at what your role and day would look like if you could truly see every corner of your network -- real time and retrospectively. A retrospective view provides context and the ability to see today's events with precision and clarity.
 
In this webinar you will:

  • Learn benefits of automated retrospection
  • Get case Study proof points from Fortune 2000 companies
  • See a demo of the unique retrospection capabilities within the ProtectWise Grid
Prioritizing And Responding To Security Threats In Real Time
Date: Aug 16, 2016

View archived webinar

Todays online attackers are developing more sophisticated exploits in higher volumes every day. And more than ever, todays IT security defenders the people who protect critical enterprise data are faced with the conundrum of which threats to respond to first, and how to remediate them quickly. Like firefighters choosing a fire control strategy, todays information security professionals must make the right defense choices, in the right order, or face even greater damage.

When you attend this eye-opening videocast on August 16th you will hear top experts in IT defense:

  • Discuss methods for rapidly filtering, prioritizing, and remediating emerging security threats even when those threats have never been seen before
  • Discuss methods for proactively building a triage process that helps enterprises prioritize threat responses and security tasks, in order to keep critical data as safe as possible
  • Offer advice on how to manage ongoing security practices such as patching and vulnerability scanning in a way that helps prevent new attacks as well as ensuring quick response to compromises
The State of Ransomware: 2016 Survey Finding
Date: Aug 10, 2016

View archived webinar

Ransomware has become one of the biggest cyber security threats in the world, with instances of ransomware in exploit kits increasing about 44% in the last six months. According to FBI statistics, hackers extorted business and institutions for more than $209 million in ransomware payments in the first three months of 2016. The business of ransomware is on pace to be a $1 billion a year crime.

Through an exclusive survey with Osterman Research of more than 500 CIOs, CISOs and IT Directors in the U.S., Canada, Germany and the U.K., Malwarebytes is dedicated to helping businesses prevent ransomware.  Join this webinar and hear directly from Michael Osterman on this research.

Key findings include:

  • Most impacted industries
  • Common attack vectors
  • Overall impact on businesses
How to Use Threat Intelligence to Improve Your Security Operations
Date: Jul 28, 2016

View archived webinar

Over the past year, many enterprises have begun to collect and analyze IT security threat data through a new range of threat intelligence feeds and services. But what should the IT organization do when it uncovers potential threats? How can IT and security organizations quickly digest this threat data and turn it into an operational response? This process of “operationalizing” threat intelligence is the key to getting the most out of this new range of services.

Attend this informative Dark Reading webinar to hear top experts discuss:

  • The new range of threat intelligence services and how enterprises can maximize their effectiveness
  • Ways that enterprises can turn threat intelligence data into real actions, improving response to new threats and increasing the security of the organization
The Rise of Ransomware: Three Critical Steps to Prevent an Infection
Date: Jul 20, 2016

View archived webinar

Ransomware is on the rise. But your organization does not have to become a victim. Automated prevention is certainly achievable.

Join us for this live webinar where you will learn:

  • Which organizations threat actors target most intently with ransomware
  • Which three delivery vectors attackers use in nearly all ransomware infections
  • Why existing endpoint security solutions often fail to prevent ransomware infections
  • Which three steps you must take to successfully prevent an outbreak in your organization
  • What endpoint protection technology capabilities are necessary to automate ransomware prevention
Detecting and Stopping Sophisticated Cyber Attacks In the Small and Medium-Size Enterprise
Date: Jul 19, 2016

View archived webinar

Every day, online attackers are developing new and well-hidden methods for attacking and stealing data from all types and sizes of enterprise. Fortune 100 companies are responding with sophisticated data analytics technology and teams of security analysts – but what about the rest of the world?  How can companies with smaller IT staffs and budgets respond to the latest wave of targeted and complex cyber attacks? 
 
In this informative Dark Reading webcast, top security experts discuss the latest online attacks being leveled at the small and mid-sized business, as well as current trends in malware affecting SMBs. The experts also discuss how enterprises without large security staffs or budgets can respond to these attacks using open source technology, third-party consultants, and emerging security service providers. This webcast will outline an array of options for enterprises that must handle today’s emerging threats while maintaining a shoestring security budget.

The Great Debate: The State of Application Security
Date: Jun 30, 2016

View archived webinar

When you attend this video panel you will hear industry experts engage in a lively debate on various topics related to the current state of application security, including their specific viewpoints on how organizations need to understand and manage the current cyber security landscape and the role that software applications play in this new paradigm. 

Attend and you will hear different perspectives on:

  • How proactive or reactive organizations need to be to protect against data breaches
  • Whether branded vulnerabilities are helping or hurting organizations abilities to protect themselves against cyberattacks
  • How security and development teams should work together to build secure code

And more.

Dark Reading Cyber Security Summit: How Cyber Attackers Crack Your Enterprise
Date: Jun 28, 2016

View archived webinar

The goal of this eye-opening virtual event: know your enemy. By attending the sessions in the virtual auditorium and downloading comprehensive content from a wide range of expert resources, How Cyber Attackers Crack Your Enterprise will enable attendees to learn about online criminals motivations, tactics, and strategies. Attendees will get an up-close and personal look at what the bad guys are doing today and how they can improve your enterprise defenses tomorrow.

AGENDA

Keynote - Cyber Attackers: Motives and Methods 
An expert on the latest methods and exploits in online attack provides an overview of the most current ways that criminals target the business. Youll get insight on how the most sophisticated attackers choose their targets, what they are looking for, and how they extract valuable data from well-defended enterprises and data centers

Keynote - Understanding the Cyber Underworld 
When it comes to stealing your critical business data, it takes a village. Most sophisticated and targeted cyberattacks are not launched by a single individual, but by a whole community of online attackers, each of whom has a specific role to play. In this eye-opening presentation, youll get an inside look at how the cybercrime economy works, how its players interact, and how online data theft is becoming big business

Keynote - Anatomy of an Online Attack 
In order to develop an effective cyber defense, enterprises must first understand how sophisticated attackers do their work. In this fascinating presentation, one of the industrys top penetration testers offers an inside look at how he identifies the vulnerabilities in enterprise defenses -- and how he might exploit those vulnerabilities to steal an organizations most critical data

Panel - Collecting and Using Threat Intelligence Data 
One of the most effective new weapons available to todays enterprise cyber defenders is a wide range of threat intelligence feeds and services that promise to warn businesses of impending online threats. But how do these feeds and services work? How can the security team choose the services that work best for a specific enterprise? And how can threat intelligence data change the way the enterprise defends itself? In this informative panel, top experts offer their insights on how to make threat intelligence work most effectively against todays latest exploits.

Panel - Identifying Your Attacker 
When an enterprise is breached, one of the first things they want to know is who did it and why. But the answers to such questions can be tricky and elusive. In this insightful panel, top experts discuss the methods that your organization can use to figure out who the attacker is, and how to use that information to develop a better enterprise defense. Youll hear a range of opinions on how and whether you should seek to identify your attackers, how you can make the attribution, and how you can and cant respond once youve learned who your attacker might be.

How Cyber Attackers Fool Your Employees And How To Stop Them
Date: Jun 22, 2016

View archived webinar

Protecting your enterprise data is often referred to as a technology issue, but most cyber attacks begin by fooling a user into doing something, such as unknowingly downloading malware or giving up security credentials. This “social engineering” is the most common way that an online attacker will gain access to your business – and the hardest to defend against, because it exploits everyday human weaknesses, rather than technical vulnerabilities.
 
How do attackers fool your employees via email, Web, phone, and onsite? What are some of the latest methods they use to trick users and employees into breaking security policy? And most importantly, what can your organization do to keep its employees from being taken in?  In this informative Dark Reading webcast, top experts on social engineering will answer these questions and many more. You’ll learn about current social engineering methods and the “human” threats posed by online and physical attackers. You’ll also get insight on how your organization can train and test its users and employees to recognize and turn away these social engineering exploits – before they compromise your business.

The Power of Community Defense and Open API Cyber Security
Date: Jun 21, 2016

View archived webinar

In todays threat landscape, the only way for you to disrupt attackers and protect your organization is to unite your systems and people, forming a collective defense. In this roundtable webcast Matthew Deren at Belk, Keith McCammon at Red Canary and Jason McFarland, Senior Open Source Engineer at Carbon Black, will come together to discuss the value of leveraging community defense and open APIs in incident response. 

 
In this webinar youll learn: 
 
  • The role an open ecosystem plays in next-gen endpoint security 
  • How to leverage APIs to share information across systems 
  • Automation, security process orchestration & more
Is Your Enterprise Data Secure - From the Inside Out?
Date: Jun 15, 2016

View archived webinar

Security shouldnt start on the outside. Most security strategies attempt to detect and stop the threat actors at the edge and provide limited security between VLANs and limited hardening and detection capabilities on the host itself two points the threat actors are targeting. Defending the end points is a losing battle. Organizations need to focus on deploying multiple security layers from the inside out and leveraging big data analytics to detect at the host level.

Attend this webinar on June 15th and discover:

  • How battlefield lessons can be applied to cybersecurity layers
  • Why big data is both your friend and foe
  • How to laser in your defense and detection efforts on the data threat actors care about
  • The four steps to implement inside-out security
A human? A bot? Application Firewalls (WAFs) vs. Web Behavior Analytics for Finding The Biggest Threats to Your Web Site
Date: Jun 09, 2016

View archived webinar

This webinar discusses how the biggest problems to your web site aren’t cross-site scripting and SQL injection attacks. The biggest problems are the ones you don’t see; automated bots masquerading as real people browsing through web sites and mobile interfaces.

Traditional web security products directed towards exploits, vulnerabilities and software coding defects don’t look to tell if an automated bot is driving a session meant for people. Only Web Behavior Analytics can determine this.

Attend this webinar for what promises to be a spirited web application security conversation between Eric Ogren, senior security analyst at 451 Research, and Rami Essaid, CEO of Distil Networks.

You will learn:

  • The new threat landscape of Advanced Persistent Bots (APBs)
  • How Web Application Firewalls (WAFs) and Web Behavior Analytics solve different problems
  • The impact bots have on your security results
  • How applied Web Behavior Analytics can protect your business
2016 Underground Hacker Marketplace Its a Good Time to Be a Bad Guy
Date: Jun 09, 2016

View archived webinar

Imagine a marketplace where illegal vendors offer hackers a wide range of goods, tools, and training to enable them to exploit or breach unsuspecting individuals, groups or organizations. Now imagine the walls of this marketplace lined with advertisements offering services and information. The point is, the underground marketplace is booming and only getting bigger, more sophisticated, and competitive.

Register to take a journey with James Bettke, SecureWorks Counter Threat Unit (CTU) researcher, Sean OConnor and Shawn Cozzolino from the SecureWorks CISO Intel team as they walk you through their time spent in the Underground, tracking hackers in numerous forums and marketplaces all over the world.

When you attend this interactive webinar on June 9th, you will walk away with:

  • Notable trends occurring year over year in the underground hacker market 
  • Real examples of goods and services for sale to enable cyber-crime
  • Tips on how to protect data and additional security advice
Meta Data, Big Data and the Coming Tectonic Shift in Security
Date: Jun 02, 2016

View archived webinar

While yesterdays security model was largely based on prevention of breaches, tomorrows security solutions will increasingly focus on detection of breaches from within followed by containment. This is a large shift both in terms of investment dollars and technologies. Focusing on detection of breaches provides an opportunity to reverse the asymmetry between the attacker and defender and shift the odds of success in favor or the defender. However, a detection based strategy requires building context of the organizations operating environment, triangulating bad-like behavior against what is normal-like behavior for an organization and trying to identify anomalies that could lead to the presence of malware in the organization. This requires marrying big data type solutions with SIEM type technologies. In this new world of big data for security, the ability to both, generate relevant and increasingly large volumes of data, as well as consume, correlate, index and alert on that data will require powerful and unique solutions that a defender can leverage as the core of their cyber security strategy.

Join Gigamon in this webinar to understand:

  • Where the world of cyber security is going
  • The role of big data solutions in this changing landscape
  • How the defender need to re-think their cyber security strategy
How to Keep Mobile Threats at Bay
Date: Jun 01, 2016

View archived webinar

As smartphones and tablets become more powerful, securing devices and data is critical for enterprise mobility stakeholders. For instance, over 50% of all decision makers in a recent IDC survey experienced security and compliance issues during mobility rollouts. 

With savvy cybercriminals using vulnerabilities in apps, networks, and operating systems to gain control of mobile devices, businesses need security that integrates with existing systems for continuous protection.

Learn how to better protect your business from mobile threats by attending this webinar on June 1, where you will hear:

  • Why comprehensive mobile security is required to keep your devices and data safe
  • How the cloud helps solutions reduce complexity and increase visibility and control
  • What role Check Point plays in preventing advanced attacks on smartphones and tablets
DNS: Are Security and Complexity Really Mutually Exclusive?
Date: May 26, 2016

View archived webinar

DNS is no longer just about network housekeeping. Instead, DNS data has become absolutely crucial to cyber-security, especially as your IP attack surface becomes larger and more fluidand cyber-criminals get better at evading conventional signature-based detection.

Register now for this insight-packed webinar to:

  • Learn how your peers are evolving their DNS/DDI processes and policies
  • Understand how mobility, cloud, and cybercrime-as-a-service are changing IT security
  • Pose your top IPv6-related questions to subject-matter expertslive and online.

Dont miss this unique opportunity to quickly up your security game. 

 

The Hidden Enemy: Malvertising and Ransomware
Date: May 25, 2016

View archived webinar

Malvertising is increasing in sophistication and prevalence, and often being used to distribute ransomware. According to the FBI, criminals are netting an estimated $325–500 million a year through these scams. But while the FBI is warning of a rise in ransomware, they are at a loss when it comes to how to handle it: “The ransomware is that good,” says Joseph Bonavolonta, the Assistant Special Agent in Charge of the FBI’s CYBER and Counterintelligence Program in its Boston office. “To be honest, we often advise people just to pay the ransom.”

As malvertising-based infections (including ransomware) in businesses increase, questions will arise on who is accountable – ad networks, site owners, or owners of the ad content? If your company is a victim, and the FBI is just advising to pay the ransom, can you begin to seek legal remedy against the ad networks or content owners that were the vector for the infection?

This webinar give the audience a better understanding of the impact of malvertising and ransomware. It will also tackle some of the biggest misconceptions, latest tactics/incidents, how these attacks are delivered and why your company may be at risk without you even knowing it.

Key takeaways include:

  • The growth in malvertising and malvertising-based ransomware.
  • A better understanding of the tactics and techniques cybercriminals use to deliver and cover up their malvertising campaigns.
  • Tools and solutions to help detect, eliminate, and protect your business.
Building an Effective Defense Against Ransomware
Date: May 24, 2016

View archived webinar

A growing number of enterprises are being hit by attacks of ransomware, in which critical systems or data are maliciously encrypted or threatened until an enterprise victim pays a ransom. 

  • How does ransomware work, and who are the attackers that use it?
  • Should companies pay the ransom if their data is threatened?
  • Most importantly, how can enterprises defend their data against future ransomware attacks?

In this eye-opening webinar on May 24th, security experts will give you deeper insight into this emerging threat, including a look at some current ransomware attacks and best practices for defending against them.

New Threats and Trends In Online Malware
Date: May 18, 2016

View archived webinar

Recently, online attackers have taken their game up a notch using ransomware, polymorphic malware, and many other new exploits that are frequently able to evade traditional IT defenses.

Attend this informative webcast on Wednesday, May 18 and top experts on online crime will offer you:

  • Insights on the latest exploits and trends in malware development
  • Updates on the newest attacks and the methods used for infecting enterprise systems
  • Methods you can use for detecting, blocking, and rooting out new malware even when it is designed to elude your current defenses
New Research on DDoS Attacks and Their Threats to Your Business
Date: May 10, 2016

View archived webinar

DDoS attacks continue to remain a clear and present danger for businesses across the globe. Strikes are becoming more complex to detect and defend, and attacks like UDP and DNS reflection are being unleashed at scale often with multiple attack vectors at once. What are you to do when standard security measures are now obsolete?

Its important for you to know your enemy as best you can, and in this one hour webinar, the Neustar Security Operations Center (SOC), working on the front line in the fight against DDoS attacks, will present to you the latest research on DDoS attacks mitigated for clients across the globe.

You will gain insights on:

  • The intent of hackers and their attack strategies
  • How attacks are growing in complexity, strength, and frequency
  • How DDoS protection is evolving to help secure businesses
[Enterprise Security] Be the Hunter or the Hunted, The Choice is Yours.
Date: Apr 28, 2016

View archived webinar

Cybersecurity defense strategies have run their course.

If you use a traditional security stack, you need to know that it no longer provides the mission assurance your enterprise needs. And ‘search based’ strategies depending on short lived indicators of compromise are ineffective for identifying polymorphic adversaries.

Attend this Dark Reading webinar on April 28 to discover how Endgame’s “Automate the Hunt” offense strategy is essential to detecting never before seen adversaries that bypass the traditional security stack. Experts will teach you:

  • What is Hunt and who should hunt
  • How to avoid the most common pitfalls when hunting
  • Best practices to hunt effectively

It’s time for you to be the hunter, not the hunted. Start building an ‘offense’ approach into your security program today.

Designing Your Next-Gen Endpoint Security Strategy to Defend Against Modern Threats
Date: Apr 28, 2016

View archived webinar

Today’s security battle is being waged at the endpoint. Attackers are more sophisticated than ever and your data is the target. Traditional prevention strategies have proved to be inadequate against modern threats, and a shift in strategy is needed to keep up.

As your organization sets out to upgrade outdated endpoint security to a Next-Generation Endpoint Security (NGES) solution, you are faced with an overwhelming number of vendors and approaches. So how does one build a next-gen endpoint security strategy?

During this webinar Carbon Black Security Strategist, Rick McElroy,  will cut through the noise and offer a clear description of:

  • The state of the threat landscape and today’s NGES requirements
  • The pros, cons and tradeoffs of varying approaches to NGES
  • Best practices on NGES deployments
  • A requirements checklist for choosing the right NGES solution

Every industry analyst firm is producing research about NGES, and they all reach the same conclusion: every organization needs to upgrade their endpoint security to a modern Next-Generation Endpoint Security solution. Start building your strategy to defend against modern threats.

Weaponize Your Threat Intelligence for Breach Prevention
Date: Apr 26, 2016

View archived webinar

For the online attacker, sophisticated exploits are becoming easier and cheaper than ever to produce. Todays enterprise faces a dizzying array of advanced cyber threats, many of them targeted directly at a specific organization and undetectable by conventional IT defenses. How can enterprises identify and stop these increasingly-sophisticated attacks before they become major compromises?

In this eye-opening webinar, experts at Palo Alto Networks will discuss new ways to harness emerging data about new threats todays threat intelligence data stream and use it to develop methods for hunting and stopping sophisticated attacks. By teaching attendees how to weaponized their threat intelligence information, Palo Alto Networks will help security professionals to proactively ferret out advanced attacks in many cases, mitigating or preventing their potential impact on enterprise data.

A Cloud First, Security First Approach to Baking Security into Your Digital and Cloud Initiatives
Date: Apr 21, 2016

View archived webinar

A move to the cloud can help your team scale faster, innovate, and also provide users continuous delivery. And taking a cloud first, security first approach allows you to work tight knit security features and controls into cloud initiatives from the ground up - including AWS security.

Learn how to build your sound security strategy by attending our webinar where we will cover:

  • How the cloud is changing the security paradigm
  • Cloud security analytics and best practices
  • How digital disruption is changing the market landscape
  • How to get deep visibility into AWS Logs
  • Leveraging threat intelligence in the cloud
  • Managing SaaS-based business applications

Sure the thought of putting sensitive company data in a public cloud can be scary - #crazyscary! Kind of like online dating. But the good news is that it doesn't have to be scary or expensive!

How Cloud Identity Management Helps Companies Go Digital
Date: Apr 06, 2016

View archived webinar

While 75% of IT Execs say they are building portals and applications for customers, according to a recent survey, legacy identity and access management (IAM) tools present massive hurdles for user experience and security.

Attend this webinar to learn how cloud-based identity management turns lousy customer experiences into sizzling engagement.

When you join us on April 6th you will learn how to:

  • Align your IAM architecture to support a digital transformation strategy
  • Boost the security of brittle crumbling legacy Identity products
  • Evaluate the unique capabilities of cloud-based identity management
Insights for a More Secure Enterprise against DDoS attacks and other Security Threats
Date: Apr 05, 2016

View archived webinar

DDoS attacks have been legitimized as a weapon of cyber warfare and are increasing used by those with sinister motives in conjunction with other nefarious activities including breach, theft, and destruction. Knowing how to protect your enterprise means knowing the threat. DDoS attacks are widely varied in their construct, lethality, and intent and it is important to understand them to best understand what you need to do to mitigate their impact.

As a tier-one DDoS protection service provider, Neustar fends off thousands of attacks each year from the very large to the dangerously small. In this session with industry analyst IDC, you will get the latest insights on attacks and trends so that you can better detect and defeat the DDoS threats to your business.

Attend this webinar to learn about:

  • How attacks are growing in strength and complexity
  • Why breach should be a foremost concern when experience a DDoS attack
  • How multi-vector attacks pose a real danger to your infrastructure and users
Managing Cloud Security? The 5 Best Practices for a Scaling Environment
Date: Mar 30, 2016

View archived webinar

Security is a top concern when transitioning your company - and most important applications - to the cloud. Protecting your business from internal threats, external attacks, and data loss are important to everyone on the team, regardless of level or role. Most organizations face two primary challenges when trying to achieve cloud security:

  1. Putting together the pieces of the security puzzleincluding workload insight, key file tracking, vulnerability management, etc.into one place quickly, despite your tight real-world constraints of insufficient budgets and limited personal bandwidth.
  2. Making sure you can do #1 accurately and efficiently.

Fortunately, you dont have to figure all of this out on your own and can benefit from lessons learned by early cloud adopters. Dark Reading invites you to join us for a special one-hour webinar featuring leading experts in cloud security that will show you how to: 

  • Improve your threat visibility
    Better understand what it really takes to mitigate cloud-related threats and fulfill cloud-related compliance reporting requirements. 
  • Reach your security goals
    Hear first-hand how others were able to achieve their desired state of security in less time, with fewer resources -- and with increased adaptability to future changes in their cloud implementation. 
  • Think like an attacker
    Our expert panel will explain how to map your cloud security capabilities to an attackers cyber kill chain to keep you one step ahead.
Threat Intelligence Processes are a Journey; Not a Destination
Date: Mar 29, 2016

View archived webinar

A decade ago manual analytics were all the rage. Unfortunately, yesterdays processes can no longer scale to the threats of today. For example, many organizations are still convinced the answer to threat intelligence is a SIEM and vendor feeds - yet are complacent in allowing analysts to conduct highly repetitive and manual tasks versus enabling them to do what they do best, analyze threats.

Join us for this webinar in which we will demonstrate how the right process paired with the right threat intelligence platform (TIP) are key in automating resource intensive aspects when running a threat intelligence team. Understanding what you are trying to achieve and building processes around that is more efficient and effective in the long run -allowing your organization to save time and money.

Register and attend this webinar to learn how to:

  • Replace inefficiencies with automation so your team can focus on analysis
  • Prioritize the flood of notifications to know when and where to act
  • Use process and platform to maximize the potential of your team
Addressing the New Threat Intelligence Problems of Scale and Relevance
Date: Mar 22, 2016

View archived webinar

Join us for a webinar where we will explain why threat intelligence itself has become a big data problem and how the number of active indicators of compromise has grown into the tens of millions.

If like many organizations you are trying to review indicators manually, you know first-hand how it can be an impossible task.

Or like many others, you're pushing data into a SIEM (Security Information and Event Management) system and trying to get it to perform a task it was never meant to do.

Attend this webinar and youll get insight into:

  • Why a task-based distributed security architecture is a natural augmentation for the SIEM
  • Why Threat Intelligence Data should be considered the next big data problem
  • The importance of organizational relevance for threat intelligence data
  • The benefit of applying key indicators of compromise to threat models
State of the Phish: Effectively Reducing Phishing and Malware Infections
Date: Mar 17, 2016

View archived webinar

Phishing continues to pose a growing threat to the security of industries of every kind — from financial organizations to government contractors to healthcare firms. Today’s savvy phisher manages to evade even the most significant safeguards through carefully planned, socially engineered email phishing attacks.

In fact, according to Verizon’s Data Breach Investigations Reports, 95% of all espionage attacks and nearly 80% of all malware attacks involve phishing. And people — your internal users — are the largest and most vulnerable point of entry.

In this session we will review high-level findings and insights from the Wombat Security State of the Phish report that was released in January 2016. You will hear about:

  • Feedback from information security professionals on what they see happening with phishing in their organizations and how they are protecting themselves
  • Information on how often, and what types of phish end users are falling for
  • Data and analysis of click and open rates from millions of simulated email phishing campaigns, including: who’s most vulnerable, browser and plugin stats, and platform data across industries

You will also gain actionable advice about running a successful anti-phishing program and learn tactics that several large organizations have used to reduce malware infections and phishing attacks from the wild up to 90%.

Determining Identity with Behavioral Biometrics
Date: Mar 15, 2016

View archived webinar

Despite millions spent each year on security, breaches still persist thanks to the compromised user credentials. How can you make the most of your existing security investments, while ensuring those who access your network are who they say they are?

Join us for an informative webinar where SecureAuth and IDC will cover:

  • The current state of the industry and how adaptive authentication techniques like behavioral biometrics - monitoring keystrokes, mouse movement and gesture patterns - can help detect intrusions before they occur
  • IDCs forecast on industry trends in the authentication market.
  • Live demo of step up authentication using behavioral biometrics.
People Make the Best Exploits
Date: Mar 09, 2016

View archived webinar

Cybersecurity vendors devote much of their attention to the technical aspects of their task: malware payloads, distribution methods, infection chains, stolen data, and so on. To be sure, these elements are important. But focusing on them too narrowly neglects a simple fact: in the end, people are the targets.

That’s why attacks are still getting through, despite advances in detection and response technology. From email and web to social media and mobile apps, attackers are exploiting the human factor.

Join Proofpoint Director of Threat Intelligence Patrick Wheeler as he discusses The Human Factor 2016 report.

This webinar presents original ?eld research from data gathered by Proofpoint products deployed in customer settings around the world.  Patrick will cover threats in email attachments, social media posts, and URLs.

In this webinar you will see not just who is clicking what—but when, where, and why they are clicking:

  • Who is being targeted, and who is falling victim
  • What attackers are sending, and which lures are working
  • When threats arrive, and when people are most likely to click
From the Front Lines: Enterprise Mobile Security Report 2016
Date: Feb 24, 2016

View archived webinar

Get a look at the current state of enterprise mobile security through the lens of a January 2016 survey of security professionals at large companies across more than fifteen different industries. A highlight from the results is that a large majority of responses indicate its certain or likely that their organization has had a data breach as a result of employees using their mobile devices to access the companys sensitive and confidential information.

Join Larry Ponemon, Founder of the Ponemon Institute and Nick Fisher, Director of Product Marketing at Lookout as they discuss the results from a recently completed joint survey on the economic risks of confidential data on mobile devices.

The discussion will focus around the key findings from the research: 

  • How many security leaders say its certain or likely that their organization had a data breach as a result of employees using their mobile devices to access the companys sensitive and confidential information.
  • The number of employees mobile devices are believed to be infected with malware at any point in time.
  • The percentage of infected mobile devices are never investigated or triaged.
  • How much mobile security spending by global enterprises is expected to grow in the next 12 months.

Attend this webinar to get insights from the latest research on enterprise mobile securityand where budget and allocation is headed in the next year.

 

 

Application Control Observations and Strategies for Success
Date: Feb 24, 2016

View archived webinar

It's now widely recognized that traditional security solutions are insufficient to protect organizations from advanced threats and targeted attacks. As a result, companies are increasingly looking to adopt a proactive approach to security such as application control to ensure the fidelity and security of intellectual property.

Joel Rising, Solution Architect at Carbon Black will be joined by Phil, Sr. Information Security Engineer at one of Carbon Blacks leading customers in the banking industry. In this informative webinar, youll learn the path to success through application control and Phil will share best practices from successful deployments at multiple organizations.

This webinar will cover:

  • Moving from passive to proactive defense
  • Why app control is essential
  • The importance of choosing the right solution  
  • Overcoming organizational barriers
  • Best practices learned from successful deployments 
Surviving 2016: Protecting Your Business From Advanced Cyber Threats
Date: Feb 23, 2016

View archived webinar

While traditional security practices still apply in today’s threat landscape, the advanced threats seen in 2015 make it clear that the basics are no longer enough to protect your company.  With that in mind, join us as we highlight 10 tips for surviving this year—focusing on what to do and what not to do--to prevent cybercrime in 2016. Key takeaways include:

  • Top 5 tips for securing your systems and data
  • Top 5 pitfalls to avoid falling victim to
  • How to evolve your security practices to meet  today’s ever-changing threat landscape
Rethinking Layered Security
Date: Feb 23, 2016

View archived webinar

For years, IT organizations have built their cyber security strategies around “layered defense” – the installation of a wide variety of security tools to stop a wide variety of threats. But as attackers crack the defenses of enterprise after enterprise, many experts have begun to question the layered security concept, and some are developing new ways of thinking about security architecture.

In this eye-opening webcast, top security experts will explain why current layered defense strategies are not working, and offer some real-world thinking around new approaches to enterprise cyber defense.

How Your Applications Can Protect Themselves from Cyber-Threats
Date: Feb 18, 2016

View archived webinar

Applications are a top attack vector for cyber criminals. Thats why application security is evolving to become an integral part of the software development and DevOps processes.

But thats not enough. To protect the enterprise, you also need to ensure the safety of applications that are already in production.  As classic security defenses have failed to keep pace with the evolving threat landscape, your applications now need to protect themselves against real-time attacks. 

Join Dr. Joseph Feiman, Chief Innovation Officer at Veracode, and Sam King, Chief Strategy Office at Veracode as they explain how these trends will play out, and how you can build powerful and transformative self-protection into your applications as part of a more intrinsically secure DevOps and Security Operations process.

Youll learn:

  • Why firewalls and other traditional security technologies cant fully protect applications
  • How Runtime Application Self-Protection (RASP) addresses this key security challenge
  • How RASP-based application self-protection advances DevOps and Security Operations processes
  • How application self-protection is likely to evolve in the future
  • How application security is evolving to becoming an integral part of software development and delivery and operational security processes

Only applications themselves possess the full contextual insight necessary to stop the types of attacks that conventional network security cannot see. 

Be sure to attend this insightful video cast so that you understand how you can help your company capitalize on emerging digital opportunities without exposing yourselves to emerging digital threats.  

The Untold Secrets for Fighting Advanced Persistent Threats
Date: Feb 11, 2016

View archived webinar

APTs are a growing threat across all industries, and the reality is almost any company of any size can suffer catastrophic losses at the hands of highly motivated and well-resourced attackers.

According to a global ISACA study, 66 percent of global organizations believe its only a matter of time before their enterprise is hit by an APT, yet only 15 percent believe they are prepared to handle them.

As one of the most attacked organizations in the world, Lockheed Martin has a front row seat in the fight against APTs. Join Justin Lachesky, Cyber Intelligence Analyst at Lockheed Martin and Cybereason CTO, Yonatan Striem-Amit to discuss:

  • The most pressing challenges your company faces when fighting APTs, like excessive false positives, a lack of threat context and poor endpoint visibility.
  • Four steps you can take to combat APTs in your organization, including automating threat detection and implementing behavioral analysis.
  • How to empower your security team in the fight against APTs by adopting automatic threat detection, eliminating alert fatigue and using endpoint data to reveal full attacks.
Building an IT Security Awareness Program That Really Works
Date: Feb 03, 2016

View archived webinar

Most enterprises do some form of IT security awareness training for their end users – but not all of them do it well. Organizations of all types and sizes frequently fail to build programs that truly convince users to change their behavior – and keep enterprise data safe.
 
In this eye-opening webcast, top experts on security training offer insights on what works in security awareness programs – and what doesn’t. You’ll get insights on how to build and deliver a curriculum that makes end users smarter about security – and prevents them from engaging in online practices that could put your corporate data at risk.

Understand Your Attacker: A Practical Guide to Identifying TTPs With Threat Intelligence
Date: Feb 02, 2016

View archived webinar

To effectively combat threats to the enterprise, security teams must understand their organization’s adversaries and the attack tools, techniques, and processes (TTPs) they are wont to weaponize. Threat analysts can create that picture for security teams, ultimately providing a set of actionable recommendations for threat management, by piecing together data from the Web that indicates a threat to the enterprise.

Levi Gundert, Vice President of Information Security Strategy at Recorded Future, will share research on the latest attacker tools, provide architecture recommendations for organizations looking to strengthen security controls, and help analysts use threat intelligence to more quickly and effectively identify threat trends. Attend this webinar to learn how to:

  • Apply methodologies for proactive and strategic source identification and information analysis.
  • Understand vendor information sources.
  • Prioritize threats in a business context.
  • Differentiate between vulnerability management and threat intelligence.
  • Use best practices for working with peer teams to test and strengthen security controls.
How to detect hidden cyberattack communications inside todays networks
Date: Feb 02, 2016

View archived webinar

Todays cyber attackers survive by hiding their attack communications from the prying eyes of security. Its a critical part of their attack arsenal and it lets them patiently manage and propagate attacks throughout your network, undetected.

Tune into this webcast to learn how to detect covert attack communications inside your network. Well explain how you can automatically pinpoint active cyber attacks in encrypted traffic as theyre happening and without decrypting anything.

Heres what youll learn:

  • The latest techniques attackers use to hide their traffic from security.
  • Ways to detect malicious attack communications in hidden tunnels and encrypted traffic.
  • How to find malicious communications within allowed applications.
  • What you need to instantly map cyber threats to network hosts that are under attack.
  • The critical role of real-time automation in prioritizing cyber attacks that pose the highest risk.
  • How to cut through the noise of event logs and alerts to get to the heart of a cyber threat.
Cyber Security: The Business View - A Dark Reading Virtual Event
Date: Jan 26, 2016

View archived webinar

Is your business prepared for a cyber breach?

Join Dark Reading and top cyber security experts for this online event that will offer a comprehensive look at the security-related issues facing todays businesses and how you should respond.

AGENDA

KEYNOTE: Understanding Cyber Securitys Impact on Business

Tim Wilson, Editor in Chief, Dark Reading 
Bryan Sartin, Managing Director, RISK Team, Verizon 

A top expert offers an executive-level view on the impact of data breaches, the costs and benefits of investing in IT security technology and skills, and a real-world perspective on how  cyber security fits into the business equation.

KEYNOTE: Your Legal Liability In Cyber Security

Tim Wilson, Editor in Chief, Dark Reading 
Jason Straight, Senior Vice President, Chief Privacy Officer

In this keynote, a top legal expert discusses your liability to customers and partners in a legal breach, how  to avoid security negligence, and your legal standing with cyber insurance companies in the event of a breach.

PANEL: Measuring Real Cyber Security Risk

Kelly Jackson Higgins, Executive Editor, Dark Reading 
John Pescatore, Director, SANS Institute; 
Tom Parker, CTO, Accenture; 
Wade Baker, VP Strategy and Risk Analytics, ThreatConnect

A discussion of the business case for IT security, and how to quantify the risks and costs of your IT security program. We will discuss the costs associated with todays threats and data breaches, and how you can use threat intelligence and cyber security risk metrics to prioritize costs and defense strategies specifically for your enterprise.

PANEL: Preparing Your Business For a Major Data Breach

Sara Peters, Senior Editor, Dark Reading 
John P. Gelinne, Deloitte Advisory & Captain, US Navy (Ret); 
John H. Sawyer, Managing Security Consultant, InGuardians; 
Roman Brozyna, Chief Information Security Officer, Bit9 + Carbon Black

A quick guide that shows you, step by step, how to build a plan for reacting to a major data breach, including breach detection and remediation, legal liabilities, working with law enforcement, and crisis public relations.

PANEL: How (And Why) Hackers Target Your Business

Marilyn Cohodas, Community Editor, Dark Reading 
David West, Assistant Section Chief, FBI Cyber Division; 
John Terrill, Founder & CEO, Drawbridge Networks; 
Adam Meyer, Chief Security Strategist, SurfWatch Labs

In this panel discussion, experts on cyber threats offer an inside look at the goals of a cyber attack and the methods that hackers use to select and infiltrate targeted companies.

Integrating IT and OT for Safer Operational Processes
Date: Jan 07, 2016

View archived webinar

Security threats against corporate networks are staggering, and the situation is even more compounded for energy companies that safeguard both information technology (IT) and operational technology (OT) systems. With the growth of interconnected networks, use of cloud services and the need to share information 24/7, these traditionally isolated critical infrastructures are rapidly becoming integrated into enterprise environments. As OT control systems continue to modernize, this interconnectivity is putting new pressures on both IT and OT professionals to better manage, secure, and protect the technologies that run our important facility processes, like electrical systems, oil and gas controls, and industrial factories. IT/OT convergence enables better visibility, centralized control, improved situational awareness, increased efficiencies, and a more mature cybersecurity posture across operations but only if its done right.

In this Dark Reading video panel, sponsored by Lockheed Martin, well discuss the role  intelligence and automation can play to simplify the information flow between management and supervisory control systems.

Discussion agenda items include:

  • How to detect and stop the progression of an advanced persistent threat against your IT and OT infrastructures before they can damage your networks and business credibility
  • What you can do to improve centralized control, safety, and security monitoring for OT platforms
  • How the Lockheed Martin Cyber Kill Chain method of intelligence-driven defense applies (or doesnt) for integrated IT/OT systems
  • How to modernize your legacy SCADA software and better integrate your disparate applications
  • Ways to provide real-time information across the converged IT/OT infrastructure to improve business performance and the automation of industrial processes
  • How IoT can help you better integrate components of industrial processes into the enterprise network so they can be more easily monitored and better serviced
How to Build a World-Class Threat Intelligence Capability From Scratch
Date: Dec 15, 2015

View archived webinar

Threat intelligence is a broad subject and the natural tendency is to produce intelligence on any topic or event regardless of its applicability to the company. True success in threat intelligence depends on focusing intelligence efforts to very specific business objectives, which removes the large surface area and leaves only a challenging sliver of ultra-high value to pursue.

This webinar will reveal critical concepts and practical details, where necessary, to produce a world-class threat intelligence capability from scratch.

Why Layered Security Strategies Dont Work And What You Can Do About It
Date: Dec 15, 2015

View archived webinar

Every year, enterprises spend record levels of money on new IT security technology – yet major breaches and compromises are more prevalent than ever. The concept of “layered security” – in which enterprises support a wide variety of security technologies in order to discourage attackers – doesn’t seem to be working.

It’s time to rethink IT security – not just the technology, but the way enterprises approach it from a strategic, architectural perspective. There are ways for organizations to build a comprehensive set of defenses – a security architecture – that can not only discourage attackers, but actually prevent them from penetrating your IT environment.

In this webcast, you will learn some of the basics of building a next-generation IT security architecture, including:

  • How the foundational architecture of a next-gen firewall and security platform “matters” in enabling the business, and protecting it against a wide variety of attacks.
  • How the architecture enables unique and specific security scenarios.
  • How the architecture supports a prevention-oriented approach.
Where Badness Lurks: New Threats Demand a New Approach
Date: Dec 10, 2015

View archived webinar

Join DomainTools for a webinar that will show new and innovative ways to map threat infrastructure, which in turn can help you defend your organization against future moves by attackers.

During this discussion, DomainTools will walk you through an analysis of its databases of domain and IP profile data and what was discovered. You'll hear about patterns of concentration of malicious internet activity by top-level domain, registrant email provider, privacy service, and other non-geographic taxonomies.

And, because they have been linked to recent breaches, we give special focus to the role of bulk domain registration agents in the development of attack infrastructure, asking the question: are "domain resellers" intrinsically suspect? We will also discuss how to practically apply the methodology that underlies these findings.

Register and attend this webinar to see:

  • Why open-source intelligence (OSINT) matters and how to use it in adversary analysis
  • New ways of pinpointing--and predicting--hotspots of malicious activity
  • Which bulk domain registration agents are tied to malicious activities
  • A real-life investigation of the adversaries behind a major breach
Operationalizing Threat Intelligence to Battle Persistent Actors
Date: Dec 09, 2015

View archived webinar

We have all heard that threat intelligence can help level the battlefield against advanced persistent threats whether criminal or nation state attackers. But what is Threat Intelligence? How does it fit into your organizations security operations? And how can you develop your own Threat Intelligence?

Attend this webcast to learn:

  • How to leverage Threat Intelligence to identify potential adversaries and take appropriate action
  • How to develop Threat Intelligence using the Diamond Model
  • How ThreatConnect investigated Chinese state-sponsored threats using the Diamond Model
  • How to operationalize Threat Intelligence using Splunk and ThreatConnect

Join Andy Pendergast, co-author of the Diamond Model and co-founder of ThreatConnect and Monzy Merza, Director of Cyber Research at Splunk to see how you can apply Threat Intelligence to protect your organization and prevent future breaches. During the talk, Andy will share threat intel on a nation state threat and Monzy will do a live demonstration of operationalizing the new Threat Intelligence.

Best Practices for Resilient Inline Security Deployments
Date: Dec 08, 2015

View archived webinar

Todays threat landscape demands the use of a complex array of proactive security systems and monitoring solutions.  What are the most common and useful security solutions you should consider - next-gen firewalls, web-application firewalls, intrusion prevention systems?

Many of these security tools require inline network deployment.  But why in the face of almost certain cyber-security breach do organizations avoid deploying these best-practice security tools?

Learn to deploy your security defenses like firewalls, intrusion prevention systems (IPS) and others using a safe, yet flexible security framework that improves network uptime, speeds network troubleshooting, and eases network and security maintenance for operations personnel.

  • An overview of security tools and monitoring systems available.
  • The value of proactive inline security systems and why organization fail to use them.
  • Best practices for safely deploying security defenses.
  • Minimizing conflicts between networking and security operations teams.

If you provide your (ISC)2 ID certificate number when you register for the webinar, your CPE credit will automatically be added to your (ISC)2 account within 4-6 weeks.

Hunting For Potential Threats in Your Enterprise
Date: Dec 08, 2015

View archived webinar

Security teams have traditionally been “gatherers” of threat information, installing tools and systems that collect potential indicators of compromise and then waiting for alerts. As attacks become more sophisticated and well-hidden, however, many security teams have begun to implement “hunting” processes that enable IT pros to identify and investigate potential threats *before*  the alarm bells go off.
 
What are the tools and techniques required to implement hunting in your organization? What skills does your team need, and what are the potential benefits of adding these processes to your security practices? In this informative webcast, top experts in IT security research offer an inside look at the hunting process, as well as the tools and data resources you’ll need to make it work in your organization. You’ll also get some advice on the costs and benefits of threat hunting, and how you can use it to lower costs and make your organization’s data more secure.

Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: So...are we supposed to be the elves or the reindeer?
Current Issue
Five Things Every Business Executive Should Know About Cybersecurity
Don't get lost in security's technical minutiae - a clearer picture of what's at stake can help align business imperatives with technology execution.
Flash Poll
Dark Reading Strategic Security Report: The Impact of Enterprise Data Breaches
Dark Reading Strategic Security Report: The Impact of Enterprise Data Breaches
Social engineering, ransomware, and other sophisticated exploits are leading to new IT security compromises every day. Dark Reading's 2016 Strategic Security Survey polled 300 IT and security professionals to get information on breach incidents, the fallout they caused, and how recent events are shaping preparations for inevitable attacks in the coming year. Download this report to get a look at data from the survey and to find out what a breach might mean for your organization.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Security researchers are finding that there's a growing market for the vulnerabilities they discover and persistent conundrum as to the right way to disclose them. Dark Reading editors will speak to experts -- Veracode CTO and co-founder Chris Wysopal and HackerOne co-founder and CTO Alex Rice -- about bug bounties and the expanding market for zero-day security vulnerabilities.