Past Webinars

11am PT / 2pm ET / 8pm CET

Introduction to Vulnerability Disclosure

Today we will look at vulnerability disclosure and various issues related to it. Vulnerability disclosure is deceivingly simple but it can quickly get complex in the real world. Despite that it is possible to accomplish relatively painless coordination and the industry is getting better at it. The presentation will touch upon both these topics.

Presented by Panasonic


10am PT / 1pm ET / 7pm CET

Phishing, Counterfeiting, and Misinformation Scams with COVID-19

During the coronavirus pandemic, a time where society needs to come together to take action and caution to protect the health of everyone more than ever, there are fake and potentially harmful offerings proliferating online.  Malicious and fraudulent offers for COVID-19 tracker maps, PPE, tests and cures targeting users are on the rise, and put consumers at risk. Cybercriminals are duping consumers around the globe with fake and potentially harmful medical products. This is especially dangerous since billions of people are in desperate need of a remedy to the COVID-19 disease.

Presented by CSC Global


10am PT / 1pm ET / 7pm CET

Brand Protection: A Crucial Layer in a Multi-Layered Defense

Bad actors weaponize brands to compromise unsuspecting users via digital channels and malicious use of domains, leading to phishing, malware and other brand-based attacks.  Whois, one of the tools that both brand protection and security organizations have traditionally relied upon to abate brand and security threats, is largely no longer available. Forward-thinking organizations are bringing the brand protection organization together with the security team to mitigate these brand-based attacks. Combining the methodologies and expertise of these teams can increase detection of malicious domain names.

This webinar described a collaborative framework for the security and brand protection teams and discusses real-world examples of this multi-layered defense strategy in action while examining the severely curtailed use of Whois data and its impact on brand protection and security investigations.

Presented by Appdetex


10am PT / 1pm ET / 7pm CET

Why Cybersecurity Matters More Than Ever

The sudden outbreak of COVID-19 took companies and governments by surprise. Suddenly, millions of citizens worldwide had to start working from home, many for the first time ever. But are organizations aware of the risks of telework? This webinar explored how technology companies can support companies through this accelerated digital transformation process.

 

Presented by Sebastián Stranieri, CEO and Founder of VU Security


7 pm PT / 10 pm ET / 4 am EST

Improving routing security through concerted action

BGP? RPKI? DDoS? Hijacking? Spoofing? What does all this mean, and what can companies do about any of it? This webinar explains why we need to care about the Internet’s routing system, and how to protect organizations of all sizes from cyber threats both internal and external.

"Presented by Andrei Robachevsky, Senior Director, Technology Programmes, ISOC


10am PT / 1pm ET / 7pm CET

How to Achieve Secure CDLC through Threat Modeling

This webinar provides an overview of the Cloud Development Life Cycle (CDLC), and the importance of securing the CDLC as early as the design and planning phases. It highlights architecture pattern standards, and offer guidance for vulnerability management assessments, plus prioritization of remediation, resolution and mitigation.

Presented by Alex Bauert, Sr. Director, Threat Intelligence, ThreatModeler


10am PT / 1pm ET / 7pm CET

Introduction to IoT security

This introduction explores some of the factors that make IoT security difficult by comparing IoT security with traditional security techniques for laptops and PCs. It explains some of the new security techniques being worked on in the industry to make IoT solutions more secure and resilient. 

Microsoft


10am PT / 1pm ET / 7pm CET

Securing Your Digital Assets from Cyberattacks Starts with Mapping Them to Your Risk Program

With the recent wave of DNS and domain name hijacking, and the emergency directives from the Department of Homeland Security and other governing authorities, securing your organizations digital assets—domains, DNS and digital certificates— is more important than ever.  This webinar discusses the importance of mapping your digital assets to your risk program.

Michelle Rodenheiser, Product Manager in Security Services, CSC


10am PT / 1pm ET / 7pm CET

Introduction to ransomware

Ransomware has continued to plague organizations over the years and in 2019 we’ve seen a resurgence of this threat. This webinar is intended to give viewers an overview of ransomware, what is it, how does it work, motivations of the actors behind it, recent trends seen, and how you can minimize your risk of becoming a victim.

Jon Clay – Director: Global Threat Communications, Trend Micro


8am PT / 11am ET / 5pm CET

Building Effective Cyber Intelligence Programs

This webinar provides an informative presentation on building effective cyber intelligence programs. It walks through the problems most companies face, key aspect to focus on in building and maintaining an effective intelligence program, and samples of how mature intelligence programs are structured and function. 

A.J. Nash – the Director of Cyber Intelligence Strategy, Anomali


10am PT / 1pm ET / 7pm CET

Building a Modern, Scalable, and Effective Application Security Program

Over the past 20 years there have been a dozen different major theories on how you should implement an application security program. Yet the average number of serious vulnerabilities in web applications today is 28.6, almost exactly what it was in 2003 when the first OWASP Top Ten was released.  The answer is a new modern approach to achieving application security that directly measures security outcomes instead of indirect measurements of processes or teams.

Jeff Williams – Co-Founder & Chief Technology Officer, Contrast Security


10am PT / 1pm ET / 7pm CET

Root of Trust and Digital Identity

Every aspect of our lives is being digitized.  Establishing and protecting digital identities is emerging as a central component of security and privacy.  This webinar shows how the “Root of Trust” morphs and manifests in the context of Personal IDs, IoT, Crypto Currency, and Blockchain.  The “Root of Trust” is used in each of the contexts to secure a Digital Identity that is authentic and immutable.

James Livingston - Vice President of Sales and Business Development, WISeKey


7am PT / 10am ET / 4pm CET

Controlling access to your data and services

Unauthorized access to sensitive data can have disastrous impacts. Whether deliberately or by negligence, these exposures continue to happen around the world. Learn the root causes of most data leak incidents and exposures, explore the government initiatives to protect the data in cyberspace, and discover what solutions are available for both individuals and organizations to protect their most important assets.

Matej Zachar – Chief Security Officer, Safetica


8am PT / 11am ET / 5pm CET

DISCOVERING HIDDEN THREATS WITH NETWORK FORENSICS

Modern cyberattacks routinely bypass firewalls and other perimeter defenses, leaving security professionals to play a very high stakes game of “whack-a-mole,” tracking down and eliminating threats as quickly and efficiently as they can. A network forensics strategy can give security professionals visibility into all an organizations’ network traffic-regardless of where it is coming from - and allow them to quickly find the threats hiding in their network.

Bill Cantrell, VP of Network Product Management, FireEye


11am PT/ 2pm ET

Email protection

Email remains the number one tactic for threat actors targeting organizations. Threat actors use email to deliver ransomware, phishing, and business email compromise, among others. In this webinar, learn the latest email trends and attack methods that threat actors are using, who they target within your organization, and their objectives. Finally, learn about the newest technologies used to detect threats, and best practices to reduce your attack surface.

Jon Clay – Director of Global Threat Communications, Trend Micro


4pm (GMT+1)/7am PT

Cyberattacks on Infrastructure

This webinar highlights research by ESET, on one of the most dangerous Advanced Persistent Threat (APT) groups active today – TeleBots (aka Sandworm). The attackers have been targeting critical infrastructure over the past several years, most notably during the first ever, malware-enabled electricity blackouts, and the most damaging cyberattack in history by NotPetya.

Robert Lipovsky – Senior Malware Researcher, ESET



Protecting your hardware

This webinar presents the importance of endpoint security and hardware enforced security solutions that protect, detect, and in case of breach, allow for swift recovery from attacks.

Anais Gurruchaga – Personal Systems Security Lead, HP Inc.
Corbett Hoxland – Security Business Developer, HP Inc.