With the recent wave of DNS and domain name hijacking, and the emergency directives from the Department of Homeland Security and other governing authorities, securing your organizations digital assets—domains, DNS and digital certificates— is more important than ever. Many companies don’t understand the risks associated with these vulnerabilities and don’t know where to start. CSC Global Product Manager of Security Services, Michelle Rodenheiser, discusses the importance of mapping your digital assets to your risk program.
Michelle Rodenheiser, Product Manager in Security Services, CSC
Ransomware has continued to plague organizations over the years and in 2019 we’ve seen a resurgence of this threat. This webinar is intended to give viewers an overview of ransomware, what is it, how does it work, motivations of the actors behind it, recent trends seen, and how you can minimize your risk of becoming a victim.
Jon Clay – Director: Global Threat Communications, Trend Micro
A.J. Nash, the Director of Cyber Intelligence Strategy for Anomali, will be providing a informative presentation on building effective cyber intelligence programs. He will walk through the problems most companies face, some fundamentals of intelligence, the keys aspect to focus on in building and maintaining an effective intelligence program, and samples of how mature intelligence programs are structured and function. Other topic highlights include; vendor and source selection, personnel challenges, budgeting and project planning to improve your intelligence posture.
A.J. Nash – the Director of Cyber Intelligence Strategy, Anomali
Over the past 20 years there have been a dozen different major theories on how you should implement an application security program. Yet the average number of serious vulnerabilities in web applications today is 28.6, almost exactly what it was in 2003 when the first OWASP Top Ten was released. Even the risks in the Top Ten itself haven’t changed. With the era of Digital Transformation, Cloud, and DevOps things only look more grim. The answer is a new modern approach to achieving application security that directly measures security outcomes instead of indirect measurements of processes or teams.
Jeff Williams – Co-Founder & Chief Technology Officer, Contrast Security
Every aspect of our lives is being digitized. Establishing and protecting digital identities is emerging as a central component of security and privacy. This webinar will show how the “Root of Trust” morphs and manifests in the context of Personal IDs, IoT, Crypto Currency, and Blockchain. The “Root of Trust” is used in each of the contexts to secure a Digital Identity that is authentic and immutable.
James Livingston - Vice President of Sales and Business Development, WISeKey
Unauthorized access to sensitive data can have disastrous impacts. Whether deliberately or by negligence, these exposures continue to happen around the world. Learn the root causes of most data leak incidents and exposures, explore the government initiatives to protect the data in cyberspace, and discover what solutions are available for both individuals and organizations to protect their most important assets.
Matej Zachar – Chief Security Officer, Safetica
Every breach that FireEye responds to has one thing in common – the breached organization had firewalls in place. Modern attacks routinely bypass firewalls and other perimeter defenses, leaving security professionals to play a very high stakes game of “whack-a-mole,” tracking down and eliminating threats as quickly and efficiently as they can. A network forensics strategy can give security professionals visibility into all an organizations’ network traffic-regardless of where it is coming from - and allow them to quickly find the threats hiding in their network.
- Understand the benefits of a network forensics strategy
- Leverage network forensics to improve security and increase traffic visibility
- Gain insights into how network forensics improves incident response times and reduces risk of loss
- See how network forensics enables retrospective threat hunting
Bill Cantrell, VP of Network Product Management, FireEye
Email remains the number one tactic for threat actors targeting organizations. Threat actors use email to deliver ransomware, phishing, and business email compromise, among others. In this webinar, learn the latest email trends and attack methods that threat actors are using, who they target within your organization, and their objectives. Finally, learn about the newest technologies used to detect threats, and best practices to reduce your attack surface.
Jon Clay – Director of Global Threat Communications, Trend Micro
This webinar will share research by ESET, on one of the most dangerous Advanced Persistent Threat (APT) groups active today – TeleBots (aka Sandworm). The attackers have been targeting critical infrastructure over the past several years, most notably during the first ever, malware-enabled electricity blackouts, and the most damaging cyberattack in history by NotPetya. The webinar will also focus on the group’s most recent attacks against energy companies in Europe by the GreyEnergy malware.
Robert Lipovsky – Senior Malware Researcher, ESET
This webinar addresses vulnerability overload challenges and explores best practices that help reduce vulnerability overload, and better protect businesses from cyber risk.
Bill Olson – Technical Director, Tenable
This webinar presents the importance of endpoint security and hardware enforced security solutions that protect, detect, and in case of breach, allow for swift recovery from attacks.
Anais Gurruchaga – Personal Systems Security Lead, HP Inc.
Corbett Hoxland – Security Business Developer, HP Inc.
The webinar offers an introduction to cloud computing and demonstrates the impact of this digital transformation on security, productivity, and the way we consume technology.
Trey Herr, PhD – Senior Security Strategist, Microsoft