2018 Cybersecurity Headlines in Review

2018 was a particularly busy year for the cybersecurity industry… Beyond the exponential growth in the number and types of cyber-attacks—including Magecart, which compromised the payment processing systems for a number of large companies—hundreds of new cybersecurity startups were formed, GDPR came to pass, and the impacts of Big Data processing on social networks exploded. During this webinar, Michael Hill and Dan Raywood of Infosecurity Magazine (including a few guest speakers) review the trends of 2018, the impact of those cybersecurity trends, and predictions for 2019. In the 2018 Cybersecurity Headlines in Review webinar, we’ll explore: Cybersecurity headlines in 2018 and what trends were most publicized.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Cybersecurity Outlook 2022

Join Omdia, Black Hat and Dark Reading at this free, all-day virtual event offering expert insight on the cyber-threats and trends enterprises will face in the coming year. On December 8, Cybersecurity Outlook 2022 will look at some of the new threats posed by online attackers, as well as evolving products and technologies that may mitigate those threats. You’ll hear from some of the cybersecurity industry’s top thinkers, as well as researchers who have been studying the next wave of cyber vulnerabilities and exploits.
Watch Now

Protecting against Advanced Email Threats: Beyond the Nigerian Prince Scam

GreatHorn

In this webinar, GreatHorn CEO Kevin O’Brien discussed how phishing attacks have evolved – from the early days of the widespread Nigerian prince schemes to today’s sophisticated and highly targeted spear phishing threats – and how our collective response has failed to keep up. By reviewing common attack patterns, he highlights areas outside of technology that are critical to protecting organizations from advanced email threats – from business processes to user engagement
Watch Now

Threat Hunting—A Practical Demonstration

ISACA

Today it is almost considered negligent to wait for an alert from IDS/IPS, firewalls, NAC, and endpoint security products before taking action. For years some of us who ha e been in the industry for a while have engaged in operations where we go out into the environment and actively look for threats to hand off to the IR team to eradicate. Enter the world of threat hunting. We will side step any product marketing and dig deep into what threat hunting actually is. The second half of this webinar will consist of demo of some technical threat hunting operations that anyone can practice sharpening their hunt skills.
Watch Now

Attack Tactics 6! Return of the Blue Team

Black Hills Information Security

In this webcast we walk through the step-by-step defenses to stop the attackers in every step of the way we showed in Attack Tactics Part 5. Introduction, password spray toolkit, account lockout, honey accounts, canary tokens, and two factor authorization. fixthefuture , two factor authorization, dumping global address lists, mailsniper 20:30 Lateral movement, OWA, VPN, SSH. Scanning and enumeration, Nmap, SSH Brute Force, “Find Open”, LLMNR, LLMNR Responder, and NrlmRelayX.
Watch Now