APTs: How to protect your business through multi-layered detection

Advanced persistent threats (APT) are a growing concern to the world's companies and networks. This presentation will give an overview on how they work and examine real-world data breaches resulting from APTs. We'll also look at how multi-layered proactive detection can combat this threat and offer a product overview of how ESET's powerful endpoint solutions respond to APTs.
Watch Now

Spotlight

Current market solutions are built to protect the enterprise and are too resource intensive for most organizations to manage. Learn about the five key components that any risk-based information security solution must include to cost effectively and efficiently protect information and meet regulatory requirements – regardless of industry, organization size and security skill set.


OTHER ON-DEMAND WEBINARS

Prioritizing Cyber Threats With Real-Time Threat Intelligence

T-Mobile

Creating a threat intelligence strategy is essential for a company to identify and prioritize threats effectively. Curating the necessary relevant data for this strategy, however, can be incredibly time consuming and resource intensive. In this webinar, Greg Reith, Threat Intelligence Analyst at T-Mobile, will discuss how to use real-time threat intelligence from Recorded Future to create a forward-looking strategy, including: Identifying and analyzing hard-to-find threat data from the entire web including content in multiple languages.

Weaponizing Data Science for Social Engineering: Automated E2E Spear Phishing

ZeroFOX

Historically, machine learning for information security has prioritized defense: think intrusion detection systems, malware classification and botnet traffic identification. Offense can benefit from data just as well. Social networks, especially Twitter with its access to extensive personal data, bot-friendly API, colloquial syntax and prevalence of shortened links, are the perfect venues for spreading machine-generated malicious content.We present a recurrent neural network that learns to tweet phishing posts targeting specific users. The model is trained using spear phishing pen-testing data, and in order to make a click-through more likely, it is dynamically seeded with topics extracted from timeline posts of both the target and the users they retweet or follow. We augment the model with clustering to identify high value targets based on their level of social engagement such as their number of followers and retweets, and measure success using click-rates of IP-tracked links. Taken together, these techniques enable the world's first automated end-to-end spear phishing campaign generator for Twitter.

Stop SSL-Encrypted Attacks in their Tracks!

"Join us to learn how SafeNet Luna HSMs integrate with F5 Networks BIG IP load balancer to protect the integrity of the SSL communications."

Cybersecurity - Know the Risks and Protect Your Company

Hunton & Williams LLP

Cybersecurity and data privacy are among the most pressing issues facing companies today. Companies must proactively take steps to protect themselves against the risks arising from the loss or compromise of personal data, intellectual property and other proprietary information. This webinar will cover the privacy and cybersecurity issues faced by most global organizations, and explain steps that can be taken to reduce corporate risk arising from these issues.

Spotlight

Current market solutions are built to protect the enterprise and are too resource intensive for most organizations to manage. Learn about the five key components that any risk-based information security solution must include to cost effectively and efficiently protect information and meet regulatory requirements – regardless of industry, organization size and security skill set.

resources