Catch me if you can: The Hunt for Hidden Botnets

"Botnet sophistication is increasing at an astonishing speed. Malicious actors continually use new resources and develop new methods for attacking organisations for a myriad of reasons but with a simple purpose; to look for vulnerabilities in the whole operating environment and compromise an organisation’s security.

It is estimated that about 16% to 25% of Internet traffic in the world comes from communication between various types of malware. Without an adaptive security approach it becomes challenging for any organisation to process and analyse the sheer volume of data being generated, which is why a different approach is critical. It should involve identifying botnet activity using new methods, leveraged on automation and machine learning techniques, which are best suited to help tackle this challenge.

Join João Gouveia, CTO of AnubisNetworks for a discussion focused on the most common botnet evasion techniques and how to fight them. This webinar will highlight Cyberfeed’s (AnubisNetworks threat intelligence solution) capabilities, to present a cutting edge approach on botnet activity identification, related traffic and risk level."
Watch Now

Spotlight

Webroot commissioned a study to gauge the prevalence of web-borne attacks, their consequences and how IT pros are responding. Among the results: the vast majority of companies surveyed experienced one or more types of web-borne attacks in 2012. The survey report also includes recommendations - such as deploying a secure web gateway - for responding to this new threat environment.


OTHER ON-DEMAND WEBINARS

"Rethinking Risk in the Application Economy"

CA technologies

"Join BT Security and CA Technologies for a webcast that defines a new approach to identity and access management. Attend the webcast and discover: • How in the application economy, user identities have become the new security perimeter. • Why so many IT teams are unprepared to contend with the escalating demands of identity and access management. • How organizations can adopt a cloud-based identity and access management approach that strengthens security and enhances the user experience, while reducing ongoing costs, risks and complexity"

How Well Prepared Are You For The Next Security Threat?

"Each and every day you face the risk of your network being hacked by the newest zero-day threat. Not long ago, it was the HeartBleed bug and then the IE vulnerability. And, while you’re still working to defend your infrastructure from these two critical threats, the cybercriminal community is working just as hard trying to exploit the weaknesses of your network. So how well are you prepared for the next attack? Florian Malecki, Product Marketing & Solution Director for EMEA at Dell Software discusses the threat landscape and suggests ways that you can take advantage and achieve ongoing protection"

M-Trends 2018 - Understanding Today's Cyber Attack Trends

BrightTALK

Every year consultants from Mandiant, a FireEye company, respond to a wide variety of cyber incidents by threat groups around the world. This experience is summarized in the annual M-Trends report, which explores changes in the cyber threat landscape. During this webinar, Managing Director Chris Nutt and Vice President Russell Teague will discuss: - Longer-term trends in today's threat landscape - Sophisticated and harmful APT groups to look out for - Which organizations are most likely to be retargeted by attackers - The difficulty of finding skilled personnel and how it affects the security function - How weaknesses in security fundamentals contributed to successful compromises - Best practice red teaming tactics for improved security defense.

Best Practices in Major Incident Management Communications

"If your data, services and processes become compromised, your business can suffer irreparable damage in minutes. The clock is ticking, and how fast you communicate to your major incident resolution team is everything. Join Scott Bowler, Manager of IT Delivery Management Services, NBN Co, and Abbas Haider Ali, CTO of xMatters and learn how NBN Co identifies major incidents and uses best practices for automating their communication processes to resolve major IT incidents quickly and effectively."

Spotlight

Webroot commissioned a study to gauge the prevalence of web-borne attacks, their consequences and how IT pros are responding. Among the results: the vast majority of companies surveyed experienced one or more types of web-borne attacks in 2012. The survey report also includes recommendations - such as deploying a secure web gateway - for responding to this new threat environment.

resources