Clear and Present Danger

"Criminal activity is being reported before our eyes in the news and it could be infiltrating your organization -threatening your brands trust and even your job.

There is clear and present danger - whether you know it or not.

Hear from Kevin Kennedy, VP of Product at Agari, as he examines a real life phishing attack, what impact it had on the person and company who was phished, and what strategies CISOs need to know in order to protect their own organization"
Watch Now


By introducing the Oracle Zero Data Loss Recovery Appliance (Recovery Appliance) - a turnkey data protection appliance integrated into the Oracle ecosystem - Oracle has shed light on database-centric backup/recovery problems and helped database administrators (DBAs) solve them. The Recovery Applianc


" Intelligence Redux: Injecting Threat Intelligence into Your Security Organization"


With the escalation of data breaches and threat impacts, there is an ever increasing emphasis on integrating threat intelligence tools and technologies into an organization’s security program. In this presentation, we discuss the challenges and pitfalls associated with creating a true threat intelligence program as well as offer potential solutions for the practitioner to consider.

After the Data Breach: Stolen Credentials

Security Boulevard

When usernames and passwords are compromised in a data breach, the consequences extend far beyond the victim organization due to rampant password reuse. For this reason, NIST recently recommended that organizations check users’ credentials against a set of known compromised passwords. However, by patroning dark web forums and paying for spilled credentials, enterprises indirectly support the criminal ecosystem. Furthermore, attackers often don’t publicly post stolen data until months or years after the breach, if at all. Is there a better way to follow NIST guidelines and protect users from account takeover? Join Justin Richer, co-author of NIST Digital Identity Guidelines 800-63B, and Gautam Agarwal, Shape's Senior Director of Product Management, for a lively discussion on NIST’s password recommendations and how best to prevent account takeover fraud at your organization.

Outgunned in Cyberspace – Can Your Company Defend Itself

Are you currently compromised? How would you detect it if you are? What is the worst case business scenario if you are breached?2014 is called The Year Of The Breach. A report from FireEye found that, during a study of over 1200 real world production networks, 96 percent of those networks had experienced a breach.

ATT&CK Deep Dive: Lateral Movement

Carbon Black

Join Red Canary, Carbon Black, and MITRE ATT&CK™ for a deep dive into lateral movement detection. This hands-on webinar will demonstrate how applying lateral movement detection tactics and techniques can help you find higher level actors in your environment and improve the efficacy of your security program.