Cryptocurrency Fraud and Blockchain Forensic Analysis

Bank information security

When a total of $580 Million left two Cryptocurrency exchanges after a sophisticated compromise, LIFARS team was engaged in an investigation that involved FBI, US Secret Service, Europol, DHS, IRS and DOJ. This session will take you exclusively inside that investigation and discuss: Cryptocurrency fraud schemes, including real stories from the trenches; AML issues with bankers, hidden assets, payments by drug lords and ransomware; Blockchains role in tracking the transactions - and its limits.
Watch Now

Spotlight

Eine AI-gestützte Lösung zum Schutz vor Bedrohungen verhilft Ihnen zu einer Sicherheitsstrategie, die den aktuellen Anforderungen gewachsen ist. In einer Umgebung, in der wertvolle Assets und sensible Daten digital gespeichert sind, lassen potenzielle Angreifer nicht lange auf sich warten. Ihr erklärtes Ziel: Sicherheitslücken z

OTHER ON-DEMAND WEBINARS

Identity Security on the Rails: Simple Solutions to Disrupt Identity-Based Attacks

In today’s distributed work environment, Identity is the new perimeter, so it should come as no surprise that attackers consider identities both on-premises and in the cloud as High-Value Targets. With a valid identity, attackers can move laterally, escalate privileges, identify critical servers, and execute damaging attacks. Fortunately, Identity Security addresses identity risks and detects identity-based attacks.
Watch Now

Advanced Threat Hunting & Incident Response with CB ThreatHunter

Carbon Black

Enterprise security teams struggle to get their hands on the endpoint data they need to investigate and proactively hunt for abnormal behavior. Security and IT professionals currently lack the ability to see beyond suspicious activity and need a way to dive deeper into the data to make their own judgments. Start leveraging unfiltered data to make the most of your threat hunt. CB ThreatHunter - on our Predictive Security Cloud - allows for just that. Join our webinar to learn about: Our best-of-breed threat hunting. How to utilize unfiltered data gathered from all protected endpoints.
Watch Now

Aligning Security Solutions with MITRE ATT&CK

LogRhythm

The MITRE ATT&CK framework is quickly growing in popularity as an effective method to get on the offense of threat detection and response. In this webinar, presenters go beyond definitions and demonstrate how to apply the MITRE ATT&CK framework to your security monitoring. Paul Asadoorian and Matt Alderman of Security Weekly provide an overview of the MITRE ATT&CK framework, discuss how to prioritize the capabilities of the framework, and review some of the existing open source tools for testing/mapping to MITRE.
Watch Now

Extend your Attack Surface Coverage with No SIEM Required

Alert Logic

Attend this webinar to learn about new capabilities that Alert Logic has added that extends attack surface coverage for Endpoint, Multi-Cloud, and Dark Web. Get broader detection and response for less effort and lower cost with no SIEM required.
Watch Now

Spotlight

Eine AI-gestützte Lösung zum Schutz vor Bedrohungen verhilft Ihnen zu einer Sicherheitsstrategie, die den aktuellen Anforderungen gewachsen ist. In einer Umgebung, in der wertvolle Assets und sensible Daten digital gespeichert sind, lassen potenzielle Angreifer nicht lange auf sich warten. Ihr erklärtes Ziel: Sicherheitslücken z

resources