How to Enforce Threat Intelligence at Your Perimeter

HealthcareInfoSecurity

Be it public, commercial, or private, cyber threat intelligence comes from many different sources and plays a vital role in an organization's cybersecurity strategy. But threat intelligence by itself is useless unless it can be made actionable. So once you have that intelligence in hand, how do you enforce it at the perimeter of your network? Register for this webinar and learn about: Utilizing threat intelligence from a variety of sources; How stateless technology at the network perimeter can take the load off stateful devices such as NextGen Firewalls.
Watch Now

Spotlight

It’s great to be here with you all today. The U.S. Embassy strongly supports Kosovo’s efforts to increase its cybersecurity capabilities, both in the public and private sectors.  I am glad to see so many other people here who share that commitment, especially the Prime Minister, the Speaker, other members of Kosovo’s Government, civil society, private businesses, it is great to be here with you all. In 2018, cybersecurity experts foresee various new developments and risks in things such as ransomware, artificial intelligence, and other issues. In the next few days you all will discuss and debate topics as varied as national security, cyber education, cyber bullying, and fake news.  These are all extremely interesting, important and salient topics for today. These issues have a profound impact on our daily lives and will shape our children’s future.  They are vital to our economic prospects, our politics and the development and openness of our civil societies.

OTHER ON-DEMAND WEBINARS

Aligning Security Solutions with MITRE ATT&CK

LogRhythm

The MITRE ATT&CK framework is quickly growing in popularity as an effective method to get on the offense of threat detection and response. In this webinar, presenters go beyond definitions and demonstrate how to apply the MITRE ATT&CK framework to your security monitoring. Paul Asadoorian and Matt Alderman of Security Weekly provide an overview of the MITRE ATT&CK framework, discuss how to prioritize the capabilities of the framework, and review some of the existing open source tools for testing/mapping to MITRE.
Watch Now

Active Directory Best Practices to Frustrate Attackers

Black Hills Information Security

Active Directory out of the box defaults aren’t enough to keep your network safe. Here’s the word on the street about frustrating attackers in your Active Directory environment. It’s easy to make things hard. But it’s not hard to make things easy. Spin that how you will, running Active Directory efficiently isn’t necessarily easy, but it certainly can be easy to make things hard for attackers in your environment. Here are some baseline things you can do to make your Active Directory environment frustrating for attackers. Attackers’ main resource is time, and if you can slow them down and frustrate them, you have a better chance of making attackers look for easier targets, or at least more time for your response team to identify and protect your assets.
Watch Now

11 Ways to Defeat Two-Factor Authentication

KnowBe4

Everyone knows that two-factor authentication (2FA) is more secure than a simple login name and password, but too many people think that 2FA is a perfect, unhackable solution. It isn't! Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, and security expert with over 30-years experience, for this webinar where he will explore 11 ways hackers can and do get around your favorite 2FA solution. The webinar includes a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick, and real-life successful examples of every attack type. It will end by telling you how to better defend your 2FA solution so that you get maximum benefit and security.
Watch Now

Live Broadcast: Be Empowered to Threat Hunt in 2019

Carbon Black

New research from Carbon Black shows that cyberattacks are becoming more frequent and more sophisticated, as nation state actors and crime syndicates continue to leverage fileless attacks, lateral movement, island hopping and counter incident response in an effort to remain undetected. This issue is compounded by resources and budgeting. Not only is there a major talent deficit in cybersecurity, there is also a major spending delta. What’s more, according to Carbon Black’s research, businesses are largely unaware about the scale, scope, and sophistication of modern attacks.
Watch Now

Spotlight

It’s great to be here with you all today. The U.S. Embassy strongly supports Kosovo’s efforts to increase its cybersecurity capabilities, both in the public and private sectors.  I am glad to see so many other people here who share that commitment, especially the Prime Minister, the Speaker, other members of Kosovo’s Government, civil society, private businesses, it is great to be here with you all. In 2018, cybersecurity experts foresee various new developments and risks in things such as ransomware, artificial intelligence, and other issues. In the next few days you all will discuss and debate topics as varied as national security, cyber education, cyber bullying, and fake news.  These are all extremely interesting, important and salient topics for today. These issues have a profound impact on our daily lives and will shape our children’s future.  They are vital to our economic prospects, our politics and the development and openness of our civil societies.

resources