Hunting Hackers in the Carding Underground

"The rise in e-commerce data breaches over the past year raises important questions: Why is cardholder data such a big target, how do the bad guys get in and why are we seemingly powerless to stop them?

This session will examine the black market for card data, the three most common attack vectors, and the wrong way to encrypt databases.

You will see real-world examples of malware discovered during investigations and gain insights into the skill sets of each attacker"
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Unlock Your AppSec Future: Web App Security without Tradeoffs

We see you, exhausted security professionals. Web attack surfaces are growing unchecked, but your teams aren’t. You don’t even have your apps mapped, much less scanned regularly. The apps you do test have more vulnerabilities than you can remediate — how do you prioritize?
Watch Now

Transform Security and Risk Into a Business Function: A Panel Discussion

Gartner

As organizations and governments race towards digital transformation, they expose themselves to a variety of risks that traditional information and cybersecurity practices are not accustomed to encountering. In the face of technology evolution, regulatory complexity, an increasing threat landscape and limited resources, will security and risk leaders be able to align to the ambitious goals set by their business leaders? In this unique complimentary live video discussion, 4 leading Gartner security & risk experts debate how the nature of risks are evolving and what you can do to transform security and risk into a business function.
Watch Now

Cyber Threat Hunting: Identify and Hunt Down Intruders

InfoSec Institute

Are you red team, blue team — or both? Get an inside look at the offensive and defensive sides of information security in our upcoming webinar series. Senior security researcher and InfoSec Instructor Jeremy Martin discusses what it takes to be modern-day threat hunter during this on-demand webinar, Cyber Threat Hunting: Identify and Hunt Down Intruders. The webinar covers: The job duties of a Cyber Threat Hunting professional.
Watch Now

ON-DEMAND WEBINAR Best Practices for Implementing a Cyber-Physical Convergence Strategy

Security leaders need comprehensive strategies that take both physical security and cybersecurity into account. This session covers: How to develop a holistic security strategy How to implement a framework to align both security functions How to bridge the gap between cyber and physical security operations How to leverage data-d
Watch Now