"Incident Response - What Is (and Isn't) Working Today"

"Incident response is a hot topic among the SANS audience. In SANS' 2014 survey on Incident Response, only 9% of organizations felt their incident response process were ""very effective,"" yet the majority of respondents operated under the assumption that they will be breached. This two-part webcast will focus on what is and isn't working for incident responders, what they can do about it, and how they can become more proactive in responding to incidents.

Part 1 of this webinar will include:
- A look at incident response expectations and the realities responders face
- The state of incident response policies and practices
- How those policies and practices have changed since the 2014 survey "
Watch Now


In less than 300 seconds you can experience the speed and intensity of a cyber attack. Today companies can defend themselves, taking control of the situation - effectively fighting back. Are you prepared?


Webroot’s 2015 Threat Brief Preview

This presentation provides an overview of the threats against a wide range of organizations and individuals during 2014. This overview is based on research and analysis conducted by the Webroot Threat Research team. The report includes analysis of IP addresses associated with malicious activity, details on the reputation of URLs by category and location, phishing detection statistics, insights into file reputation and encounter rates with malware and PUAs and information on mobile app security for Android devices. All data presented comes from Webroot’s Intelligence Network and was observed during 2014
Watch Now

Understanding your Attack Surface - Research into FT30 organisations


Businesses are accelerating their digital transformation, expanding their online presence to enrich products, deepen customer relationships, and boost their brand ecosystems. However, with this rapid growth comes security challenges as web assets get created outside of corporate controls and the overall Internet presence expands to unmanageable proportions.
Watch Now

"Zero Day, Zero Effect: Examining the Clandestine Wolf Zero-Day"


"Triage and remediation of attacks utilizing zero-day vulnerabilities requires technology, intelligence, and expertise that is often beyond the capabilities of most security teams today. With Clandestine Wolf, the name our security team gave to a recent zero-day campaign exploiting an Adobe Flash vulnerability, our analysts were able to validate the alert and begin response within minutes after first observing the attack. In this webinar Ben Withnell, a FireEye as a Service (FAAS) incident analyst, will discuss how the Clandestine Wolf campaign was discovered, triaged, and remediated across the FireEye as a Service customer base. Throughout the webinar he will also share his insights into how our analysts handle APT threats, the attacker lifecycle, and remediation tactics."
Watch Now

Why you need to reconsider the OLD approach to Network Security

Think your current approach to network security is lacking the next generation approach? You might be right! Join us for this webinar where Chris Rodriquez, Senior Analyst at Frost and Sullivan, will share current best practices in network security. He’ll cover approaches to network security hardware and software that will help your organization plan for the evolving threat landscape. Marco Ginocchio, Director of Regional Product Management from HP, will discuss how some of the next generation approaches to network security are being actualized in HP TippingPoint products.
Watch Now