Lessons Learned From the Hack of the DNC and Other Incidents

Gartner

The cause and consequence of several pivotal hacking incidents. What attack tradecraft and techniques will trickle down to the consumer attack community. What you can do to prevent incidents from causing major disruptions in your organization. As we have often heard, "Those who cannot remember the past are condemned to repeat it." This session examines major hacking incidents, including the recent hack of the Democratic National Committee, to look for lessons learned, to predict future attack trends and to outline defensive strategies to address these trends.
Watch Now

Spotlight

Java vulnerabilities have dominated the security headlines. Some observers now say organizations should simply turn off the ubiquitous software platform. But what if there were a better way?  What’s needed is a more considered, holistic approach. A defense-in-depth strategy, with overlapping layers of protections, backed up by flexible application whitelisting, to address, not just Java vulnerabilities, but the security profile of your entire IT infrastructure.


OTHER ON-DEMAND WEBINARS

On-Demand Webinar: Your path towards better automotive software. Part 1 - The road towards better automotive cybersecurity

Rogue Wave

Automotive safety has been a major concern for manufacturers everywhere and now the threat of automotive hacking looms. Your team may be familiar with safety standards and defensive coding techniques but do you know how to handle security threats at the code level? What can you do next to transform your processes and development strategies? Join automotive experts from Rogue Wave Software for the first in a three-part series on securing your code and solidifying processes to ensure safe, defect-free software. By educating teams and understanding proven techniques, you’ll be able to take the next step towards less risk and more value for your applications.

The Rising Threat of DDoS Attacks

DDoS attacks are nothing new, but research from various infosec vendors shows they are on the rise. This webinar will look at the threat posed by DDoS attacks and the methods that attackers use to carry them out. A panel of industry experts will consider the increasing array of devices being used to perform DDoS attacks, and how manufacturers and administrators can do more to prevent devices being exploited for use by hackers.

The Microsoft Unit

"Cybercrime impacts millions of people around the world. David Finn, Executive Director of the Microsoft Digital Crimes Unit, gives you a behind the scenes look at how Microsoft is going on the offensive to stop criminals, refer perpetrators to law enforcement, and create a safe digital world."

Reduce Threat Containment Time from 7 Days to 7 Minutes with Palo Alto Networks

Today’s cyber threats are targeted, difficult to detect, and require significant manual intervention and expertise to contain. They traverse different domains of IT management -- making it a cross-functional challenge to trace and find the threat’s electronic foothold. Silos of security information require manual correlation to bridge the gap between security event alerts and endpoints infected with zero-day malware. Moreover, the increasing volume of security events that need to be triaged makes it impractical to respond and remediate threats manually.

Spotlight

Java vulnerabilities have dominated the security headlines. Some observers now say organizations should simply turn off the ubiquitous software platform. But what if there were a better way?  What’s needed is a more considered, holistic approach. A defense-in-depth strategy, with overlapping layers of protections, backed up by flexible application whitelisting, to address, not just Java vulnerabilities, but the security profile of your entire IT infrastructure.

resources