The Biggest Threat To Enterprises Comes on the Smallest Screen

The growth of mobile devices has already led to a significant rise in network attacks on wireless networks. With the recent wave of attacks like Shellshock, WireLurker, and now DoubleDirect, security professionals are predicting that 2015 will be the year previously undetected mobile attacks go mainstream. Hear from mobile security experts Zuk Avraham and Patrick Murray as together they explain how a mobile device changes the threat landscape forever. Learn how unsecured mobile devices provide a new entry point for hackers looking to infiltrate and compromise an organization. Zuk will dissect DoubleDirect, a new attack technique recently found in the wild by the Zimperium Security Labs to show how an iOS and Android device can be silently attacked. Patrick will share best practices to help modern enterprises securely embrace mobility initiatives for 2015 that support productivity, protect the corporate network and respect user privacy
Watch Now

Spotlight

What does it take to become a cyber security expert? Jim Holcomb, Associate Security Consultant at Evolve Security shares advice on what you can do to join the cyber security industry. Want to learn more about cyber security? Join Evolve Security Academy, an immersive and competitive Cyber Security Bootcamp. Evolve Security Academy offers two bootcamps: Bootcamp PRO and Bootcamp REMOTE. Evolve students receive a hands-on holistic curriculum and the concrete and practical skills they will actually need on the job. With 350,000 unfilled cyber security jobs in the U.S., our primary focus is on creating top-tier cyber security talent to solve this labor shortage.


OTHER ON-DEMAND WEBINARS

Consumer awareness of cyber security in a hyper-connected home

Allot

Incidents of attacks against smart-home devices are often featured in the media. But what is the consumer’s perception? And who is best positioned to deliver cyber-security services - traditional security vendors or the ISP? To find out, we surveyed 1250 consumers from 10 countries. Discover how consumers responded when asked: How concerned are you that devices in your home are being hacked? Who would you turn to if you needed to secure your entire connected home? How much would you be willing to pay for a home cyber-security service.

3 Challenges of Threat Hunting Using Endpoint Detection (EDR) Tools

Infocyte

In this webinar, we compare Forensic State Analysis (FSA) cyber threat hunting against three traditional methods of cyber threat hunting… Expert threat hunter Chris Gerritz looks at the pitfalls of relying on Endpoint Detection (EDR) software as a substitute for proactive threat hunting, and examine some of the common misconceptions. He will also show how FSA arms security practitioners with an effective and efficient methodology to hunt without relying solely on sophisticated security infrastructure, big data or experts.

Ask an expert: How to start and advance your cybersecurity career

InfoSec Institute

Ever wish you had a cybersecurity expert on-call to answer your career questions? Here’s your chance! In this open Q&A webinar, Keatron Evans, Infosec instructor and Managing Partner at KM Cyber Security, will answer anything and everything related to getting started in cybersecurity and helping take your career to the next level. Submit your questions before the webinar for your chance to win a year’s subscription to Infosec Skills, our new on-demand training platform. Or simply join us on June 28 at 11 a.m. Central see what’s on the minds of your fellow infosec professionals.

Prioritizing Cyber Threats With Real-Time Threat Intelligence

T-Mobile

Creating a threat intelligence strategy is essential for a company to identify and prioritize threats effectively. Curating the necessary relevant data for this strategy, however, can be incredibly time consuming and resource intensive. In this webinar, Greg Reith, Threat Intelligence Analyst at T-Mobile, will discuss how to use real-time threat intelligence from Recorded Future to create a forward-looking strategy, including: Identifying and analyzing hard-to-find threat data from the entire web including content in multiple languages.

Spotlight

What does it take to become a cyber security expert? Jim Holcomb, Associate Security Consultant at Evolve Security shares advice on what you can do to join the cyber security industry. Want to learn more about cyber security? Join Evolve Security Academy, an immersive and competitive Cyber Security Bootcamp. Evolve Security Academy offers two bootcamps: Bootcamp PRO and Bootcamp REMOTE. Evolve students receive a hands-on holistic curriculum and the concrete and practical skills they will actually need on the job. With 350,000 unfilled cyber security jobs in the U.S., our primary focus is on creating top-tier cyber security talent to solve this labor shortage.

resources