Threat Intelligence at Levi Strauss: A Perfect Fit

"Levi Strauss & Co., one of the world’s largest brand name apparel companies and a global leader in jeanswear, enhances its security with threat intelligence to better protect its worldwide operations — including its online and physical stores.

Listen to Harris D. Schwartz, Head of Global Cyber Security at Levi Strauss & Co., explain how Levi Strauss applies real-time threat intelligence to monitor the most critical risks, direct threats, and emerging trends that could impact the organization. Schwartz explains how threat intelligence is used for:

* Real-time alerts on direct cyber threats made on the deep and dark Web including hacker forums.
* Monitoring threats against IT infrastructure, domain, or IPs (CIDR).
* Notifications about breached/exposed credentials.
* Warnings about exploits/attacks/threats/breaches related to suppliers, industry peers, and vendors.
* Creating a daily email digest of top trending and emerging observables: TTPs, including malicious IPs, CVEs, hackers, and more."
Watch Now


CSO Online talks to Wolfgang Goerlich at CircleCityCon about looking outside the InfoSec space for fresh perspectives on how to improve.


The End Point Protection Conundrum: Inside Looking Out or Outside Looking In?

"Advanced Threat Protection (ATP) has taken on a life of its own over the past year. Despite some differences, most solutions tend to agree on the type of protection needed for the core network. Where things start to come apart is when you introduce the end user into the equation and how to protect the network from an internal error, deliberate maliciousness or even criminal intent. End point protection, in all of its various forms, must be a key component of any ATP solution and integrated into the process of Prevent, Detect and Mitigate. This session will focus on the overall issue and how the Fortinet ATP solution addresses this matter"

10 Incredible ways you can be hacked through email and how to stop the bad guys


Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware! Join us and Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, as we explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Plus, we'll share a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick.

Security Baseline - The First Line of Weapon Delivery Defense


Even though many traditional defense mechanisms can be circumvented, it is essential that a proactive, layered, defense security program be put in place and managed effectively. Here we describe many of the latest complimentary technologies in each area, such as NGF/UTM, DDoS, advanced authentication and virtualization, as well as the associated best practices and their governance.

Network Security Platform 8.2

"With the release of McAfee’ Network Security Platform 8.2, customers now have access to the industry’s most comprehensive Threat Inspection Platform. NSP Version 8.2 delivers a comprehensive new inspection feature set that helps IT departments address their malware concerns, far beyond what other competitors can provide. Attend this webinar to learn: •What’s new in McAfee Network Security Platform 8.2 •How the about the new ground breaking Advanced Threat Inspection features now available on the Network Security Platform •Understand how to position it successfully against the competition."