"Zero Day, Zero Effect: Examining the Clandestine Wolf Zero-Day"

"Triage and remediation of attacks utilizing zero-day vulnerabilities requires technology, intelligence, and expertise that is often beyond the capabilities of most security teams today. With Clandestine Wolf, the name our security team gave to a recent zero-day campaign exploiting an Adobe Flash vulnerability, our analysts were able to validate the alert and begin response within minutes after first observing the attack.
In this webinar Ben Withnell, a FireEye as a Service (FAAS) incident analyst, will discuss how the Clandestine Wolf campaign was discovered, triaged, and remediated across the FireEye as a Service customer base. Throughout the webinar he will also share his insights into how our analysts handle APT threats, the attacker lifecycle, and remediation tactics."
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Whitehouse-driven Cyber Security Strategy and How it affects your Business

Join Presidio's very own Dan Lohrmann (author of Cyber Mayday and the Day After), and Andy Richter (author of Practical Deployment of Cisco Identity Services Engine (ISE): Real-World Examples of AAA Deployment) as we discuss the new Whitehouse-driven cyber security strategy and how it affects your business.
Watch Now

Securing CI/CD Pipelines Through Security Gates

CI/CD pipeline security has become a pressing issue for DevOps and DevSecOps teams. With today's frameworks and best practices, various security gates can be applied through the CICD process from writing the very first line of YAML in the CI, and later to the CD process.
Watch Now

Aligning Security Solutions with MITRE ATT&CK

LogRhythm

The MITRE ATT&CK framework is quickly growing in popularity as an effective method to get on the offense of threat detection and response. In this webinar, presenters go beyond definitions and demonstrate how to apply the MITRE ATT&CK framework to your security monitoring. Paul Asadoorian and Matt Alderman of Security Weekly provide an overview of the MITRE ATT&CK framework, discuss how to prioritize the capabilities of the framework, and review some of the existing open source tools for testing/mapping to MITRE.
Watch Now

Breaking the phishing line

WorkCast

It’s no surprise that phishing and business email compromises, commonly called CEO Fraud, continue to flourish. Why? Because it is fast, easy, and despite security training, users still click on attacks. This 20/20 webcast looks beyond user training at how technology can address the challenges of modern phishing without reducing productivity or presenting users with potentially problematic emails.It’s no surprise that phishing and business email compromises, commonly called CEO Fraud, continue to flourish. Why? Because it is fast, easy, and despite security training, users still click on attacks.
Watch Now