Live and On-demand Cybersecurity Webinars

UPCOMING “LIVE” WEBINARS:

Stay tuned for December 2020 webinars…

MOST RECENT WEBINARS ON REPLAY:

The Top 5 Automated Attack Vectors Targeting Your Applications & Customers and How to Stop Them

Join us November 19, 2020 at 2pm EDT for an incredible, content rich webinar.

Sophisticated automated attacks and fraud actors are severely impacting applications, creating a heyday for cybercriminals to exploit stolen data and credentials for account takeover attacks. And like enterprises, bad actors are using automation to work faster and more efficiently. Today’s sophisticated attacks originates from infected consumer devices and mimics human behavior, flying under the radar of anomaly based detection methods.

The top 5 automated attack vectors that you need to protect your company from include:
• New Account Fraud
• Account Takeover
• Inventory Sniping
• Transaction Fraud
• Review Fraud

Speakers:

Dr. Russell Handorf, Principal Threat Intelligence Hacker, White Ops. 

BIO:  Dr. Russell Handorf works for White Ops as a Principal Threat Intelligence Hacker where he develops technology to detect and deter advanced botnets. He recently worked at the Federal Bureau of Investigation in Cyber Division’s Technical Operations Unit as a computer scientist where he developed and implemented technology that aided in the investigations of criminal and national security matters, served in and helped lead the Cyber Action Team in investigating some of the most critical investigative matters the FBI was pursuing at the time.

Frank Walsh, VP Solutions Engineering, White Ops

BIO: Frank Walsh brings extensive cyber technical leadership experience to his role as Vice President of Solutions Engineering. He manages the White Ops Global Sales Engineering Team and all enterprise security integration efforts connected to the White Ops platform. Frank’s experience spans leadership and development roles in design, integration and launch of cutting edge technology solutions used by millions of end-users across the globe.

Hosted by Gary S. Miliefsky, CISSP and Publisher of Cyber Defense Magazine.

Hacking Your Organization: 7 Steps Bad Guys Use to Take Total Control of Your Network

The scary fact is that human error is a contributing factor in more than 90% of breaches. With so many technical controls in place hackers are still getting through to your end users, making them your last line of defense. How are they so easily manipulated into giving the bad guys what they want? Well, hackers are crafty. And the best way to beat them is to understand the way they work.

In this webinar Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will take you through the “Cyber Kill Chain” in detail to show you how a single email slip up can lead to the total takeover of your network.

Roger will show you:
• How detailed data is harvested using public databases and surprising techniques
• Tricks used to craft a compelling social engineering attack that your users WILL click
• Cunning ways hackers deliver malicious code to take control of an endpoint
• Taking over your domain controller and subsequently your entire network

But not all hope is lost. Roger will also share actionable strategies you can put in place now to greatly reduce your risk. Find out how to protect your organization before it’s too late. Hosted by the Publisher of Cyber Defense Magazine, Gary S. Miliefsky, CISSP.

Connected, Complex & Converging: New Data on the Challenges Facing IT & OT Security in Manufacturing

Session Abstract:

The rise of Industry 4.0 and the growth of ‘smart factories’ are poised to deliver significant automation and financial benefits to manufacturers. However, as information technology (IT), operational technology (OT), and intellectual property (IP) converge, new security challenges come into focus.  Do today’s Manufacturing cybersecurity teams feel prepared to address the complexity these changes have created, particularly when it comes to threat detection and response? And are they embracing technologies that could help them overcome the limits of traditional security controls and ‘level the playing field’?  These are just some of the questions explored in a new survey report from ESG and TrapX Security.

In this live webinar, we’ll debut the results and hear what more than 150 security executives in all sectors of manufacturing had to say about:

  • The vulnerabilities within their current IT & OT infrastructure, and the persistent menace of cyberattacks
  • Why OT-specific security has become more difficult, and the impact on staff resources
  • The need to simplify security operations, and key areas for improvement
  • Their understanding of Deception, and its role in improving threat detection and response processes

Speakers:

Jon Oltsik 

Senior Principal Analyst & Fellow, ESG

Email: jon.oltsik@esg-global.com

LinkedIn: https://www.linkedin.com/in/jonoltsik/

Twitter: @joltsik

Steve Preston

SVP, Strategy & Growth

Email: steve@trapx.com

LinkedIn: https://www.linkedin.com/in/steve-preston-276b28/

Twitter: @StevePreston360

Hosted by…

Gary S. Miliefsky, CISSP®

Publisher, Cyber Defense Magazine

 

Twitter:  @Miliefsky

 

 

The 7 Secrets of Managed Detection and Response MDR to Achieve Enterprise-Class Security

Every year consists of constant change and 2020 is no exception. There is the constant change in the threat landscape, change in IT environments, and change in the form of new technologies and vendors which leads to confusion and complexity. The reality is no level of investment prevents or blocks 100% of attacks. Therefore, organizations must continuously identify and address breaches before they cause real damage but they are typically hampered with either limited budget and/or expertise.

Join Antonio Sanchez from Alert Logic as he discusses Managed Detection and Response (MDR). This new approach is gaining rapid traction for being able to achieve enterprise-class security while simplifying operations. Topics discussed during this session include:

• Understanding MDR
• Aligning to the NIST framework
• Seven Secrets (Must-Have’s) of MDR

Hosted by Gary S. Miliefsky, Publisher of Cyber Defense Magazine.

Speaker’s Bio
Antonio Sanchez serves as Senior Product Marketing Manager at Alert Logic. He has over 20 years in the IT industry focusing on cyber security, information management, and disaster recovery solutions to help organizations of all sizes manage threats and improve their security posture. Antonio is a Certified Information Systems Security Professional (CISSP) and has held various leadership roles at Symantec, Forcepoint, and Dell.

Eyes Wide Shut Cybersecurity Smoke & Mirrors and The Dawn of Cyber Transparency

ABOUT THE SPEAKER

Janine Darling, Founder & CEO, STASH Global. Janine is a Top 100 Women in Cybersecurity award winning CXO and Technical Strategist who has held prominent leadership roles for commercial product and service companies of multiple genres. Read more about her at: https://stash.global/ and her LinkedIn profile page, found here: https://www.linkedin.com/in/janinedarling1/

DESCRIPTION

This presentation will walk attendees down the path of ‘where did we come from, how did we get here, and where are we going’ regarding what until now has been the inexplicably unsolvable data privacy and security scourge plaguing the world. Through the use of a slide presentation containing graphics, statistics, general knowledge, and surprises, those attending will walk away with a more keen usable set of data points that can be utilized with confidence, as they assess their own data management risks and requirements particularly as they apply to their specific cybersecurity challenges.

ABSTRACT

Cybersecurity has become one of the most confounding and also profitable manifestations of modern life for attackers and defenders alike. The mission to eradicate data vulnerability and compromise has been taken up by thousands of big-name technology brands and emerging technology companies. The cyber echo chamber buzzes with exciting concepts: “zero trust”, “AI”, “machine learning”, “quantum computing”, “blockchain”. Yet to date, there have been 185M+ reported data breaches. What’s going on? Find out. This presentation will dive into creating a clearer picture of the difference between cybersecurity tools and actual solutions, what’s preventing ‘mission accomplished’ as it applies to data security, and what you can do about it. The outcome? Knowing how to more confidently prepare for and make the correct decisions on what to protect, why, and how in your organization.

Join our award winning speaker, Janine Darling and our Host, Gary Miliefsky, Publisher of Cyber Defense Magazine for this powerful, educational webinar.

Breakthrough in IAM Attacks and Defenses


It’s the Identity & Access Management (IAM) Defining Moment: Learn IAM Secrets from an Industry Leading Expert The COVID-19 pandemic has reset business operations as we know them. Digital transformation has now become a requirement for survival and those who are able to accelerate their transitions quickly, efficiently and effectively are emerging stronger. The “perimeter” as we know it, will never be the same. Accelerated by a drastic shift to remote work, the global enterprise Software-as-a-Service (SaaS) Market is expected to grow by 17% in 2020. Identity governance is business critical to effectively manage cybersecurity risk posed by this explosion in SaaS applications, creating a defining moment for Identity & Access Management. Join Doug Chin, VP of Identity & Access Management at Herjavec Group, and Gary S. Miliefsky, Publisher of Cyber Defense Magazine, as they speak to this unique moment in security. Doug will address current CISO and Practitioner challenges, and the ways in which Identity & Access Management, including two proprietary Herjavec Group solutions, are uniquely positioned to bridge the gap.

reversinglabs webinar

ReversingLabs Webinar On-demand Replay anytime by clicking here.

KnowBe4 Webinar On-demand Replay anytime by clicking here.

10 Incredible Ways to Hack Email & How to Stop the Bad Guys

Join our Keynote Speaker, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist and myself, Gary Miliefsky, Publisher of Cyber Defense Magazine for an incredibly enjoyable and informative session.

Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware! Join Roger Grimes as we explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. We will also share a special treat – a (pre-recorded) hacking demo by Kevin Mitnick.

You will learn:

  • How silent malware launches, remote password hash capture, and how rogue rules work
  • Why rogue documents, establishing fake relationships and getting you to compromise your ethics are so effective
  • Details behind clickjacking and web beacons
  • Actionable steps on how to defend against them all If all you were worried about were phishing attempts, think again!

About our Keynote Speaker

Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, is a 30-year computer security consultant, instructor, holder of dozens of computer certifications and an award-winning author of 10 books and over 1,000 magazine articles on computer security. He now serves as the Data-Driven Security Analyst for KnowBe4. He has worked at some of the world’s largest computer security companies, including Foundstone, McAfee and Microsoft. Grimes holds a bachelor’s degree from Old Dominion University. He was the weekly security columnist for InfoWorld and CSO magazines from 2005-2019.

 

Tony Cole, CTO of Attivo Networks presented a new approach to endpoint security…

cyber security webinars

Now That Ransomware Has Gone Nuclear, How Can Your Organization Avoid Becoming the Next Victim?

knowbe4 webinar

 

The Future of Work Has Arrived. Learn about Desktop as a Service (DaaS) from Industry Leading Experts.

better world webinar

BetterWorld

 

Game Changing Breach Defense by Dramatically Improving Endpoint Security

attivo webinar

Attivo Networks

 


Are you an INFOSEC expert who has a story to tell?  Do you have a product or solution that might help our readers (CIOs, CISOs, VPs of IT, IT execs, IT admins, SOC administrators, etc.) get one step ahead of the next threat?  Let us know and we’ll see if we can get you on our schedule.  These are exclusive webinars, hand picked each month and we’re only doing two per month so they are of the utmost value to our readership.  Email us at marketing@cyberdefensemagazine.com to learn more.

Gary S. Miliefsky is the publisher of Cyber Defense Magazine, a cybersecurity expert, keynote speaker, investor and entrepreneur. He loves to seek out the best and brightest speakers to discuss all things cybersecurity.