UPCOMING “LIVE” WEBINARS:

 

The issues regarding privilege escalation and lateral movement detection were a highlight of the SolarWinds Congressional hearings and in the news of many recent cyber heists. Compromising Active Directory has been a common element in all of these incidents and should be commanding every CISO’s attention. Join this webinar for a lively discussion and to learn:

• Why Active Directory is the attack vector of choice for 2021
• What challenges are associated with protecting AD and how to address them
• Ways to achieve better insight into AD cybersecurity hygiene and see potential risks
• What tools can simplify detection of live attacks on AD, without reviewing logs
• How to find rogue domain controllers, DCSync, DCShadow, and Golden Ticket attacks

I am also excited to share that the review team here at Cyber Defense Magazine recently put the new Attivo Networks Active Directory solution to the test. We found this new technology particularly interesting, given the laser focus that attackers have had on AD. Special guest, Dr. Peter Stephenson will join the webinar to share the findings from his research report.

Guest Speaker:
Carolyn Crandall is the Chief Security Advocate and CMO at Attivo Networks, the leader in preventing identity privilege escalation and detecting lateral movement attacks. She is a high-impact technology executive with over 30 years of experience in building new markets and successful enterprise infrastructure companies. She has a demonstrated track record of taking companies from pre-IPO through to multibillion-dollar sales at Cisco, Juniper Networks, Nimble Storage, Riverbed, and Seagate.

Special Guest:
Dr. Peter Stephenson, Director of Products Analysis, Cyber Defense Magazine. He was technology editor for several years for SC Magazine, for which he wrote for over 25 years. He is enabled in his research by an extensive personal research laboratory as well as a multi-alias presence in the Dark Web.

Hosted by Gary S. Miliefsky, CISSP, Publisher of Cyber Defense Magazine.


Today’s digital forensics teams face many challenges in a world filled with an overwhelming amount of data. From multiple office locations and geographically dispersed remote workers, incident response teams and IT staff working on internal and external incidents need deep visibility into live data directly at the endpoint without the knowledge or observation of the end-user. As breaches become more sophisticated, organizations need faster, more targeted enterprise-wide breach response teams, tools and techniques. In this webinar, the speaker will share his 7 secrets to data forensics best practices to teach you how you can respond quickly, remotely and covertly while maintaining chain of custody, and facilitate focused forensic investigations and post-breach analysis, without interruption to business operations. Our speakers will include a discussion about real-life scenarios and what the market is asking for in terms of digital forensics technologies.

About the Speakers:

Harsh Behl, Director of Product Management, Exterro   Harsh Behl is responsible for overseeing the entire product lifecycle for the AccessData legacy, now Exterro Forensic products, including the FTK® suite of products. As the air traffic controller for product releases, Harsh talks to customers and prospects in the market about their needs and pain points and has developed an in-depth knowledge of what the market is looking for from their forensic tools.

James Henderson, CEO, Insider Threat Defense Group (ITDG)   Mr. Henderson has over 15 years of experience protecting classified information up to the Top Secret SCI Level. He has been responsible for the development, implementation and management of: Insider Threat Programs, Cyber Security-Information Systems Security Programs, Information Assurance Programs, for U.S. Government, DoD, IC Agencies, Cleared Defense Contractors, State Governments, large and small businesses. The ITDG has provided training and services to over 640+ organizations.

Hosted by the Publisher of Cyber Defense Magazine, Gary S. Miliefsky, CISSP.


MOST RECENT WEBINARS ON REPLAY:

Phishing Attacks are the most prevalent attack vector for cyber crime. But hackers aren’t coming in through some backdoor… they are  strolling in through your front door – weak, insecure, or misconfigured email. The best way to defend against the latest wave of these highly effective and damaging cybercriminal attacks is to understand their exploitation methods against your company’s vulnerabilities.

During the webinar, the speaker will discuss:

  • Why phishing attacks are so prevalent
  • How emails are easily spoofed and breached
  • The biggest holes you should close to secure your email
  • The importance of securing your domain name
  • A quick overview of DKIM, SPF and the new BIMI protocols

Finally, the speaker will also share actionable strategies you can put in place immediately to greatly reduce your chances of becoming a victim of business email compromise (BEC), including their 5 secrets of hardening these vulnerabilities. Find out how to protect your organization before it’s too late!

Speaker

Rois Ni Thuama PhD

Head of Cyber Governance

RedSift.io

is head of Cyber Governance – Red Sift Limited.  She is a doctor of law and subject matter expert in cyber governance and risk mitigation and Head of Cyber governance for Red Sift; one of Europe’s fastest-growing cybersecurity companies. Working with key clients across a wide market spectrum including legal, finance, banking, and oil & gas and writes and presents on significant cyber threats, trends, and risk treatments.

Hosted by the Publisher of Cyber Defense Magazine, Gary S. Miliefsky, CISSP.

The Smart Approach to Building Comprehensive Cybersecurity Without Security Staff

Evolved cyber threats aren’t targeting just large enterprise businesses. The challenge is, organizations with limited security resources and staff can’t manage a complicated (and often expensive) cybersecurity program. So how do you build comprehensive cybersecurity plans, policies, procedures, education, training, scanning, remediation, and more across your entire organization?

February 18, 2021 at 2pm EDT for one hour

Join 20+ year security veteran, and Co-Founder of Defendify, Rob Simopoulos, who explains how a 24/7 cybersecurity program can be streamlined across people, process, and technology, without needing multiple complex tools or specialized security professionals on staff.

In this presentation you will learn smart steps to implement:

  • A cyber-solid foundation of plans, policies, and procedures.
  • A cyber-smart company culture of training and institutional knowledge.
  • Cyber-strong technology that goes beyond traditional anti-virus and firewalls.

Speaker:

Rob Simopoulos | Co-Founder  | Defendify

With more than 20 years of security experience, Rob is a frequent speaker and thought leader across security groups and publications. As Co-Founder of Defendify, Rob helped introduce the award-winning cybersecurity platform for small and mid-sized businesses that is trusted by thousands of users across the globe.

PKI-as-a-Service: Improve Security While Reducing Cost

ON-DEMAND – REPLAY ANYTIME – CERTIFICATE INCLUDED

In this webinar, we explore public key infrastructure as a service (PKIaaS) and how this time-tested solution will provide organizations with a secure, certificate-based strategy that reduces the threat landscape. A cloud-based PKIaaS solution can reduce the complexity and expense of a traditional PKI deployment while enhancing performance.

Learn how to unlock the full potential of this security solution, coupling it with endpoint automation to increase coverage, reduce human error and cost, and address today’s evolving landscape of remote employees.

In this webinar, you will:

  • Learn how PKIaaS can increase security while reducing complexity and costs
  • Get a roadmap for automating a certificate-based security strategy
  • Gain access to a checklist for choosing the best PKIaaS provider for your business

About The Speaker: Mrugesh Chandarana is a Senior Product Manager, Identity and Access Management Solutions at HID Global, where he focuses on IoT and PKI solutions. He has more than 10 years of cyber security industry experience in areas such as Risk Management, Threat and Vulnerability Management, Application Security and PKI. He has held product management positions at RiskSense, WhiteHat Security (acquired by NTT Security), and RiskVision (acquired by Resolver, Inc.).

Hosted by the Publisher of Cyber Defense Magazine, Gary S. Miliefsky, CISSP.

Stay Out of the Net: Your Ultimate Guide to Phishing Mitigation

REPLAY ON-DEMAND AT YOUR CONVENIENCE BY CLICKING HERE

Spear phishing emails remain the most popular attack avenue for the bad guys, yet most companies still don’t have an effective strategy to stop them. This enormous security gap leaves you open to business email compromise, session hijacking, ransomware and more. Don’t get caught in a phishing net! Learn how to avoid having your end users take the bait. This webinar, hosted by Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will cover a number of techniques you can implement now to minimize cybersecurity risk due to phishing and social engineering attacks. We won’t just cover one angle. We’ll come at it from all angles!

Strategies include:

  • Developing a comprehensive, defense-in-depth plan
  • Technical controls all organizations should consider
  • Gotchas to watch out for with cybersecurity insurance
  • Benefits of implementing new-school security awareness training
  • Best practices for creating and implementing security policies

About the Speaker:

Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, is a 30-year computer security consultant, instructor, holder of dozens of computer certifications and an award-winning author of 12 books and over 1,000 magazine articles on computer security. He now serves as the Data-Driven Security Analyst for KnowBe4. He has worked at some of the world’s largest computer security companies, including Foundstone, McAfee and Microsoft. Grimes holds a bachelor’s degree from Old Dominion University. He was the weekly security columnist for InfoWorld and CSO magazines from 2005-2019.

Hosted by the Publisher of Cyber Defense Magazine, Gary S. Miliefsky, CISSP.

Learn the Secrets of Unified Endpoint Management (UEM) to Boost End User Productivity

January 7, 2021 2-3pm EDT

REPLAY ON-DEMAND AT YOUR CONVENIENCE BY CLICKING HERE

* Uncover the best-practices holistic view of UEM that most IT folks don’t know
* Discover how to deal with user challenges including priviliged management
* Find out why mobile device management doesn’t have to be your biggest headache

and much more…presented by Jason Morano of Quest Software, hosted by Gary S. Miliefsky, Publisher of Cyber Defense Magazine.

About the Speaker
Jason Morano is a Senior KACE Presales Engineer at Quest Software, and a subject matter expert for endpoint and user security. He has a 20+ year career starting in IT support, then finishing his commercial IT career working as a security analyst in the banking industry. He has been advising Quest customers for 8 years in securing their endpoint and user environment using industry best practices. Currently residing in South Florida, and former Long Islander with a passion for anything technical.

 

The Top 5 Automated Attack Vectors Targeting Your Applications & Customers and How to Stop Them

Join us November 19, 2020 at 2pm EDT for an incredible, content rich webinar.

Sophisticated automated attacks and fraud actors are severely impacting applications, creating a heyday for cybercriminals to exploit stolen data and credentials for account takeover attacks. And like enterprises, bad actors are using automation to work faster and more efficiently. Today’s sophisticated attacks originates from infected consumer devices and mimics human behavior, flying under the radar of anomaly based detection methods.

The top 5 automated attack vectors that you need to protect your company from include:
• New Account Fraud
• Account Takeover
• Inventory Sniping
• Transaction Fraud
• Review Fraud

Speakers:

Dr. Russell Handorf, Principal Threat Intelligence Hacker, White Ops. 

BIO:  Dr. Russell Handorf works for White Ops as a Principal Threat Intelligence Hacker where he develops technology to detect and deter advanced botnets. He recently worked at the Federal Bureau of Investigation in Cyber Division’s Technical Operations Unit as a computer scientist where he developed and implemented technology that aided in the investigations of criminal and national security matters, served in and helped lead the Cyber Action Team in investigating some of the most critical investigative matters the FBI was pursuing at the time.

Frank Walsh, VP Solutions Engineering, White Ops

BIO: Frank Walsh brings extensive cyber technical leadership experience to his role as Vice President of Solutions Engineering. He manages the White Ops Global Sales Engineering Team and all enterprise security integration efforts connected to the White Ops platform. Frank’s experience spans leadership and development roles in design, integration and launch of cutting edge technology solutions used by millions of end-users across the globe.

Hosted by Gary S. Miliefsky, CISSP and Publisher of Cyber Defense Magazine.

Hacking Your Organization: 7 Steps Bad Guys Use to Take Total Control of Your Network

The scary fact is that human error is a contributing factor in more than 90% of breaches. With so many technical controls in place hackers are still getting through to your end users, making them your last line of defense. How are they so easily manipulated into giving the bad guys what they want? Well, hackers are crafty. And the best way to beat them is to understand the way they work.

In this webinar Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will take you through the “Cyber Kill Chain” in detail to show you how a single email slip up can lead to the total takeover of your network.

Roger will show you:
• How detailed data is harvested using public databases and surprising techniques
• Tricks used to craft a compelling social engineering attack that your users WILL click
• Cunning ways hackers deliver malicious code to take control of an endpoint
• Taking over your domain controller and subsequently your entire network

But not all hope is lost. Roger will also share actionable strategies you can put in place now to greatly reduce your risk. Find out how to protect your organization before it’s too late. Hosted by the Publisher of Cyber Defense Magazine, Gary S. Miliefsky, CISSP.

Connected, Complex & Converging: New Data on the Challenges Facing IT & OT Security in Manufacturing

Session Abstract:

The rise of Industry 4.0 and the growth of ‘smart factories’ are poised to deliver significant automation and financial benefits to manufacturers. However, as information technology (IT), operational technology (OT), and intellectual property (IP) converge, new security challenges come into focus.  Do today’s Manufacturing cybersecurity teams feel prepared to address the complexity these changes have created, particularly when it comes to threat detection and response? And are they embracing technologies that could help them overcome the limits of traditional security controls and ‘level the playing field’?  These are just some of the questions explored in a new survey report from ESG and TrapX Security.

In this live webinar, we’ll debut the results and hear what more than 150 security executives in all sectors of manufacturing had to say about:

  • The vulnerabilities within their current IT & OT infrastructure, and the persistent menace of cyberattacks
  • Why OT-specific security has become more difficult, and the impact on staff resources
  • The need to simplify security operations, and key areas for improvement
  • Their understanding of Deception, and its role in improving threat detection and response processes

Speakers:

Jon Oltsik 

Senior Principal Analyst & Fellow, ESG

Email: jon.oltsik@esg-global.com

LinkedIn: https://www.linkedin.com/in/jonoltsik/

Twitter: @joltsik

Steve Preston

SVP, Strategy & Growth

Email: steve@trapx.com

LinkedIn: https://www.linkedin.com/in/steve-preston-276b28/

Twitter: @StevePreston360

Hosted by…

Gary S. Miliefsky, CISSP®

Publisher, Cyber Defense Magazine

 

Twitter:  @Miliefsky

 

 

The 7 Secrets of Managed Detection and Response MDR to Achieve Enterprise-Class Security

Every year consists of constant change and 2020 is no exception. There is the constant change in the threat landscape, change in IT environments, and change in the form of new technologies and vendors which leads to confusion and complexity. The reality is no level of investment prevents or blocks 100% of attacks. Therefore, organizations must continuously identify and address breaches before they cause real damage but they are typically hampered with either limited budget and/or expertise.

Join Antonio Sanchez from Alert Logic as he discusses Managed Detection and Response (MDR). This new approach is gaining rapid traction for being able to achieve enterprise-class security while simplifying operations. Topics discussed during this session include:

• Understanding MDR
• Aligning to the NIST framework
• Seven Secrets (Must-Have’s) of MDR

Hosted by Gary S. Miliefsky, Publisher of Cyber Defense Magazine.

Speaker’s Bio
Antonio Sanchez serves as Senior Product Marketing Manager at Alert Logic. He has over 20 years in the IT industry focusing on cyber security, information management, and disaster recovery solutions to help organizations of all sizes manage threats and improve their security posture. Antonio is a Certified Information Systems Security Professional (CISSP) and has held various leadership roles at Symantec, Forcepoint, and Dell.

Eyes Wide Shut Cybersecurity Smoke & Mirrors and The Dawn of Cyber Transparency

ABOUT THE SPEAKER

Janine Darling, Founder & CEO, STASH Global. Janine is a Top 100 Women in Cybersecurity award winning CXO and Technical Strategist who has held prominent leadership roles for commercial product and service companies of multiple genres. Read more about her at: https://stash.global/ and her LinkedIn profile page, found here: https://www.linkedin.com/in/janinedarling1/

DESCRIPTION

This presentation will walk attendees down the path of ‘where did we come from, how did we get here, and where are we going’ regarding what until now has been the inexplicably unsolvable data privacy and security scourge plaguing the world. Through the use of a slide presentation containing graphics, statistics, general knowledge, and surprises, those attending will walk away with a more keen usable set of data points that can be utilized with confidence, as they assess their own data management risks and requirements particularly as they apply to their specific cybersecurity challenges.

ABSTRACT

Cybersecurity has become one of the most confounding and also profitable manifestations of modern life for attackers and defenders alike. The mission to eradicate data vulnerability and compromise has been taken up by thousands of big-name technology brands and emerging technology companies. The cyber echo chamber buzzes with exciting concepts: “zero trust”, “AI”, “machine learning”, “quantum computing”, “blockchain”. Yet to date, there have been 185M+ reported data breaches. What’s going on? Find out. This presentation will dive into creating a clearer picture of the difference between cybersecurity tools and actual solutions, what’s preventing ‘mission accomplished’ as it applies to data security, and what you can do about it. The outcome? Knowing how to more confidently prepare for and make the correct decisions on what to protect, why, and how in your organization.

Join our award winning speaker, Janine Darling and our Host, Gary Miliefsky, Publisher of Cyber Defense Magazine for this powerful, educational webinar.

Breakthrough in IAM Attacks and Defenses


It’s the Identity & Access Management (IAM) Defining Moment: Learn IAM Secrets from an Industry Leading Expert The COVID-19 pandemic has reset business operations as we know them. Digital transformation has now become a requirement for survival and those who are able to accelerate their transitions quickly, efficiently and effectively are emerging stronger. The “perimeter” as we know it, will never be the same. Accelerated by a drastic shift to remote work, the global enterprise Software-as-a-Service (SaaS) Market is expected to grow by 17% in 2020. Identity governance is business critical to effectively manage cybersecurity risk posed by this explosion in SaaS applications, creating a defining moment for Identity & Access Management. Join Doug Chin, VP of Identity & Access Management at Herjavec Group, and Gary S. Miliefsky, Publisher of Cyber Defense Magazine, as they speak to this unique moment in security. Doug will address current CISO and Practitioner challenges, and the ways in which Identity & Access Management, including two proprietary Herjavec Group solutions, are uniquely positioned to bridge the gap.

reversinglabs webinar

ReversingLabs Webinar On-demand Replay anytime by clicking here.

KnowBe4 Webinar On-demand Replay anytime by clicking here.

10 Incredible Ways to Hack Email & How to Stop the Bad Guys

Join our Keynote Speaker, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist and myself, Gary Miliefsky, Publisher of Cyber Defense Magazine for an incredibly enjoyable and informative session.

Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware! Join Roger Grimes as we explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. We will also share a special treat – a (pre-recorded) hacking demo by Kevin Mitnick.

You will learn:

  • How silent malware launches, remote password hash capture, and how rogue rules work
  • Why rogue documents, establishing fake relationships and getting you to compromise your ethics are so effective
  • Details behind clickjacking and web beacons
  • Actionable steps on how to defend against them all If all you were worried about were phishing attempts, think again!

About our Keynote Speaker

Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, is a 30-year computer security consultant, instructor, holder of dozens of computer certifications and an award-winning author of 10 books and over 1,000 magazine articles on computer security. He now serves as the Data-Driven Security Analyst for KnowBe4. He has worked at some of the world’s largest computer security companies, including Foundstone, McAfee and Microsoft. Grimes holds a bachelor’s degree from Old Dominion University. He was the weekly security columnist for InfoWorld and CSO magazines from 2005-2019.

 

Tony Cole, CTO of Attivo Networks presented a new approach to endpoint security…

cyber security webinars

Now That Ransomware Has Gone Nuclear, How Can Your Organization Avoid Becoming the Next Victim?

knowbe4 webinar

 

The Future of Work Has Arrived. Learn about Desktop as a Service (DaaS) from Industry Leading Experts.

better world webinar

BetterWorld

 

Game Changing Breach Defense by Dramatically Improving Endpoint Security

attivo webinar

Attivo Networks

 


Are you an INFOSEC expert who has a story to tell?  Do you have a product or solution that might help our readers (CIOs, CISOs, VPs of IT, IT execs, IT admins, SOC administrators, etc.) get one step ahead of the next threat?  Let us know and we’ll see if we can get you on our schedule.  These are exclusive webinars, hand picked each month and we’re only doing two per month so they are of the utmost value to our readership.  Email us at marketing@cyberdefensemagazine.com to learn more.

Gary S. Miliefsky is the publisher of Cyber Defense Magazine, a cybersecurity expert, keynote speaker, investor and entrepreneur. He loves to seek out the best and brightest speakers to discuss all things cybersecurity.