SC Media webcasts | IT Security

Webcasts

UPCOMING WEBCASTS

This form filters webcasts that are directly below it based on the options given. Filtering will occur immediately when an option is selected or when the form is reset.
Show:
Vendor Webcast
Post pandemic preparedness: A security & IT perspective

Post pandemic preparedness: A security & IT perspective

How Cloud Native Endpoint and Workload Protection Will Prepare You for the Future  Thanks to COVID-19, security and IT teams like yours responded— almost overnight— to a new reality. Organizations rushed to scale up distributed work, sometimes without considering the longer-term cybersecurity implications. What’s next? Eventually, we will start to…

Register for Post pandemic preparedness: A security & IT perspective

Sponsored by: VMWare

Post pandemic preparedness: A security & IT perspective

How Cloud Native Endpoint and Workload Protection Will Prepare You for the Future 

Thanks to COVID-19, security and IT teams like yours responded— almost overnight— to a new reality. Organizations rushed to scale up distributed work, sometimes without considering the longer-term cybersecurity implications.

What’s next? Eventually, we will start to get back to normal—or realize the new normal. Enterprises will reflect on their pandemic responses from a cybersecurity perspective. For many firms, COVID-19 helped identify major gaps in securing employees outside of the office.

Distributed work is here to stay. It’s time to think about building a resilient and future ready security stack.

So what tools does your organization need to succeed in a post pandemic era? In this presentation, cybersecurity strategist James Alliband will discuss:

The three most pressing obstacles facing security today – siloed organizations, lack of contextual awareness, and bolted-on point products

Tools security & IT managers can implement now to support longer-term remote and distributed work

Why cloud native endpoint security should be top of your priorities when considering your digital transformation plan

Longer-term benefits of investing in cloud native solutions

Speakers

20/20 webcast
Inspired E-Learning: Effectively train employees on security and privacy

Effectively train employees on security and privacy

Defeating malware and ransomware attacks requires more than just technology — it requires people. Your people need to identify the threat, they need to mitigate the threat, and they need to clean up after the threat. The most important part of this three-legged stool is identifying the threat, because if…

Register for Effectively train employees on security and privacy

Sponsored by: Inspired E-Learning

Effectively train employees on security and privacy

Defeating malware and ransomware attacks requires more than just technology — it requires people. Your people need to identify the threat, they need to mitigate the threat, and they need to clean up after the threat. The most important part of this three-legged stool is identifying the threat, because if it is identified before it launches, you have a much easier time to clean up the problem and no data is compromised. Sometimes it will fall to non-security personnel to identify the threat – the random employee who get a phishing email, the employees who find “lost” thumb drives in the parking lot, or perhaps even the security guard who is asked to hold a door open for an “executive-looking” individual carrying coffee and doughnuts for their “colleagues.” Sometimes something that looks legit isn’t and it takes a keen eye to differentiate between the two. This 20/20 webcast will address how US-based security executives and HR staff can train employees to focus on security and privacy, even when it is not their sole focus.

Speakers

Speaker

Stephen Lawton

Special Projects Editorial Director

SC Media

Vendor Webcast
Hiding in the noise: How attackers take advantage of your alert fatigue

Hiding in the noise: How attackers take advantage of your alert fatigue

Adding new security tools to your SOC toolset may help alert you to your business’s latest cyber threats. However, when a million unprioritized alerts hit you in a day, it’s easy to quickly reach for the snooze button without understanding what is truly going on. Drowning in alerts, the best…

Register for Hiding in the noise: How attackers take advantage of your alert fatigue

Sponsored by: VMWare

Hiding in the noise: How attackers take advantage of your alert fatigue

Adding new security tools to your SOC toolset may help alert you to your business’s latest cyber threats. However, when a million unprioritized alerts hit you in a day, it’s easy to quickly reach for the snooze button without understanding what is truly going on. Drowning in alerts, the best enterprises are discovering that to cut through the chaos and triage alerts accurately, operators need to understand the attack from the adversary’s perspective.

In this session, Randori Director of Offense, Evan Anderson, and VMware Carbon Black Senior Threat Researcher, Greg Foss will break down what’s going inside the mind of an adversary once they land inside the network, how they take advantage of your alert fatigue to hide in the noise.

Attendees will gain:

  • A better understanding of the challenges and trade-offs adversaries have to consider when conducting an attack.
  • Examples of real alerts overlooked by security teams and how you can tell the difference.
  • Actionable tips on how you can leverage an adversary perspective to reduce alert fatigue and improve your visibility, detection, and response capabilities.

Speakers

Speaker

Greg Foss

Senior Cybersecurity Strategist

VMware

Greg Foss is a Cybersecurity Strategist at VMware Carbon Black where he focuses on detection engineering, security efficacy, and bypasses across the diverse product line. In previous roles, Greg led a Threat Research team, built and ran a Global Security Operations program, consulted in penetration testing, and worked as a security analyst for the federal government. Greg is a very active member of the Denver information security community who loves to give back and support the industry.

Speaker

Evan Anderson

Director of Offense

Randori

Evan Anderson is the Director of Offense at Randori. He has over 15 years of experience in red teaming, vulnerability research and exploit development and is a long-time member of the NCCDC Red Team. Prior to co-founding Randori, he worked at Kyrus Technologies supporting commercial and federal projects.

DemoCast webcast

Protect against the next sunburst attack

Most SOC security products, including your legacy SIEM, were not designed to analyze the massive volumes of threat intelligence and security telemetry data available today. In response, a new generation of security analytics products has emerged to deliver threat detection and prioritization at scale, in real-time, and at a predictable…

Register for Protect against the next sunburst attack

Sponsored by: Anomali

Protect against the next sunburst attack

Most SOC security products, including your legacy SIEM, were not designed to analyze the massive volumes of threat intelligence and security telemetry data available today. In response, a new generation of security analytics products has emerged to deliver threat detection and prioritization at scale, in real-time, and at a predictable cost.

Join Anomali in this demo session to:

  • Learn how security analytics can complement their SIEM to immediately answer the most fundamental question: “Have we been impacted?”;
  • Understand how instant and unlimited retrospective search can speed threat detection, investigation, and response—including for critical events like the recent Sunburst and SolarWinds malware attack; and
  • Better understand the interplay between analyst research tools, security analytics systems, threat intelligence platforms, SIEM, and SOAR.

Get registered for the January 27th Anomali Webinar: Protect Against the Next Sunburst Attack

Speakers

Joe Gehrke

Solutions Architect

Anomali

As a Solutions Architect at Anomali, Joe Gehrke works with companies to build and operationalize threat intelligence programs and help solve some of their most complex challenges. Joe’s 20-year career in cybersecurity spans from security strategy to solution implementation. His current areas of focus include system interoperability, intelligence operationalization, and platform software development kits (SDKs)

DemoCast webcast
Manage third-party risk with a data-driven approach

Manage third-party risk with a data-driven approach

As organizations have increased their scope of vendors and partners, firms have increased their digital risk surface exponentially and are facing new challenges regarding vendor risk management. Traditional mechanisms for third-party risk management, like questionnaires and on-site assessments, are either no longer an option or have become too slow to…

Register for Manage third-party risk with a data-driven approach

Sponsored by: RiskRecon MasterCard

Manage third-party risk with a data-driven approach

As organizations have increased their scope of vendors and partners, firms have increased their digital risk surface exponentially and are facing new challenges regarding vendor risk management. Traditional mechanisms for third-party risk management, like questionnaires and on-site assessments, are either no longer an option or have become too slow to keep up with business needs. Fortunately, there are innovative techniques and practices to effectively manage, understand, and act on third-party cyber risk.

Join RiskRecon on this 30-minute Democast to see how we can help you:

  • utilize inherent risk methodologies to prioritize your vendors;
  • measure your vendor risk exposure;
  • and act on third-party risk and verifying remediation steps.

Speakers

Speaker

John Chisum

Senior Security Advisor

RiskRecon MasterCard

John Chisum leads RiskRecon’s Security Advisor team, with over 15 years of experience spanning the third-party risk, information security, and network security industries. Prior to RiskRecon, John worked with the anti-phishing and anti-fraud company Phishlabs, and has previously held solution architecture and technical sales positions with Juniper Networks’ service provider solutions team and Sprint’s Government Systems Division. He holds a B.S. from Clemson University in Computer Information Systems and is a Certified Third-Party Risk Professional. John currently resides with his family in Charleston, South Carolina.

ON-DEMAND WEBCASTS

This form filters webcasts that are directly below it based on the options given. Filtering will occur immediately when an option is selected or when the form is reset.
Show:
Vendor Webcast
Intrinsic Security: Simplifying and improving threat protection with automation

Intrinsic Security: Simplifying and improving threat protection with automation

Cybercrime is up 600 percent during the COVID-19 pandemic as companies deal with the challenges of securing a remote workforce. As the threat landscape evolves, security teams must remain agile in preventing and responding to increased attacks. Organizations need a new cybersecurity approach to stay ahead of attackers. Gain strategic…

Register for Intrinsic Security: Simplifying and improving threat protection with automation

Sponsored by: VMWare

Intrinsic Security: Simplifying and improving threat protection with automation

Cybercrime is up 600 percent during the COVID-19 pandemic as companies deal with the challenges of securing a remote workforce. As the threat landscape evolves, security teams must remain agile in preventing and responding to increased attacks.

Organizations need a new cybersecurity approach to stay ahead of attackers. Gain strategic insights from VMware.

Join our webinar to learn how you can:

  • Simplify security products and operations by making security intrinsic.
  • Gain best practices on automation to improve threat protection.
  • Implement a Security Orchestration Automation and Response (SOAR) platform to dramatically reduce response times.
  • Use API functionality to improve threat analysis and provide robust, real-time reporting

Speakers

Speaker

Tom Kellerman

Head of Cybersecurity Strategy

VM Ware

Tom Kellermann is the Head of Cybersecurity Strategy for VMware. Previously, Tom held the position of Chief Cybersecurity Officer for Carbon Black Inc. Prior to joining Carbon Black, Tom was the CEO and founder of Strategic Cyber Ventures. In 2020, he was appointed to the Cyber Investigations Advisory Board for the United States Secret Service. On January 19, 2017, Tom was appointed the Wilson Center’s Global Fellow for Cyber Policy.

DemoCast webcast

Cracking evasive and stealthy threats in today’s pandemic space

Threat actors have always played the game of emotions. Fear is the emotion they are using right now to lure users to click on an email or manipulate them to install an application. In the last four months, cyber criminals have used fear as their main weapon to compromise users…

Register for Cracking evasive and stealthy threats in today’s pandemic space

Sponsored by: Cisco

Cracking evasive and stealthy threats in today’s pandemic space

Threat actors have always played the game of emotions. Fear is the emotion they are using right now to lure users to click on an email or manipulate them to install an application. In the last four months, cyber criminals have used fear as their main weapon to compromise users by using pandemic-related themes to deliver malware. The dropped malwares are deadlier and stealthier and are hybrid in nature. There is a need for advanced investigation techniques, like memory forensics in the case of ransomware attacks that are ransacking health sectors and entropy-based detection for new-age trojan exfiltration. Join us to learn how we use traditional methods to identify these threats and also add a pinch of new-age forensics tricks to do some big reveals.

Speakers

Speaker

Shyam Sundar Ramaswami

Lead Security Threat Researcher

Cisco Umbrella India Security Research

DemoCast webcast
Learn how to remediate attacks quickly with Cisco Cloud Mailbox Defense

Learn how to remediate attacks quickly with Cisco Cloud Mailbox Defense

Moving email to the cloud has likely changed the way you operate your organization, especially at a time when you have shifted to a remote workforce. Many of those conveniences translate to opportunities for bad actors. Join our email security webcast and learn how to remediate attacks quickly. Cloud Mailbox…

Register for Learn how to remediate attacks quickly with Cisco Cloud Mailbox Defense

Sponsored by: Cisco

Learn how to remediate attacks quickly with Cisco Cloud Mailbox Defense

Moving email to the cloud has likely changed the way you operate your organization, especially at a time when you have shifted to a remote workforce. Many of those conveniences translate to opportunities for bad actors.

Join our email security webcast and learn how to remediate attacks quickly. Cloud Mailbox Defense provides the tools to easily manage evolving threats in this new environment. Cloud Mailbox Defense is an integrated cloud-native security platform for Microsoft 365 that focuses on:

  • simple deployment
  • easy attack remediation
  • superior visibility
  • and best-in-class efficacy from Cisco Talos

Speakers

Speaker

Rob Marchi

Cisco Product Manager, Engineering

Cisco

Speaker

Christian Clasen

Technical Marketing Engineer

Cisco

Speaker

Jason Wright

Cisco Marketing Product Manager

Cisco

Vendor Webcast

Zero trust & the ID-based cybersecurity perimeter

The rapid adoption of cloud-first strategies – across multiple cloud computing flavors (SaaS, PaaS, IaaS, and more) – combined with the sudden uptick in work-from-home environments hastened employees’ need for access to apps and other IT resources from anywhere. These events require companies to consider a new cybersecurity perimeter. It’s not that network-based protection/detection controls are dead: they are simply inadequate for a Zero Trust security approach.

Register for Zero trust & the ID-based cybersecurity perimeter

Sponsored by: Beyond Identity

Zero trust & the ID-based cybersecurity perimeter

The rapid adoption of cloud-first strategies — across multiple cloud computing flavors (SaaS, PaaS, IaaS, and more) — combined with the sudden uptick in work-from-home environments hastened employees’ need for access to apps and other IT resources from anywhere. These events require companies to consider a new cybersecurity perimeter. It’s not that network-based protection/detection controls are dead: they are simply inadequate for a Zero Trust security approach.

This webinar will discuss:

• the impact of cloud first;
• how organizations are adopting identity-based perimeters as a fundamental Zero Trust building block; and
• the implications for Identity and Access Management tooling moving forward.


Attendees of this webcast may be eligible for one CPE credit.

Jasson Casey

Chief Technology Officer

Beyond Identity

Jasson has served as CTO of SecurityScorecard, VP of Engineering at IronNet Cybersecurity, Founder and Executive Director of Flowgrammable as well as Compiled Networks, VP of VoIP Product Development at CenturyTel, among other technical

Patrick McBride

Chief Marketing Officer

Beyond Identity

Patrick has served as CMO of ZeroFOX and Claroty, VP of Marketing at iSIGHT Partners and Xceedium, VP of Compliance at Scalable Software, Co-founder and CEO of META Security Group, and Senior Vice President at META Group.

DemoCast webcast

How to Enhance Your Cyber Defense Program

Knowing which threats you face and how to counter them is just the beginning of developing your cyber defense program. Organizations need to keep track of their programs and ensure that the solutions they applied are working. Join the Center for Internet Security (CIS), a community-driven nonprofit, for a deep dive into CIS SecureSuite®. Learn how becoming a member can deliver the right tools and resources can help you enhance your cyber defense program.

Register for How to Enhance Your Cyber Defense Program

Sponsored by: CIS Security

How to Enhance Your Cyber Defense Program

Knowing which threats you face and how to counter them is just the beginning of developing your cyber defense program. Organizations need to keep track of their programs and ensure that the solutions they applied are working. Join the Center for Internet Security (CIS), a community-driven nonprofit, for a deep dive into CIS SecureSuite®. Learn how becoming a member can deliver the right tools and resources can help you enhance your cyber defense program.

You’ll learn:
· what the CIS Benchmarks™ are and how the strength of our international communities can develop consensus-based, vendor-agnostic configuration guidelines;
· how to conduct remote endpoint assessments with CIS-CAT® Pro, a premium assessment tool;
· how to assess your implementation of the CIS Controls® and track progress over time; and
· how to utilize CIS Build Kits to rapidly implement CIS Benchmark secure configuration guidelines.

Susan Lindquist

Susan Lindquist

Cybersecurity Solutions Engineer

Center for Internet Security

Susan is a subject matter expert in IT Management Solutions with over 20 years of experience working for global leaders in IT business management solutions and is ITIL and GIAC certified.

Jill Aitoro

Jill Aitoro

Editor in Chief

SC Media

20/20 webcast

Defending your data

While Inbound Protection such as Anti-phishing is a critical part of any Email Security deployment, when it comes down to it, it is probably best to assume that bad guys are already in your network.The day of the effective moat is long gone. However, even if they’re in your network, they can’t do much if you’ve locked down all of avenues of exfiltration of data. Assuming the attackers are not trying to destroy your network from within by deleting files or damaging hardware, if they can’t send anything off your network, you win.

Register for Defending your data

Sponsored by: Axway

Defending your data

While Inbound Protection such as Anti-phishing is a critical part of any Email Security deployment, when it comes down to it, it is probably best to assume that bad guys are already in your network.

The day of the effective moat is long gone. However, even if they’re in your network, they can’t do much if you’ve locked down all of avenues of exfiltration of data. Assuming the attackers are not trying to destroy your network from within by deleting files or damaging hardware, if they can’t send anything off your network, you win.

This 20/20 webcast and Special Report will examine approaches you can take to lock up your network, including protecting outgoing email through encryption. We also look at various techniques you can employ to protect your data from being taken off your network via email and other exfiltration approaches


Stephen Lawton

Stephen Lawton

Special Projects Editorial Director

SC Media

Paul Keane

Paul Keane

Director Product Management

Axway

Paul is responsible for the vision and execution of Axway’s Email portfolio. In this role, Paul works with customers and partners defining and executing solutions, and internally with Sales, Marketing and Product Development to bring Axway’s solutions to market. Before joining Axway, Paul worked in the software industry for 25 years, with over half of those in the security space. These included roles in Engineering, Pre-Sales and Marketing, for a range of companies based in Europe and the US. Paul received an MBA from Santa Clara University.

Vendor Webcast

Strengthen your security posture with cloud workload protection

Legacy security solutions are no longer capable of solving the challenges facing Security and IT teams today. They are ineffective against ever-evolving threats, like ransomware attacks and data breaches. That’s why it’s more crucial than ever to have a well-defined strategy with the right tools in place to secure your workloads against these growing threats.Join VMware for this technical webcast and discover how intrinsic workload security can help you reduce the attack surface and strengthen your security posture today.

Register for Strengthen your security posture with cloud workload protection

Sponsored by: VMWare

Strengthen your security posture with cloud workload protection

Legacy security solutions are no longer capable of solving the challenges facing Security and IT teams today. They are ineffective against ever-evolving threats, like ransomware attacks and data breaches. That’s why it’s more crucial than ever to have a well-defined strategy with the right tools in place to secure your workloads against these growing threats.

Join VMware for this technical webcast and discover how intrinsic workload security can help you reduce the attack surface and strengthen your security posture today.

You’ll learn:

· steps to simplify security and IT operations;
· how to increase visibility across endpoints and workloads; and
· benefits of built-in security and the impact on SOC.

VP of Product Management for Security Products

Chris Corde

VMware

Chris Corde is the VP of Product Management for Security Products at VMW. Prior to VMW, Chris was the Sr Director of Corp Dev for RSA Security. He was responsible for acquisitions and investments for the division. Chris was also a PM for LogMeIn’s IAM portfolio, and a Java engineer at a number of startups. Chris has is BS in Comp Sci from Fairleigh Dickinson University. Chris also holds a Master of Science from New York University and an MBA from Boston College.

Vendor Webcast

4 steps to conquer hybrid network complexity

As if managing hybrid network complexities isn’t challenging enough, the recent boost in technology sprawl has made this task even more daunting. How confident are you that your security strategy will conquer this complexity—without sacrificing agility? Join FireMon on this webcast and learn the four steps needed to conquer your hybrid network complexity.

Register for 4 steps to conquer hybrid network complexity

Sponsored by: FireMon

4 steps to conquer hybrid network complexity

As if managing hybrid network complexities isn’t challenging enough, the recent boost in technology sprawl has made this task even more daunting. How confident are you that your security strategy will conquer this complexity—without sacrificing agility? Join FireMon on this webcast and learn the four steps needed to conquer your hybrid network complexity.

These four steps will enable you to:

· improve your overall security posture;
· eliminate misconfigurations that can increase your attack surface;
· reduce friction between DevOps and SecOps to deliver security at the speed of business; and
· articulate your complexity reduction strategy to senior management.

Rob Rodriguez

Rob Rodriguez

Director of Field Engineering

FireMon



Vendor Webcast

Stay Out of the Net: Your Ultimate Guide to Phishing Mitigation

Spear phishing emails remain the most popular attack avenue for the bad guys, yet most companies still don’t have an effective strategy to stop them. This enormous security gap leaves you open to business email compromise, session hijacking, ransomware and more. Don’t get caught in a phishing net!

Register for Stay Out of the Net: Your Ultimate Guide to Phishing Mitigation

Sponsored by: KnowBe4

Stay Out of the Net: Your Ultimate Guide to Phishing Mitigation

Spear phishing emails remain the most popular attack avenue for the bad guys, yet most companies still don’t have an effective strategy to stop them. This enormous security gap leaves you open to business email compromise, session hijacking, ransomware and more. Don’t get caught in a phishing net!

Attend this webcast and learn several techniques you can implement now to minimize cybersecurity risk, due to phishing and social engineering attacks. We won’t just cover one angle. We’ll come at it from all angles!

Join KnowBe4 on this webcast to learn about:

  • developing a comprehensive, defense-in-depth plan;
  • technical controls all organizations should consider;
  • gotchas to watch out for with cybersecurity insurance;
  • benefits of implementing new-school security awareness training; and
  • best practices for creating and implementing security policies.

If you’re already registered for the 12.15 Knowbe4 – Stay Out of the Net: Your Ultimate Guide to Phishing Mitigation webcast, click below:

Roger Grimes

Data-Driven Defense Evangelist

KnowBe4

Roger Grimes is a 30-year computer security consultant, instructor, holder of dozens of computer certifications and an award-winning author of 10 books and over 1,000 magazine articles on computer security. He has worked at some of the world’s

Teri Robinson

Executive Editor

SC Media

SC Media Executive Editor Teri Robinson has more than two decades of experience reporting and editing on tech and business issues.

20/20 webcast

Securing Employees’ Email

Secure email gateways are supposed to be just that — secure. Unfortunately, like many other security appliances, gateways can be fooled and compromised. The key is knowing what to look for and how to mitigate and overcome the risks related to malware getting past the gateways and into users’ mailboxes.

Register for Securing Employees’ Email

Sponsored by: Cofense

Securing Employees’ Email

Secure email gateways are supposed to be just that — secure. Unfortunately, like many other security appliances, gateways can be fooled and compromised. The key is knowing what to look for and how to mitigate and overcome the risks related to malware getting past the gateways and into users’ mailboxes.

Join this 20/20 Webcast to:

  • understand secure email gateways and secure web gateways;
  • identify their vulnerabilities; and
  • learn how these legacy products remain relevant.

SPEAKERS

Aaron Higbee

Chief Technology Officer and Co-Founder

Cofense

Co-founder and CTO of Cofense, Aaron has more than 20 years of cybersecurity and senior management leadership.

Stephen Lawton

Special Projects Editorial Director

SC Media

Editorial webcast

Deconstructing the CRAE Index and What it Means to You

If you’d like to know what security pros are investing in and their insights into what’s working for them, our experts can help. The inaugural Cybersecurity Resource Allocation & Efficacy Index study from CyberRisk Alliance Business Intelligence, underwritten by Pulse Secure, launched last quarter and is about to be refreshed for the third quarter of 2020. It offers CISOs valuable information from companies, with 500 or more employees, in North America and Europe.

Register for Deconstructing the CRAE Index and What it Means to You

Sponsored by: Pulse Secure

Deconstructing the CRAE Index and What it Means to You

If you’d like to know what security pros are investing in and their insights into what’s working for them, our experts can help. The inaugural Cybersecurity Resource Allocation & Efficacy Index study from CyberRisk Alliance Business Intelligence, underwritten by Pulse Secure, launched last quarter and is about to be refreshed for the third quarter of 2020. It offers CISOs valuable information from companies, with 500 or more employees, in North America and Europe.

This 20/20 Webcast will reveal:
• how these companies managed allocations and spending on cybersecurity
activities;
• their perceptions on the efficacy of these measures; and
• a deeper dive into the index’s numbers and trends.

SPEAKERS

Dana Jackson

VP of Research

CyberRisk Alliance

Stephen Lawton

Special Projects Editorial Director

SC Media

Todd Fitzgerald

Executive in Residence and Chairman of the Executive Committee

Cybersecurity Collaborative Executive Committee

Scott Gordon

CMO

Pulse Secure

Vendor Webcast

Preventing the rise of island hopping and counter incident response

The pandemic, a distributed workforce, and the U.S. presidential election have created a perfect storm for cybercriminals. Security and IT teams must stay on top of day-to-day operations, while also addressing new sophisticated threat vectors like counter incident response and island hopping. Preventing, detecting, and responding to emerging threat techniques starts by understanding how cybercriminals are honing their ability to remain undetected inside organizations they’ve breached.

Register for Preventing the rise of island hopping and counter incident response

Sponsored by: VMWare

Preventing the rise of island hopping and counter incident response

The pandemic, a distributed workforce, and the U.S. presidential election have created a perfect storm for cybercriminals. Security and IT teams must stay on top of day-to-day operations, while also addressing new sophisticated threat vectors like counter incident response and island hopping.

Preventing, detecting, and responding to emerging threat techniques starts by understanding how cybercriminals are honing their ability to remain undetected inside organizations they’ve breached.

Attend this technical webcast with our security strategists and incident response experts to learn how to:
· address lateral movement behind most counter incident response attacks;
· understand how island hopping expands the attack surface area; and
· establish effective incident response in a longer-term distributed world.

SPEAKERS

Tom Kellerman

Head of Cybersecurity Strategy

VM Ware

Tom Kellermann is the Head of Cybersecurity Strategy for VMware. Previously, Tom held the position of Chief Cybersecurity Officer for Carbon Black Inc. Prior to joining Carbon Black, Tom was the CEO and founder of Strategic Cyber Ventures. In 2020, he was appointed to the Cyber Investigations Advisory Board for the United States Secret Service. On January 19, 2017, Tom was appointed the Wilson Center’s Global Fellow for Cyber Policy.

Rick McElroy

Cybersecurity Strategist

VMware Carbon Black

Rick McElroy, Security Strategist at VMware Carbon Black, has 20 years of information security experience educating and advising organizations on reducing their risk posture and tackling tough security challenges. He has held security positions with the U.S. Department of Defense, and in several industries including retail, insurance, entertainment, cloud computing, and higher education. As a United States Marine, McElroy’s work included physical security and counterterrorism services.

Taree Reardon

Senior Threat Analyst

VMware Carbon Black

As a Senior Threat Analyst Shift Lead with VMware, Taree Reardon has been fascinated with identifying and dissecting new and emerging threats. During her time at VMware, she has helped identify and analyze several new attack variants, including one of the first known uses of the BlueKeep exploit in a customer’s environment.