• Categories

  • Format

Security Weekly: The Adversary Playbook – How Deception Thwarts Attackers

n this technical training, Tony Cole, CTO at Attivo Networks, and Paul Asadoorian, Chief Innovation Officer at CyberRisk Alliance, will go into the details of the adversary playbook. How do attacks start and propagate? What deception techniques actually work to thwart these attacks?

Cost Savings of Deception Quantified

Watch this webinar with Kevin Fiscus of Deceptive Defense, Inc. and Carolyn Crandall the Chief Deception Officer and CMO of Attivo Networks where Kevin shares his research findings on the cost savings associated with deception technology.

Mapping Your Active Defense Capabilites to MITRE Shield

Join Edward Amoroso, CEO of TAG Cyber, and Tushar Kothari, CEO of Attivo Networks for a technical discussion on how Attivo Networks solutions address the MITRE Shield tactics and techniques to maximize detection coverage, deliver insights into what tools attackers are using, identify their activities, and gather intelligence into what adversaries are seeking.

Enhancing OT Deception with Model Driven, High Fidelity Decoys

This webinar presents the capabilities developed by the Pacific Northwest National Laboratory and Attivo Networks collaboration under the Department of Energy Technology Commercialization Fund program to create enhanced deceptions for defense of critical infrastructure OT systems.

Adversaries in the Wire – Stopping In-Network Threats

Watch this on-demand session to learn how Deception Technology Detects credential theft and unauthorized AD queries, Disrupts host fingerprinting and service discovery, Deflects lateral movement activity, and Detects and alerts on attackers early in the attack cycle.

Hunting Threats with FireEye and Attivo Networks

Watch this session to learn how: The ThreatDefend platform detects advanced attackers with speed and accuracy, the joint solution captures and analyzes advanced malware threats,  accelerates incident response with automated blocking of infected systems, and collects forensics, and develops company-centric threat intelligence.

Hide and Deny Access to Ransomware Attackers

Get unique insights into the most modern ransomware attack tactics and how the Attivo ThreatDefend solution is used to achieve early detection of cyber-attackers. New Endpoint Detection Net (EDN) capabilities will be shared along with how they prevent attackers from moving laterally, escalating privileges, and finding and accessing the files, folders, mapped network, and cloud shares they seek to tamper with.

CDM Webinar: Game Changing Breach Defense by Dramatically Improving Endpoint Security

Hear from Attivo Networks CTO, Tony Cole, in this discussion on how to better protect your endpoints and prevent attackers from moving laterally across your enterprise.

Better Endpoint Defense with CrowdStrike and Attivo Networks

Watch this on-demand webinar to learn about the integration between the Attivo Networks ThreatDefend® platform and the CrowdStrike Falcon Insight EDR solution that combines accurate in-network detection with automated response actions to isolate attackers and empower organizations to respond quickly to attackers already inside the network.

Customer Experiences in Real-World Deception Deployments

In this webinar, you will have the unique opportunity to hear from three behind-the-mask security practitioners who are actively using Attivo Networks deception technology in very different environments.

Reducing EDR Cyber Risk with Deception

Hear from Tushar Kothari, CEO of Attivo Networks and Edward Amoroso, CEO of TAG Cyber in this technical discussion of how deception can be used to dramatically reduce cyber risks to modern endpoints.

How To Reduce Remote Worker VPN Risk

Watch this webinar to hear how deception-based threat detection solutions are adding a safety net of early and accurate threat detection for VPN environments.

Detecting the Deceivers through Deception

In this session we discuss deception tactics that defenders can use on adversaries to gain fast and high-fidelity detection across an enterprise. Hear why this defensive fight is relevant to companies large and small, regardless of security capability maturity.

How Deception is Shaping our Future

How are we using deception, and where could we be more effective, including a look towards the future of this technology and where/how to apply it.

 

Deception & Active Defense for Election Security

This talk covers where deception technologies are today, the future of deception for cyber defense, and is delivered by Chief Security Strategist Chris Roberts.

Using Deception Technology To Close Your Detection Gaps

In this session, we share insights into why deception technology has become a legal sector preferred security control for the early detection and identification of in-network threats that have bypassed prevention security controls and for its reliable alerting on insider security policy violations.

German Webinar: Deception, die bessere Methode Widersacher zu erkennen!

Trotz steigender Ausgaben für Cybersecurity nehmen Anzahl und Ausmaß von Breaches zu. Darüber hinaus bleibt die Zeitspanne bis zur Entdeckung eines Einbruchs immer noch sehr hoch mit fast 78 Tagen im globalen Durchschnitt. Es stellt sich die Frage, ob wir vielleicht die falschen Methoden und Techniken zur frühzeitigen und akkuraten Erkennung eines Einbruchs oder des böswilligen Insiders verwenden?

Webinar: Deception for Speeding Up Your OODA Loop

Join Matt Devost, CEO & Co-Founder of OODA LLC. and Tony Cole, CTO of Attivo Networks for an in-depth discussion on cyber deception and how it plays into the OODA loop, the cycle of observe–orient–decide–act.

The Role of Deception in Healthcare Networks

Hear from Errol Weiss, CISO at H-ISAC, Steve Hunter, VP of Marketing at H-ISAC, and host Carolyn Crandall, Chief Deception Officer at Attivo Networks, in this fireside chat on the role of deception technology in healthcare networks. The discussion touches on real-world challenges and how deception is being used to combat these issues.

451 Research Webinar: Is It Really Possible to Lock Down an Endpoint? Yes, but Not How You Might Think.

Hear from Fernando Montenegro, Analyst at 451 Research, and Carolyn Crandall, Chief Deception Officer, and CMO at Attivo Networks, for an engaging discussion on the latest Endpoint Security research, challenges organizations are facing today, and why deception technology has created a winning strategy for locking down the endpoint.

Webinar: A New Way to Minimize Active Directory Security Risk

Hear from Chris Roberts, Chief Security Strategist of Attivo Networks, and host Sarah Ashburn, SVP of Sales and Customer Success at Attivo Networks, to hear about the company’s new ADSecure solution, which is designed to improve security to Active Directory (AD) and reduce risk. All, without interfering with the AD production environment.

How to Use Deception to Defeat Your Adversaries

During this webinar, Geoff Hancock, CEO at the Advanced Cybersecurity Group, and Tony Cole, CTO at Attivo Networks, will discuss how using deception can get you inside the attacker’s OODA loop, lead the adversary to make mistakes, and fortify your cybersecurity defenses.

Modern Deception Technology – Advanced Methods for Reducing Cyber Risk

Join host Carolyn Crandall, Chief Deception Officer at Attivo Networks, and special guest Edward Amoroso, CEO of TAG Cyber, to hear exclusive insights on how modern deception technology is being used for early and accurate threat detection, network visibility, and cyber risk reduction.

Webinar: Deception Imperatives and Vendor Comparison Spotlight

Industry veteran Jim Hurley, the CEO of Wellington Research and Cyber Source Data, will cover primary research results on cyber effectiveness and how it is influenced by detection and incident response. Additionally, attendees will gain insights into the latest Wellington Research Market Spotlight covering the vendors and market for deception.

Turning a Virtual Datacenter into a Virtual Minefield for Attackers

Join Technical Deception Engineer Joseph Salazar as he discusses turning a virtual datacenter into a virtual minefield for attackers with deception technology.

Deception Through the Eyes of a Forensic Researcher

Deception arms the defender with early detection, automated attack analysis, endpoint forensics, and substantiated alerts for accelerated incident response.

Deception Technology: Fad or Fashion for 2019

Deception technology adoption soared in 2017 and 2018. Was this simply a fad or is deception coming into fashion as the de facto in-network detection security control?

An Insiders Blueprint to Deception and Medical Device Security

How deception technology is actively solving unique cyber challenges faced by healthcare organizations.

How Threat Deception Fits Within Your Security Stack

Discussion about real-world threat detection deployment experiences and the reasons why organizations are choosing deception technology.

Deception Technology: Changing the Game on Modern-day Attackers (In Collaboration with FS-ISAC)

Learn how deception technology is closing the detection gap and reducing attacker dwell time for financial institutions.

Deception-based Threat Detection Myths and Realities, In Collaboration with NH-ISAC

Discussion on the myths and realities surrounding the effectiveness of deception for advanced threat detection within healthcare organizations.

Deception-based Threat Detection, with a Financial Institution’s Perspective

Engaging Q&A about real world threat detection deployment experiences and reasons why financial services organizations are choosing deception technology.

Ovum Research Report Overview and Analyst Perspectives

Rik Turner, Principal Analyst at Ovum and Carolyn Crandall, CMO from Attivo Networks engage in an interactive discussion on the changes in security detection technology trends.

Myths and Realities of Deception Defenses

In an interview at Information Security Media Group’s recent Healthcare Security Summit Carolyn Crandall discusses the value of deception technology solutions.

Discussion on Deception Webinar

Learn why deception is recognized as a top 2017 security technology to consider for detecting in-network threats.

Deception as a Security Discipline for Advanced Threat Detection and Defense

Will the addition of deception deliver a bona fide return? We believe that deception delivers an effective and efficient defense and will share our rationale in this webinar.

Securing Patient Data When Prevention Systems Have Failed with Daniel from Mission Health

InfoSec Professional explains how he used deception technology to stop the aggressive spread of Qakbot

Harnessing Unparalleled Visibility in Cyber Attack Investigations

Demo of advanced forensic analysis, reporting, and how prevention system integrations expedite remediation.

What’s Lurking Deep in Your Network

Advanced techniques for finding malware lurking in corporate domains, remote offices, data centers, and in the cloud.


Security Weekly: The Adversary Playbook – How Deception Thwarts Attackers

n this technical training, Tony Cole, CTO at Attivo Networks, and Paul Asadoorian, Chief Innovation Officer at CyberRisk Alliance, will go into the details of the adversary playbook. How do attacks start and propagate? What deception techniques actually work to thwart these attacks?

Cost Savings of Deception Quantified

Watch this webinar with Kevin Fiscus of Deceptive Defense, Inc. and Carolyn Crandall the Chief Deception Officer and CMO of Attivo Networks where Kevin shares his research findings on the cost savings associated with deception technology.

Mapping Your Active Defense Capabilites to MITRE Shield

Join Edward Amoroso, CEO of TAG Cyber, and Tushar Kothari, CEO of Attivo Networks for a technical discussion on how Attivo Networks solutions address the MITRE Shield tactics and techniques to maximize detection coverage, deliver insights into what tools attackers are using, identify their activities, and gather intelligence into what adversaries are seeking.

Enhancing OT Deception with Model Driven, High Fidelity Decoys

This webinar presents the capabilities developed by the Pacific Northwest National Laboratory and Attivo Networks collaboration under the Department of Energy Technology Commercialization Fund program to create enhanced deceptions for defense of critical infrastructure OT systems.

Adversaries in the Wire – Stopping In-Network Threats

Watch this on-demand session to learn how Deception Technology Detects credential theft and unauthorized AD queries, Disrupts host fingerprinting and service discovery, Deflects lateral movement activity, and Detects and alerts on attackers early in the attack cycle.

Hunting Threats with FireEye and Attivo Networks

Watch this session to learn how: The ThreatDefend platform detects advanced attackers with speed and accuracy, the joint solution captures and analyzes advanced malware threats,  accelerates incident response with automated blocking of infected systems, and collects forensics, and develops company-centric threat intelligence.

Hide and Deny Access to Ransomware Attackers

Get unique insights into the most modern ransomware attack tactics and how the Attivo ThreatDefend solution is used to achieve early detection of cyber-attackers. New Endpoint Detection Net (EDN) capabilities will be shared along with how they prevent attackers from moving laterally, escalating privileges, and finding and accessing the files, folders, mapped network, and cloud shares they seek to tamper with.

CDM Webinar: Game Changing Breach Defense by Dramatically Improving Endpoint Security

Hear from Attivo Networks CTO, Tony Cole, in this discussion on how to better protect your endpoints and prevent attackers from moving laterally across your enterprise.

Better Endpoint Defense with CrowdStrike and Attivo Networks

Watch this on-demand webinar to learn about the integration between the Attivo Networks ThreatDefend® platform and the CrowdStrike Falcon Insight EDR solution that combines accurate in-network detection with automated response actions to isolate attackers and empower organizations to respond quickly to attackers already inside the network.

Customer Experiences in Real-World Deception Deployments

In this webinar, you will have the unique opportunity to hear from three behind-the-mask security practitioners who are actively using Attivo Networks deception technology in very different environments.

Reducing EDR Cyber Risk with Deception

Hear from Tushar Kothari, CEO of Attivo Networks and Edward Amoroso, CEO of TAG Cyber in this technical discussion of how deception can be used to dramatically reduce cyber risks to modern endpoints.

How To Reduce Remote Worker VPN Risk

Watch this webinar to hear how deception-based threat detection solutions are adding a safety net of early and accurate threat detection for VPN environments.

Detecting the Deceivers through Deception

In this session we discuss deception tactics that defenders can use on adversaries to gain fast and high-fidelity detection across an enterprise. Hear why this defensive fight is relevant to companies large and small, regardless of security capability maturity.

How Deception is Shaping our Future

How are we using deception, and where could we be more effective, including a look towards the future of this technology and where/how to apply it.

 

Deception & Active Defense for Election Security

This talk covers where deception technologies are today, the future of deception for cyber defense, and is delivered by Chief Security Strategist Chris Roberts.

Using Deception Technology To Close Your Detection Gaps

In this session, we share insights into why deception technology has become a legal sector preferred security control for the early detection and identification of in-network threats that have bypassed prevention security controls and for its reliable alerting on insider security policy violations.

German Webinar: Deception, die bessere Methode Widersacher zu erkennen!

Trotz steigender Ausgaben für Cybersecurity nehmen Anzahl und Ausmaß von Breaches zu. Darüber hinaus bleibt die Zeitspanne bis zur Entdeckung eines Einbruchs immer noch sehr hoch mit fast 78 Tagen im globalen Durchschnitt. Es stellt sich die Frage, ob wir vielleicht die falschen Methoden und Techniken zur frühzeitigen und akkuraten Erkennung eines Einbruchs oder des böswilligen Insiders verwenden?

Webinar: Deception for Speeding Up Your OODA Loop

Join Matt Devost, CEO & Co-Founder of OODA LLC. and Tony Cole, CTO of Attivo Networks for an in-depth discussion on cyber deception and how it plays into the OODA loop, the cycle of observe–orient–decide–act.

The Role of Deception in Healthcare Networks

Hear from Errol Weiss, CISO at H-ISAC, Steve Hunter, VP of Marketing at H-ISAC, and host Carolyn Crandall, Chief Deception Officer at Attivo Networks, in this fireside chat on the role of deception technology in healthcare networks. The discussion touches on real-world challenges and how deception is being used to combat these issues.

451 Research Webinar: Is It Really Possible to Lock Down an Endpoint? Yes, but Not How You Might Think.

Hear from Fernando Montenegro, Analyst at 451 Research, and Carolyn Crandall, Chief Deception Officer, and CMO at Attivo Networks, for an engaging discussion on the latest Endpoint Security research, challenges organizations are facing today, and why deception technology has created a winning strategy for locking down the endpoint.

Webinar: A New Way to Minimize Active Directory Security Risk

Hear from Chris Roberts, Chief Security Strategist of Attivo Networks, and host Sarah Ashburn, SVP of Sales and Customer Success at Attivo Networks, to hear about the company’s new ADSecure solution, which is designed to improve security to Active Directory (AD) and reduce risk. All, without interfering with the AD production environment.

How to Use Deception to Defeat Your Adversaries

During this webinar, Geoff Hancock, CEO at the Advanced Cybersecurity Group, and Tony Cole, CTO at Attivo Networks, will discuss how using deception can get you inside the attacker’s OODA loop, lead the adversary to make mistakes, and fortify your cybersecurity defenses.

Modern Deception Technology – Advanced Methods for Reducing Cyber Risk

Join host Carolyn Crandall, Chief Deception Officer at Attivo Networks, and special guest Edward Amoroso, CEO of TAG Cyber, to hear exclusive insights on how modern deception technology is being used for early and accurate threat detection, network visibility, and cyber risk reduction.

Webinar: Deception Imperatives and Vendor Comparison Spotlight

Industry veteran Jim Hurley, the CEO of Wellington Research and Cyber Source Data, will cover primary research results on cyber effectiveness and how it is influenced by detection and incident response. Additionally, attendees will gain insights into the latest Wellington Research Market Spotlight covering the vendors and market for deception.

Turning a Virtual Datacenter into a Virtual Minefield for Attackers

Join Technical Deception Engineer Joseph Salazar as he discusses turning a virtual datacenter into a virtual minefield for attackers with deception technology.

Deception Through the Eyes of a Forensic Researcher

Deception arms the defender with early detection, automated attack analysis, endpoint forensics, and substantiated alerts for accelerated incident response.

Deception Technology: Fad or Fashion for 2019

Deception technology adoption soared in 2017 and 2018. Was this simply a fad or is deception coming into fashion as the de facto in-network detection security control?

An Insiders Blueprint to Deception and Medical Device Security

How deception technology is actively solving unique cyber challenges faced by healthcare organizations.

How Threat Deception Fits Within Your Security Stack

Discussion about real-world threat detection deployment experiences and the reasons why organizations are choosing deception technology.

Deception Technology: Changing the Game on Modern-day Attackers (In Collaboration with FS-ISAC)

Learn how deception technology is closing the detection gap and reducing attacker dwell time for financial institutions.

Deception-based Threat Detection Myths and Realities, In Collaboration with NH-ISAC

Discussion on the myths and realities surrounding the effectiveness of deception for advanced threat detection within healthcare organizations.

Deception-based Threat Detection, with a Financial Institution’s Perspective

Engaging Q&A about real world threat detection deployment experiences and reasons why financial services organizations are choosing deception technology.

Ovum Research Report Overview and Analyst Perspectives

Rik Turner, Principal Analyst at Ovum and Carolyn Crandall, CMO from Attivo Networks engage in an interactive discussion on the changes in security detection technology trends.

Myths and Realities of Deception Defenses

In an interview at Information Security Media Group’s recent Healthcare Security Summit Carolyn Crandall discusses the value of deception technology solutions.

Discussion on Deception Webinar

Learn why deception is recognized as a top 2017 security technology to consider for detecting in-network threats.

Deception as a Security Discipline for Advanced Threat Detection and Defense

Will the addition of deception deliver a bona fide return? We believe that deception delivers an effective and efficient defense and will share our rationale in this webinar.

Securing Patient Data When Prevention Systems Have Failed with Daniel from Mission Health

InfoSec Professional explains how he used deception technology to stop the aggressive spread of Qakbot

Harnessing Unparalleled Visibility in Cyber Attack Investigations

Demo of advanced forensic analysis, reporting, and how prevention system integrations expedite remediation.

What’s Lurking Deep in Your Network

Advanced techniques for finding malware lurking in corporate domains, remote offices, data centers, and in the cloud.