So were we. Come join us and learn the difference. With every vendor having a ‘Detection & Response’ story, we hope to explain the differences, remove the fog, and identify the gaps and therefore the blind spots. Is EDR/NDR really a quick fix alternative to fully functioning SIEM/SOC deployment?
Recorded on: Wednesday 31st March 2021
Dark Halo and M365: How Microsoft helped attackers hide in plain sight
Microsoft 365 is the latest major attack vector. Misconfigurations are now a favoured channel for unauthorised use of identities and access to data without alerting security teams. We look at why M365 is fast becoming the target, recent breaches of M365 (including the Dark Halo breach), and what we need to do to detect and mitigate the risk.
Recorded on: Monday 29th March 2021
Threat hunting in the real world and how attackers avoid endpoints
Cybercriminals constantly evolve their tactics to avoid detection. Join us for two webinars in one – First we demonstrate how attackers avoid your endpoints and detection. Learn how to identify attacks and defend against them. We also look at creating a threat hunting programme, the key processes needed and the challenges you will face.
Recorded on: Wednesday 10th March 2021
Domain Trust: Building trust in the domain name ecosystem
Thousands of criminal domains are registered every day. Domain Trust provides high quality, large-scale data sets on these suspected malicious domains and provides intelligence to allow further action: investigation, suspension, or disablement. Join us to hear more from GCA about the issue, the platform, the partners, and the impact of Domain Trust.
Recorded on: Monday 8th March 2021
Cyber Attack Lab live demonstration – Malware, C&C, and DNS exfiltration
A live malware attack demonstration also featuring C&C and DNS exfiltration. The demo starts with convincing a user to open an infected document, establishing a connection to the network, then stealing top-secret data. You’ll also learn how to run a fast and conclusive investigation – without wasting hours stitching logs or running reports.
Recorded on: Tuesday 2nd March 2021
The world of the expert witness and how to interact with them
In IT-related litigation - civil and criminal - the courts and participants often require experts to investigate, analyse and explain. Indeed, you may need to employ them. So join us as Peter explains the rules that you and the experts must follow, and that you should understand. Learn about the actual experience of interacting with them from real cases.
Recorded on: Wednesday 16th December 2020
The Police Cyber Alarm: Giving police real-time threat data, so organisations protect themselves
Policing lacks the true picture of the scale, nature and impact of cybercrime on business in the UK. We learn how policing is moving into the machine learning world with the Police Cyber Alarm. This provides police with real-time data on suspicious activity and attacks. Law enforcement can locate and pursue criminals, advising organisations on how to protect themselves.
Recorded on: Tuesday 8th September 2020
A cornucopia of cybersecurity good news
Gain insight into excellent cybersecurity initiatives, including: The Cyber Security Body of Knowledge, providing knowledge from international experts; The Cyber Helpline, giving free, expert advice to cybercrime victims; The Metropolitan Police Cyber Choices Team, educating and deterring individuals from cybercrime; and the Deciphering the Cyber Market platform, bringing users and vendors together.
Recorded on: Monday 17th August 2020
As the world transformed in the face of a global pandemic, how did hackers of all stripes react?
While there have been many attention-grabbing headlines about the rise of cybercrime during the coronavirus pandemic, most proved to be wide of the mark. We are delighted for Geoff to join us as he takes us behind the hyperbole, with a fascinating cybercrime story of how the different groups that make up today's cyber threat responded to the global pandemic.