November 27, 2018 | Renaissance Dallas Hotel

https://www.evanta.com/ciso/summits/dallas/1676#overview

Beyond the Hype: AI in Information Security

Beyond the Hype: AI in Information Security

In the next few years, Artificial Intelligence (AI) will transform and expand as a decision engine across every enterprise business layer from product development to operations to finance to sales. While, internet biggies like Google, Facebook, Microsoft and Saleforce...

Lateral Movement of Emotet

Lateral Movement of Emotet

Acalvio Threat Research Labs. Introduction Emotet is one of many information stealer malware families which have been active in the recent months. The initial delivery vector of the malware is via phishing campaign. The blog by TrendMicro[1] and Microsoft[2] discusses...

Three Minutes Until the Apocalypse

Three Minutes Until the Apocalypse

This blog covers three main topics: Three Key Questions Needing Answers Within Three Minutes When You Suspect a Breach Using Deception and Endpoint Logs to Backtrack Command and Control Improving SOC Triage Workflow with Prevention Failure Detection An adversary has...

Spreading Technique used by Retadup Worm.

Spreading Technique used by Retadup Worm.

Acalvio Threat Research Lab Retadup worm has been in the news recently. It was first observered infecting Israeli Hospitals [1] and recently it was observered active in South America mining for Crypto Currency[2]. The details of the worm have been published by Trend...

Can We Automate Threat Hunting?

Can We Automate Threat Hunting?

Threat hunting has been primarily a playground for security experts to surface unknown threats. It is a proactive security approach where the hunt starts with a hypothesis about a hidden threat that may be already in the enterprise network. According to 2017 survey on...

Ransomware Defense Webinar with Acalvio & Splunk

Ransomware Defense Webinar with Acalvio & Splunk

Ransomware is the fastest-growing threat facing enterprises, threatening to reach a total cost of $5 Billion in impact. A deception centric architecture provides inherent advantages over other traditional architectures. Learn more about how a deception-based approach...