ºÝºÝߣshows by User: Cybereason / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: Cybereason / Thu, 06 Jul 2017 18:35:43 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: Cybereason Antifragile Cyber Defense /slideshow/antifragile-cyber-defense/77587176 antifragiledefense-170706183543
Let's look at the asymmetry between attackers and defenders. How do you shift the odds to favor the defender? ]]>

Let's look at the asymmetry between attackers and defenders. How do you shift the odds to favor the defender? ]]>
Thu, 06 Jul 2017 18:35:43 GMT /slideshow/antifragile-cyber-defense/77587176 Cybereason@slideshare.net(Cybereason) Antifragile Cyber Defense Cybereason Let's look at the asymmetry between attackers and defenders. How do you shift the odds to favor the defender? <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/antifragiledefense-170706183543-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Let&#39;s look at the asymmetry between attackers and defenders. How do you shift the odds to favor the defender?
Antifragile Cyber Defense from Cybereason
]]>
2194 3 https://cdn.slidesharecdn.com/ss_thumbnails/antifragiledefense-170706183543-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
An Introduction to the Agile SoC /slideshow/an-introduction-to-the-agile-soc/77586720 anintroductiontotheagilesoc-170706181941
A quick and dirty background on applying the Agile framework to security operations. Scrum in your SOC!]]>

A quick and dirty background on applying the Agile framework to security operations. Scrum in your SOC!]]>
Thu, 06 Jul 2017 18:19:41 GMT /slideshow/an-introduction-to-the-agile-soc/77586720 Cybereason@slideshare.net(Cybereason) An Introduction to the Agile SoC Cybereason A quick and dirty background on applying the Agile framework to security operations. Scrum in your SOC! <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/anintroductiontotheagilesoc-170706181941-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A quick and dirty background on applying the Agile framework to security operations. Scrum in your SOC!
An Introduction to the Agile SoC from Cybereason
]]>
1551 5 https://cdn.slidesharecdn.com/ss_thumbnails/anintroductiontotheagilesoc-170706181941-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Protecting the financial services industry /slideshow/protecting-the-financial-services-industry/76357856 protectingthefinancialservicesindustry-170525212347
A look at a customer's before and after Cybereason experience.]]>

A look at a customer's before and after Cybereason experience.]]>
Thu, 25 May 2017 21:23:47 GMT /slideshow/protecting-the-financial-services-industry/76357856 Cybereason@slideshare.net(Cybereason) Protecting the financial services industry Cybereason A look at a customer's before and after Cybereason experience. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/protectingthefinancialservicesindustry-170525212347-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A look at a customer&#39;s before and after Cybereason experience.
Protecting the financial services industry from Cybereason
]]>
313 2 https://cdn.slidesharecdn.com/ss_thumbnails/protectingthefinancialservicesindustry-170525212347-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Protecting the healthcare industry /slideshow/protecting-the-healthcare-industry/76357827 protectingthehealthcareindustry-170525212228
A look at a customer's before and after Cybereason experience. ]]>

A look at a customer's before and after Cybereason experience. ]]>
Thu, 25 May 2017 21:22:28 GMT /slideshow/protecting-the-healthcare-industry/76357827 Cybereason@slideshare.net(Cybereason) Protecting the healthcare industry Cybereason A look at a customer's before and after Cybereason experience. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/protectingthehealthcareindustry-170525212228-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A look at a customer&#39;s before and after Cybereason experience.
Protecting the healthcare industry from Cybereason
]]>
298 2 https://cdn.slidesharecdn.com/ss_thumbnails/protectingthehealthcareindustry-170525212228-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Protecting the manufacturing industry /slideshow/protecting-the-manufacturing-industry/76357672 protectingthemanufacturingindustry-170525211544
A look at a customer's before and after Cybereason experience. ]]>

A look at a customer's before and after Cybereason experience. ]]>
Thu, 25 May 2017 21:15:44 GMT /slideshow/protecting-the-manufacturing-industry/76357672 Cybereason@slideshare.net(Cybereason) Protecting the manufacturing industry Cybereason A look at a customer's before and after Cybereason experience. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/protectingthemanufacturingindustry-170525211544-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A look at a customer&#39;s before and after Cybereason experience.
Protecting the manufacturing industry from Cybereason
]]>
255 3 https://cdn.slidesharecdn.com/ss_thumbnails/protectingthemanufacturingindustry-170525211544-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The attack lifecycle. Cybereason can help you answer: Are you under attack? /slideshow/the-attack-lifecycle-cybereason-can-help-you-answer-are-you-under-attack/76357510 cybereasonattacklifecycle-areyouunderattack-170525210736
A walk through of each stage of the attack lifecycle and examples of what we see attackers doing to advance attacks.]]>

A walk through of each stage of the attack lifecycle and examples of what we see attackers doing to advance attacks.]]>
Thu, 25 May 2017 21:07:35 GMT /slideshow/the-attack-lifecycle-cybereason-can-help-you-answer-are-you-under-attack/76357510 Cybereason@slideshare.net(Cybereason) The attack lifecycle. Cybereason can help you answer: Are you under attack? Cybereason A walk through of each stage of the attack lifecycle and examples of what we see attackers doing to advance attacks. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cybereasonattacklifecycle-areyouunderattack-170525210736-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A walk through of each stage of the attack lifecycle and examples of what we see attackers doing to advance attacks.
The attack lifecycle. Cybereason can help you answer: Are you under attack? from Cybereason
]]>
599 2 https://cdn.slidesharecdn.com/ss_thumbnails/cybereasonattacklifecycle-areyouunderattack-170525210736-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The Incident Response Checklist - 9 Steps Your Current Plan Lacks /slideshow/the-incident-response-checklist-9-steps-your-current-plan-lacks/75823965 incidentresponsechecklist-170509172802
This quick guide takes a closer look at nine of the often forgotten, but important steps that you should incorporate into your IR plan.]]>

This quick guide takes a closer look at nine of the often forgotten, but important steps that you should incorporate into your IR plan.]]>
Tue, 09 May 2017 17:28:01 GMT /slideshow/the-incident-response-checklist-9-steps-your-current-plan-lacks/75823965 Cybereason@slideshare.net(Cybereason) The Incident Response Checklist - 9 Steps Your Current Plan Lacks Cybereason This quick guide takes a closer look at nine of the often forgotten, but important steps that you should incorporate into your IR plan. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/incidentresponsechecklist-170509172802-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This quick guide takes a closer look at nine of the often forgotten, but important steps that you should incorporate into your IR plan.
The Incident Response Checklist - 9 Steps Your Current Plan Lacks from Cybereason
]]>
2453 3 https://cdn.slidesharecdn.com/ss_thumbnails/incidentresponsechecklist-170509172802-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The Cyber Attack Lifecycle /slideshow/the-cyber-attack-lifecycle/75780165 attacklifecycle-170508142800
Looking at each stage of a cyber attack. How the Cybereason Detection and Response platform can conquer the attacker at each phase. ]]>

Looking at each stage of a cyber attack. How the Cybereason Detection and Response platform can conquer the attacker at each phase. ]]>
Mon, 08 May 2017 14:28:00 GMT /slideshow/the-cyber-attack-lifecycle/75780165 Cybereason@slideshare.net(Cybereason) The Cyber Attack Lifecycle Cybereason Looking at each stage of a cyber attack. How the Cybereason Detection and Response platform can conquer the attacker at each phase. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/attacklifecycle-170508142800-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Looking at each stage of a cyber attack. How the Cybereason Detection and Response platform can conquer the attacker at each phase.
The Cyber Attack Lifecycle from Cybereason
]]>
4129 9 https://cdn.slidesharecdn.com/ss_thumbnails/attacklifecycle-170508142800-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Maturing your threat hunting program /slideshow/maturing-your-threat-hunting-program/74389405 maturingyourthreathuntingprogram-170404211151
A closer look at threat hunting. Beyond the Basics]]>

A closer look at threat hunting. Beyond the Basics]]>
Tue, 04 Apr 2017 21:11:51 GMT /slideshow/maturing-your-threat-hunting-program/74389405 Cybereason@slideshare.net(Cybereason) Maturing your threat hunting program Cybereason A closer look at threat hunting. Beyond the Basics <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/maturingyourthreathuntingprogram-170404211151-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A closer look at threat hunting. Beyond the Basics
Maturing your threat hunting program from Cybereason
]]>
2763 3 https://cdn.slidesharecdn.com/ss_thumbnails/maturingyourthreathuntingprogram-170404211151-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Threat Hunting 102: Beyond the Basics /slideshow/threat-hunting-102-beyond-the-basics-73613334/73613334 threathunting102-beyondthebasics-170324184508
Threat hunting is the best, proactive approach. But, excelling at threat hunting, discovering adversaries takes time, patience, planning, and some serious skills. Mature beyond the basics of hunting and evolve your program!]]>

Threat hunting is the best, proactive approach. But, excelling at threat hunting, discovering adversaries takes time, patience, planning, and some serious skills. Mature beyond the basics of hunting and evolve your program!]]>
Fri, 24 Mar 2017 18:45:08 GMT /slideshow/threat-hunting-102-beyond-the-basics-73613334/73613334 Cybereason@slideshare.net(Cybereason) Threat Hunting 102: Beyond the Basics Cybereason Threat hunting is the best, proactive approach. But, excelling at threat hunting, discovering adversaries takes time, patience, planning, and some serious skills. Mature beyond the basics of hunting and evolve your program! <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/threathunting102-beyondthebasics-170324184508-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Threat hunting is the best, proactive approach. But, excelling at threat hunting, discovering adversaries takes time, patience, planning, and some serious skills. Mature beyond the basics of hunting and evolve your program!
Threat Hunting 102: Beyond the Basics from Cybereason
]]>
850 2 https://cdn.slidesharecdn.com/ss_thumbnails/threathunting102-beyondthebasics-170324184508-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Security Analytics: The Promise of Artificial Intelligence, Machine Learning, and Data Science /slideshow/security-analytics-the-promise-of-artificial-intelligence-machine-learning-and-data-science/72702857 security-analytics-the-security-promise-of-articifial-intelligence-machine-learning-and-data-science-170301160232
Security analytics, what is real and examined the promise, the hype and the real state of artificial intelligence, machine learning and data science in solving fundamental security problems.]]>

Security analytics, what is real and examined the promise, the hype and the real state of artificial intelligence, machine learning and data science in solving fundamental security problems.]]>
Wed, 01 Mar 2017 16:02:32 GMT /slideshow/security-analytics-the-promise-of-artificial-intelligence-machine-learning-and-data-science/72702857 Cybereason@slideshare.net(Cybereason) Security Analytics: The Promise of Artificial Intelligence, Machine Learning, and Data Science Cybereason Security analytics, what is real and examined the promise, the hype and the real state of artificial intelligence, machine learning and data science in solving fundamental security problems. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/security-analytics-the-security-promise-of-articifial-intelligence-machine-learning-and-data-science-170301160232-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Security analytics, what is real and examined the promise, the hype and the real state of artificial intelligence, machine learning and data science in solving fundamental security problems.
Security Analytics: The Promise of Artificial Intelligence, Machine Learning, and Data Science from Cybereason
]]>
2993 8 https://cdn.slidesharecdn.com/ss_thumbnails/security-analytics-the-security-promise-of-articifial-intelligence-machine-learning-and-data-science-170301160232-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Avoiding Sophisticated Targeted Breach Critical Guidance Healthcare /slideshow/avoiding-sophisticated-targeted-breach-critical-guidance-healthcare/72702164 avoiding-sophisticated-targeted-breach-critical-guidance-healthcare-170301154540
A closer look at black market machine trading and a case study examining specific tactics, techniques, and procedures (TTPs) utilized by adversaries. ]]>

A closer look at black market machine trading and a case study examining specific tactics, techniques, and procedures (TTPs) utilized by adversaries. ]]>
Wed, 01 Mar 2017 15:45:40 GMT /slideshow/avoiding-sophisticated-targeted-breach-critical-guidance-healthcare/72702164 Cybereason@slideshare.net(Cybereason) Avoiding Sophisticated Targeted Breach Critical Guidance Healthcare Cybereason A closer look at black market machine trading and a case study examining specific tactics, techniques, and procedures (TTPs) utilized by adversaries. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/avoiding-sophisticated-targeted-breach-critical-guidance-healthcare-170301154540-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A closer look at black market machine trading and a case study examining specific tactics, techniques, and procedures (TTPs) utilized by adversaries.
Avoiding Sophisticated Targeted Breach Critical Guidance Healthcare from Cybereason
]]>
361 4 https://cdn.slidesharecdn.com/ss_thumbnails/avoiding-sophisticated-targeted-breach-critical-guidance-healthcare-170301154540-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Some PowerShell Goodies /slideshow/some-powershell-goodies/72109997 cybereason-powershell-goodies-170213220742
This slideshow outlines 10 reasons why hackers use PowerShell to turn an operating system against itself and compromise entire networks without needing to install a single piece of software.]]>

This slideshow outlines 10 reasons why hackers use PowerShell to turn an operating system against itself and compromise entire networks without needing to install a single piece of software.]]>
Mon, 13 Feb 2017 22:07:42 GMT /slideshow/some-powershell-goodies/72109997 Cybereason@slideshare.net(Cybereason) Some PowerShell Goodies Cybereason This slideshow outlines 10 reasons why hackers use PowerShell to turn an operating system against itself and compromise entire networks without needing to install a single piece of software. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cybereason-powershell-goodies-170213220742-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This slideshow outlines 10 reasons why hackers use PowerShell to turn an operating system against itself and compromise entire networks without needing to install a single piece of software.
Some PowerShell Goodies from Cybereason
]]>
2145 2 https://cdn.slidesharecdn.com/ss_thumbnails/cybereason-powershell-goodies-170213220742-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Ransomware is Coming to a Desktop Near You /slideshow/ransomware-is-coming-to-a-desktop-near-you/71472683 ransomware-coming-to-a-desktop-near-you-170127193125
Malware just got personal! Learn more about ransomware, history, strains, trends, the business and how to defeat it. ]]>

Malware just got personal! Learn more about ransomware, history, strains, trends, the business and how to defeat it. ]]>
Fri, 27 Jan 2017 19:31:25 GMT /slideshow/ransomware-is-coming-to-a-desktop-near-you/71472683 Cybereason@slideshare.net(Cybereason) Ransomware is Coming to a Desktop Near You Cybereason Malware just got personal! Learn more about ransomware, history, strains, trends, the business and how to defeat it. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ransomware-coming-to-a-desktop-near-you-170127193125-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Malware just got personal! Learn more about ransomware, history, strains, trends, the business and how to defeat it.
Ransomware is Coming to a Desktop Near You from Cybereason
]]>
834 6 https://cdn.slidesharecdn.com/ss_thumbnails/ransomware-coming-to-a-desktop-near-you-170127193125-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-Cybereason-48x48.jpg?cb=1523394415 Founded by members of the Israeli intelligence agency’s elite cyber security Unit 8200, Cybereason mirrors the founders’ expertise in managing some of the world’s most complex hacking operations. Cybereason developed a real-time detection and response platform and has a proven track record of protecting Fortune 1,000 enterprises globally. The company has received many awards and accolades since its founding. Cybereason is privately held and headquartered in Boston with offices in Tel Aviv and Tokyo. www.cybereason.com https://cdn.slidesharecdn.com/ss_thumbnails/antifragiledefense-170706183543-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/antifragile-cyber-defense/77587176 Antifragile Cyber Defense https://cdn.slidesharecdn.com/ss_thumbnails/anintroductiontotheagilesoc-170706181941-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/an-introduction-to-the-agile-soc/77586720 An Introduction to the... https://cdn.slidesharecdn.com/ss_thumbnails/protectingthefinancialservicesindustry-170525212347-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/protecting-the-financial-services-industry/76357856 Protecting the financi...