Defending Your Domains: DNS Abuse Defenses

Phishing and website impersonations are one of the most common and harmful techniques that cause a substantial amount of damage. Mining DNS data can be a great and effective way to prevent these attacks from ever taking off. We will discuss how to detect and blacklist sites before the first fraudulent email or first web connection is made. Learn about techniques and tools available to stop these attacks at root.
Alex Holden | April 18, 2019 | 60 min

Information Security – Building the Right Team – Success Stories

One of the toughest fights in information security is the fight for your budget. The most integral part of your budget are your employees. We will discuss how strategic investments into the human capital can make or break your security posture. How to get the right talent, and also how to retain it. The human side of economics is usually the most unpredictable one and you need to know how to navigate it.
Alex Holden | March 19, 2019 | 61 min

Facts and Myths about Stolen Credentials

The simplest way to compromise systems is not by hacking but through use of previously stolen information like credentials that would let the bad guys walk in through the front door and take everything. Therefore, stolen credentials have a high demand on the Dark Web and we are constantly barraged by news about massive credentials thefts. You should be protecting your users from losing their credentials and subsequent abuse. However, you should also protect them against misinformation about “new” credentials cache discoveries.

Alex Holden | Feb. 19, 2019 | 62 min

Threat Landscape Forecast 2019

With 2018 almost behind us, let’s examine what advances did hackers make recently, and what is in store for us in 2019. Join this interactive webinar to learn more about trends in: Ransomware Phishing 0-day Exploitation DDoS, and others.

Alex Holden | Jan. 15, 2019 | 62 min

Cybersecurity of Tomorrow

Learn what kind of challenges the next generations of technology will bring to cybersecurity and what kind of safeguards we are building. From our history of technologies becoming obsolete, to the rise and fall of hacker techniques; we can derive our lessons and not only fantasize about our future but predict it based on a solid track record from the past.
Alex Holden | Jan. 15, 2019 | 62 min

Detecting a Breach – Dark Web

We try to fortify our perimeter against the hackers. The truth is that some of them get through, and in most dire cases, they take your data with them to the Dark Web. We will discuss detection of the breaches from the Dark Web perspective. What hackers do with your data, and how to tune your tools to detect your breached data outside of your perimeter.

Alex Holden | Sept. 17, 2018 | 60 min

HealthCare Data – Hacker Magnet

What do hackers want to do with your medical data? These are practical examples from the Dark Web of real HealthCare data abuse. What is important to the bad guys, what is not? Learn about the hackers’ perspective and how to defend the data against abuses.
Alex Holden | Aug. 15, 2018 | 62 min

Breach Detection and Response Handbook

With GDPR present, getting breached not only carries losses due to hackers but the potential of penalties from the regulators and government. What is the best advice on how to deal with breaches, besides not getting breached? Let’s discuss the basics to show a measured standard for detecting malicious events, classifying them, and responding with at most efficiency.

Alex Holden | June 6, 2018 | 61 min

Data Breach Price Tag

Most breaches cannot be simply mitigated with technology or cyber insurance. Breaches have short-term and long-term price tags that come with loss of reputation with customers and stakeholders. We will discuss the true costs of breaches and what you can do to minimize the impact they cause.
Alex Holden | April 25, 2018 | 63 min

Don’t Panic – Practical Guide to Dealing with Security Incidents

If your organization has never been breached, think again, it probably happened and more than once. If you have dealt with a data breach before, you know how stressful and painful this can be. But let’s take a step back and examine: The basics for the incident response How to deal with the worst that the hackers can throw at you and still re-emerge successfully.
Alex Holden | March 22, 2018 | 63 min
2 3 4 5 6

Solutions Threat Intelligence Services Credential Integrity Service Domain Integrity Service Information Security Assessment Services Incident Response and Investigation
Call
1 (414) 678 1414
Mail
info@holdsecurity.com
Social
Our offices
Copyright © 2024 Hold Security