Webinars

  • Why Remediation Needs to be Part of Your Vulnerability Management Program

    Infosecurity Magazine, May 7, 2020

    Consistent headlines have been made for years about the latest and nastiest vulnerability – how bad it is, how vulnerable you are to it, and what an attacker of any sophistication can do to you via it if you don’t patch it fast enough. This has led to a movement to do continuous vulnerability management, where you are able to do more than scan your network, but remediate also.

    How can you bridge the gap between IT and operations to achieve a level of satisfactory security, to identify assets and ensure that the next zero-day doesn’t leave you feeling left behind? In this webinar we will look at ways to improve your continuous vulnerability management program.

    Presented by Lares COO Andrew Hay.

    Making a SOAR Strategy Work For You

    Infosecurity Magazine, February 6, 2020

    Security operations, automation and response (SOAR) has become an essential tool for security, as it reduces manual, repetitive tasks and enables analysts to have a better working process. This can be a force multiplier for your security operations center, making life better for them?

    In this webinar, we will look at SOAR and where it can be used to make life easier for the analyst, what strategies you can use to have consistent processes that works and how to do more with less.

    Presented by Lares COO Andrew Hay.

  • How DNS-Based Attacks Operate from the Inside Out, and How to Defend Against Them

    Infosecurity Magazine, May 9, 2019

    The Domain Name System (DNS) plays a critical role in modern network connectivity. Unfortunately, it is also a central part of many cyber-attacks as DNS is involved in more than 90% of malware/ransomware and nearly half of all data exfiltration incidents.

    So how exactly how do cyber-criminals use DNS to carry out attacks? In this webinar we will examine the many ways cybercriminals exploit the unique properties of DNS.

    Presented by Lares COO Andrew Hay.

    How to Assess Phishing Awareness & Evaluate Simulation Alternatives

    Infosecurity Magazine, May 30, 2019

    While many companies regularly run phishing simulations on their employees, evidence about this approach’s effectiveness is divisive. In addition, the culture of fear it engenders (by shaming those who fail) can be counterproductive, leaving your overtaxed security team to sift through mountains of reported phish attempts that are actually spam.

    In this webinar, we will look at security awareness training as a whole, discuss the effectiveness of the phishing simulation test as a key component and review alternate approaches to training that may have better results.

    Presented by Lares COO Andrew Hay.

    Malware Mayhem: The Evolving Threat Landscape

    Infosecurity Magazine, January 17, 2019

    Financially motivated malware, commonly referred to simply as ‘crimeware, is by far the most prevalent threat facing organizations and individuals alike and represents billions of dollars in losses annually.

    In 2018, the malware threat landscape saw many twists and turns. Traditional dangers like ransomware continued to hit companies and impact their bottom line, whilst newer threats like cryptojacking – the surreptitious mining of crypto currencies – had notably significance in the first half of the year.

    The previous 12 months showed the industry that malicious attackers constantly strive to achieve maximum impact and gain, in both tactics and technology.

    This webinar will explore how financially motivated malware has changed the security landscape over the last year.

    Presented by Lares COO Andrew Hay.

Where There is Unity, There is Victory

[Ubi concordia, ibi victoria]

– Publius Syrus

Contact Lares Consulting logo (image)

Continuous defensive improvement through adversarial simulation and collaboration.

Email Us

©2019 Lares, LLC | All rights reserved.
Privacy Preferences

When you visit our website, it may store information through your browser from specific services, usually in the form of cookies.Some types of cookies may impact your experience on our website and the services we are able to offer. It may disable certain pages or features entirely. If you do not agree to the storage or tracking of your data and activities, you should leave the site now.

Our website uses cookies, many to support third-party services, such as Google Analytics. Click now to agree to our use of cookies or you may leave the site now.