Upcoming Webinars

Past Webinars

  • Why Remediation Needs to be Part of Your Vulnerability Management Program

    Infosecurity Magazine, May 7, 2020

    Consistent headlines have been made for years about the latest and nastiest vulnerability – how bad it is, how vulnerable you are to it, and what an attacker of any sophistication can do to you via it if you don’t patch it fast enough. This has led to a movement to do continuous vulnerability management, where you are able to do more than scan your network, but remediate also.

    How can you bridge the gap between IT and operations to achieve a level of satisfactory security, to identify assets and ensure that the next zero-day doesn’t leave you feeling left behind? In this webinar we will look at ways to improve your continuous vulnerability management program.

    Presented by Lares COO Andrew Hay.

    Purple Teaming with ATT&CK

    Carbon Black and Lares, May 6, 2020

    Security programs are struggling with noise. What is legitimate, and what is suspicious? Attackers use that to their advantage to hide and move around inside your environment. Offense should inform defense – but is that truly happening? The attack paths are less focused on exploitation and more successful with tactics and techniques. Visibility and monitoring are the most effective ways to defend against these breaches.

    This webinar will discuss the top threats seen in the wild, as well as the top ways Red Teams are actually breaking in. Cybersecurity experts will explore what defensive programs are missing – and how you can deploy defensive strategies to make attacker’s job extremely difficult.

    Join us on May 6th to learn how can teams come together on both offense and defense to outmatch the highest priority threats. This open and frank discussion featuring experts at VMware Carbon Black and Lares will cover how to cut through the noise so you can direct your prevention, detection, and response toward the attacks that matter most.

    Using SIEM to Protect Against Top Cybersecurity Threats

    Infosecurity Magazine, April 30, 2020

    There are countless ways that a businesses can make it easier for a threat actor to find their way in undetected – and the onus is on security to stop, detect and prevent the attacker from getting in the first place. This is where SIEM can enable a business, and ensure that aggregated and analyzed data and log records give you a clear picture of what is happening on your network.

    In this webinar, we will look at the most common ways that organizations unintentionally put themselves at risk against threats, understand how organizations can be better equipped to find these malicious instances and what solutions they can put in place to get a clearer picture of what is happening on your network.

    Presented by Lares COO Andrew Hay.

    What Credit Union’s Need to Know About Online Meeting Security

    Lares, April 15, 2020

    Join Lares CISOs Andrew Hay and Mark Arnold on this free webinar as they discuss the pros and cons of staying on the same platform vs. jumping to another provider.

    Making a SOAR Strategy Work For You

    Infosecurity Magazine, February 6, 2020

    Security operations, automation and response (SOAR) has become an essential tool for security, as it reduces manual, repetitive tasks and enables analysts to have a better working process. This can be a force multiplier for your security operations center, making life better for them?

    In this webinar, we will look at SOAR and where it can be used to make life easier for the analyst, what strategies you can use to have consistent processes that works and how to do more with less.

    Presented by Lares COO Andrew Hay.

  • How DNS-Based Attacks Operate from the Inside Out, and How to Defend Against Them

    Infosecurity Magazine, May 9, 2019

    The Domain Name System (DNS) plays a critical role in modern network connectivity. Unfortunately, it is also a central part of many cyber-attacks as DNS is involved in more than 90% of malware/ransomware and nearly half of all data exfiltration incidents.

    So how exactly how do cyber-criminals use DNS to carry out attacks? In this webinar we will examine the many ways cybercriminals exploit the unique properties of DNS.

    Presented by Lares COO Andrew Hay.

    How to Assess Phishing Awareness & Evaluate Simulation Alternatives

    Infosecurity Magazine, May 30, 2019

    While many companies regularly run phishing simulations on their employees, evidence about this approach’s effectiveness is divisive. In addition, the culture of fear it engenders (by shaming those who fail) can be counterproductive, leaving your overtaxed security team to sift through mountains of reported phish attempts that are actually spam.

    In this webinar, we will look at security awareness training as a whole, discuss the effectiveness of the phishing simulation test as a key component and review alternate approaches to training that may have better results.

    Presented by Lares COO Andrew Hay.

    Malware Mayhem: The Evolving Threat Landscape

    Infosecurity Magazine, January 17, 2019

    Financially motivated malware, commonly referred to simply as ‘crimeware, is by far the most prevalent threat facing organizations and individuals alike and represents billions of dollars in losses annually.

    In 2018, the malware threat landscape saw many twists and turns. Traditional dangers like ransomware continued to hit companies and impact their bottom line, whilst newer threats like cryptojacking – the surreptitious mining of crypto currencies – had notably significance in the first half of the year.

    The previous 12 months showed the industry that malicious attackers constantly strive to achieve maximum impact and gain, in both tactics and technology.

    This webinar will explore how financially motivated malware has changed the security landscape over the last year.

    Presented by Lares COO Andrew Hay.

Where There is Unity, There is Victory

[Ubi concordia, ibi victoria]

– Publius Syrus

Contact Lares Consulting logo (image)

Continuous defensive improvement through adversarial simulation and collaboration.

©2019 Lares, LLC | All rights reserved.
    Privacy Preferences

    When you visit our website, it may store information through your browser from specific services, usually in the form of cookies. Some types of cookies may impact your experience on our website and the services we are able to offer. It may disable certain pages or features entirely. If you do not agree to the storage or tracking of your data and activities, you should leave the site now.

    Our website uses cookies, many to support third-party services, such as Google Analytics. Click now to agree to our use of cookies or you may leave the site now.