All202120202019Lares Customer Summit

Defensive Strategies: The Power of Visibility


Security programs are struggling with noise. What is legitimate and what is suspicious? Attackers use that to their advantage to hide and move around inside your environment. Offense should inform defense but is that truly happening? The attack paths are less focused on exploitation and more successful with tactics and techniques. Visibility and monitoring are the most effective ways to defend against these breaches.

This webinar will discuss the top threats seen in the wild as well as the top ways Red Teams are actually breaking in. What are defensive programs missing and how can defensive strategies make the attacker’s job extremely hard. Join Lee Kagan and Anton Ovrutsky to learn how you can detect these common tactics and stop attackers (and pentesters) dead in their tracks.

Presented by::Lares

Presenters::Lee Kagan and Anton Ovrutsky

Date::July 29, 2020

Why Remediation Needs to be Part of Your Vulnerability Management Program


Consistent headlines have been made for years about the latest and nastiest vulnerability – how bad it is, how vulnerable you are to it, and what an attacker of any sophistication can do to you via it if you don’t patch it fast enough. This has led to a movement to do continuous vulnerability management, where you are able to do more than scan your network, but remediate also.

How can you bridge the gap between IT and operations to achieve a level of satisfactory security, to identify assets and ensure that the next zero-day doesn’t leave you feeling left behind? In this webinar we will look at ways to improve your continuous vulnerability management program.

Presented by::Infosecurity Magazine

Presenters::Andrew Hay, COO at Lares and Chris Goettl, Product Manager at Ivanti

Date::May 7, 2020

Purple Teaming with ATT&CK


Security programs are struggling with noise. What is legitimate, and what is suspicious? Attackers use that to their advantage to hide and move around inside your environment. Offense should inform defense – but is that truly happening? The attack paths are less focused on exploitation and more successful with tactics and techniques. Visibility and monitoring are the most effective ways to defend against these breaches.

This webinar will discuss the top threats seen in the wild, as well as the top ways Red Teams are actually breaking in. Cybersecurity experts will explore what defensive programs are missing – and how you can deploy defensive strategies to make attacker’s job extremely difficult.

Join us on May 6th to learn how can teams come together on both offense and defense to outmatch the highest priority threats. This open and frank discussion featuring experts at VMware Carbon Black and Lares will cover how to cut through the noise so you can direct your prevention, detection, and response toward the attacks that matter most.


Presented by::Lares and Carbon Black

Presenters::Rick McElroy and Chris Nickerson

Date::May 6, 2020

Making a SOAR Strategy Work For You


Security operations, automation, and response (SOAR) has become an essential tool for security, as it reduces manual, repetitive tasks and enables analysts to have a better working process. This can be a force multiplier for your security operations center, making life better for them?

In this webinar, we will look at SOAR and where it can be used to make life easier for the analyst, what strategies you can use to have consistent processes that work and how to do more with less.

Presented by::Infosecurity Magazine

Presenters::Andrew Hay, COO at Lares, Joe Hancock, Head of Cyber at MDR Cyber, and Nick Tausek Security Research Engineer, Swimlane

Date::Feb 6, 2020

Using SIEM to Protect Against Top Cybersecurity Threats


There are countless ways that a business can make it easier for a threat actor to find their way in undetected – and the onus is on security to stop, detect and prevent the attacker from getting in the first place. This is where SIEM can enable a business, and ensure that aggregated and analyzed data and log records give you a clear picture of what is happening on your network.

In this webinar, we will look at the most common ways that organizations unintentionally put themselves at risk against threats, understand how organizations can be better equipped to find these malicious instances and what solutions they can put in place to get a clearer picture of what is happening on your network.

Presented by::Infosecurity Magazine

Presenters::Andrew Hay, COO at Lares and Bob Erdman, Security Product Manager, Core Security

Date::Apr 30, 2020

What Credit Union’s Need to Know About Online Meeting Security


Most credit unions have turned to online meeting software such as Zoom, Google Hangouts, WebEx, and GoToMeeting to communicate with staff during the COVID-19 shutdown in an effort to stay productive and continue providing members with the services they count on. Recent events, however, have cast a dark shadow on some of these tools (namely Zoom) causing some organizations to completely change from one platform to the other. Those that haven’t changed providers are also considering the ramifications of staying with their current selection. So what’s the best course of action? Should you stay or should you go?

Join Lares CISOs Andrew Hay and Mark Arnold on this free webinar as they discuss the pros and cons of staying on the same platform vs. jumping to another provider. In this session Andrew and Mark will discuss:
– Why the Zoom “issue” isn’t as bad as everyone says,
– The challenges of rapidly switching to another platform, and
– Ways to protect yourself and your members from the recently disclosed vulnerabilities.

Presented by::Lares

Presenters::Andrew Hay, COO at Lares and Mark Arnold, VP Advisory Services, vCISO Practice at LARES

Date::Apr 15, 2020

Top 10 Penetration Test Findings of 2019


Lares® encounters a seemingly endless number of vulnerabilities and attack vectors when we conduct a penetration test or red team engagement, regardless of organization size or maturity. Though not every engagement is identical, we have analyzed the similarities between hundreds of engagements throughout 2019. Join Eric Smith and Tim McGuffin as they discuss the most frequently observed penetration test findings encountered by the Lares team.

Every registered attendee will receive a complimentary copy of the Top 10 Penetration Test Findings Report.

Presented by::Lares

Presenters::Eric Smith, Lares and Tim McGuffin, Lares

Date::Apr 8, 2020

How DNS-Based Attacks Operate from the Inside Out, and How to Defend Against Them


The Domain Name System (DNS) plays a critical role in modern network connectivity. Unfortunately, it is also a central part of many cyber-attacks as DNS is involved in more than 90% of malware/ransomware and nearly half of all data exfiltration incidents.

So how exactly how do cyber-criminals use DNS to carry out attacks? In this webinar we will examine the many ways cybercriminals exploit the unique properties of DNS.

Presented by::Infosecurity Magazine

Presenters::Andrew Hay, COO at Lares, Gary Cox Technology Director, Western Europe at Infoblox, and Omer Farooq Senior Software Engineer at Independent Security Evaluators

Date::May 9, 2019

How to Assess Phishing Awareness & Evaluate Simulation Alternatives


While many companies regularly run phishing simulations on their employees, evidence about this approach’s effectiveness is divisive. In addition, the culture of fear it engenders (by shaming those who fail) can be counterproductive, leaving your overtaxed security team to sift through mountains of reported phish attempts that are actually spam.

In this webinar, we will look at security awareness training as a whole, discuss the effectiveness of the phishing simulation test as a key component, and review alternate approaches to training that may have better results.

Presented by::Infosecurity Magazine

Presenters::Andrew Hay, COO at Lares, EJ Whaley Solutions Engineer at GreatHorn, and Lauren Zink Security Awareness Manager at AmTrust Financial

Date::May 30, 2019

Malware Mayhem: The Evolving Threat Landscape


Financially motivated malware, commonly referred to simply as ‘crimeware, is by far the most prevalent threat facing organizations and individuals alike and represents billions of dollars in losses annually.

In 2018, the malware threat landscape saw many twists and turns. Traditional dangers like ransomware continued to hit companies and impact their bottom line, whilst newer threats like cryptojacking – the surreptitious mining of crypto currencies – had notably significance in the first half of the year.

The previous 12 months showed the industry that malicious attackers constantly strive to achieve maximum impact and gain, in both tactics and technology.

This webinar will explore how financially motivated malware has changed the security landscape over the last year.

Presented by::Infosecurity Magazine

Presenters::Andrew Hay, COO at Lares, Brandon Levene Head Of Applied Intelligence at Virus Total, and Raef Meeuwisse, Author of Cybersecurity for Beginners

Date::Jan 17, 2020

Security in a Forcibly Converged World


With the increased remote working arrangements due to the ongoing pandemic, corporate endpoints are now located far beyond the standard corporate perimeter. To make matters worse, many employee’s dependents are also working and beginning schooling on the very same network now serving as an extension of your corporate infrastructure.

This arrangement, at this scale, was likely not considered when drafting organizational policies and standards. Likewise, operational security controls may not have previously existed or been tested before the entire organization started working from home. The corporate threat models almost certainly were not scoped to include family members’ systems, IoT devices, or connected toys.

The Forcibly Converged Network has its challenges. Every organization’s architecture is different; every home network and the devices communicating with the Internet is unique, and every parent or guardian overseeing and authorizing Internet usage have their own beliefs and rules.

Join this exclusive roundtable discussion with Lares experts – each of who brings their own unique parenting, security, and anecdotal perspectives to this new problem.

Presented by::Lares

Lares Customer Summit 2020 (Full)


​We can all agree that 2020 has been challenging. To thank our loyal customers Lares® has decided to provide an exclusive virtual online learning event on Wednesday, December 2nd 2020 starting at 9:30am EST and ending at 6:00pm EST.

The day-long online event will feature technical presentations from our engineers, updates from the executive team, and a number of Lares customer roundtable discussions on various topics.

Presented by::Lares


Date::Dec 2, 2020

Managing Security and Risk in a Microsoft 365 Environment


Many organizations have accelerated their digital transformation in recent months, often out of necessity to keep operations running during the COVID-19 crisis. In turn, this transformation has seen Microsoft 365 adoption grow exponentially.

There are many benefits to using Microsoft 365 as a collaboration and productivity toolset, but how do you manage security and risk within a Microsoft 365 environment? Ignoring security gaps and relying on a single vendor dramatically increases risk, but with many cybersecurity teams being asked to reduce costs in the challenging economic climate, taking a single vendor approach can be tempting.

Join this webinar to learn more about the security gaps in Microsoft 365 and how you can implement strategies to mitigate them.

Presented by::Infosecurity Magazine

Presenters::Andrew Hay, COO at Lares, Mikey Molfessis, Engineer at Mimecast, Zoe Rose, Cybersecurity Specialist at BH Consulting

Date::Jan 14, 2021


Making Cybersecurity Work in Small and Medium-Sized Businesses


Small and medium-sized businesses (SMBs) sometimes believe they are too small to be targeted by cyber attackers. In recent years, that idea has been debunked by a wide variety of attacks on SMBs, from simple malware to account takeover. Yet many SMBs cannot take advantage of enterprise security tools and services that are too expensive or complex for their small teams to manage. In this Dark Reading webinar, experts offer tips and recommendations for securing the smaller enterprise, and for implementing simple, affordable tools and best practices that make sense for resource-limited SMB.

When you attend this webinar, you will:

  • Get an overview of the latest cyber threats posed to small and medium-sized businesses
  • Learn how your small or medium-sized business can employ enterprise-class defense strategies without a large team
  • Get tips on how to improve cybersecurity on a shoestring budget
  • Find out about free and low-cost open source tools
  • Learn how third-party service providers can help secure your business

Presented by::Dark Reading

Presenters::Andrew Hay, COO at Lares, Dave Gormley, Product Marketing Manager at Cisco, and Tim Wilson, Editor in Chief of Dark Reading

Date::Feb 3, 2021


Becoming a Next-Gen CISO: Leading from the Front


More threats, more systems to protect, more tools to deploy, and more people to manage – the CISO’s job continues to get more complicated, and that’s not including their responsibilities at the senior management table.

Turning myriad bits and bytes into easily digestible and actionable insights for corporate leadership is a tremendous challenge for today’s CISO – a challenge that requires new strategies and processes to overcome.

In this webinar, a panel of security experts will discuss how cybersecurity program management transforms today’s back-office CISOs into next-generation corporate leaders, outlining key steps to evolve your program to quickly and accurately assess cyber-preparedness and successfully communicate results and requirements in the boardroom.

Presented by::Infosecurity Magazine

Presenters::Andrew Hay, COO at Lares, Perry Robinson, Solutions Architect for Product Strategy at ProcessUnity

Date::Feb 25, 2021


Where There is Unity, There is Victory

[Ubi concordia, ibi victoria]

– Publius Syrus

Contact Lares Consulting logo (image)

Continuous defensive improvement through adversarial simulation and collaboration.

Email Us

©2024 Lares, a Damovo Company | All rights reserved.

Error: Contact form not found.

Error: Contact form not found.

Privacy Preferences

When you visit our website, it may store information through your browser from specific services, usually in the form of cookies. Some types of cookies may impact your experience on our website and the services we are able to offer. It may disable certain pages or features entirely. If you do not agree to the storage or tracking of your data and activities, you should leave the site now.

Our website uses cookies, many to support third-party services, such as Google Analytics. Click now to agree to our use of cookies or you may leave the site now.