Webinar: Hacking Exposed Series - Bypassing Next-Gen
Join us in March for an exciting two-part Hacking Exposed webinar series led by Cylance® Chief Evangelist Brian Robison.
Part 1 – March 21: Hacking Exposed. Brian will provide a live demonstration of the hacking techniques adversaries are now using to breach endpoint defenses. He’ll examine a variety of file-based and fileless methods, including memory exploits, living off the land attacks, script- and application-based attacks, and more.
Part 2 – March 28: Cylance vs. Hacking Exposed. Brian will return to demonstrate how Cylance’s AI-based platform for endpoint protection, detection, and automated response stops these same attacks cold, before they can execute and compromise organizational assets.
Register for this two-part Hacking Exposed webinar series and see for yourself why a prevention-first security posture is not only practical, but also the most effective way to minimize your risks of a serious compromise.
March 21 and 28, multiple sessions
Webinar length: 1 hour
Participants have the opportunity to select the session
that best fits their schedule and region.
The sessions are APAC, EMEA and North America time zones.
In this webinar you will:
- Learn about the latest cyber threats at Cylance’s two-part Hacking Exposed webinar series in March.
- Get the latest threat intelligence at Cylance Hacking Exposed webinars
- See for yourself why a prevention-first security posture is not only practical, but also the most effective way to minimize your risks of a serious compromise.
About the Presenter:
Brian Robison (@CylanceSecTech) is the Chief Evangelist at Cylance, where he leads a team educating the world that preventing cybersecurity threats is actually possible and a much better approach than detecting and responding after the attack. Prior to joining Cylance, Brian spent five years helping secure corporate data on mobile devices; three years at Citrix as Director of Technical Marketing for the Citrix Mobility Group (XenMobile) and two years driving enterprise product strategy at Good Technology. Before moving into the mobile security space, Brian’s career focused on endpoint security and risk and compliance. At McAfee, he led the effort to bring ePolicy Orchestrator into the modern age as well as managing the vulnerability management and policy compliance solutions.
Earn One CPE Credit When You Attend
This webinar is eligible for your continuing professional education credit. Attendees in the International Information System Security Certification Consortium (ISC)2 Program will earn one credit for attending this webinar.