bluehexagon.ai Open in urlscan Pro
2620:12a:8000::2  Public Scan

Submitted URL: https://go.bluehexagon.ai/MDM2LVdOVC0yMTgAAAF-_bICKaH25Tlck8Ak9gvmyzMMktxVXpDIvQjkHOUdM5sBQFOmysADSVpdBPIY_hsvOiHJHRM=
Effective URL: https://bluehexagon.ai/company/events/?mkt_tok=MDM2LVdOVC0yMTgAAAF-_bICKVmbZ2nN46aDrXhfPSdyfsybosa8lCYD-aGEIqZjwuC82f_Y...
Submission: On August 19 via api from US

Form analysis 0 forms found in the DOM

Text Content

 * Products
   * Blue Hexagon for AWS
   * Blue Hexagon for GCP
   * Blue Hexagon for Azure
   * Blue Hexagon for Network
 * Solutions
 * Resources
 * Company
   * Overview
   * News
   * Events
   * Partners
   * Careers
   * Contact
 * Blog
 * Customers

Free Trial

Cloud Security Events


COME MEET US


 * All
 * Events
 * Webinar

Webinar


WHY IS RANSOMWARE SO TOUGH TO AVOID? (CLICK HERE TO REGISTER NOW!)

August 17, 2021

AUGUST 17th ( 10 AM PDT )





Join John Petersen, Chief Information Officer, Heffernan Insurance Brokers
Trends and Saumitra Das, CTO and Cofounder of Blue Hexagon to learn about
Ransomware, the single largest malware impacting a new organization every 14
seconds, and what security leaders can do to avoid falling victim to this
cybercrime.





Ransomware has now evolved from “encrypting the data on the machine until the
ransom is paid” to more nefarious tasks, including disruption-ware, exfiltrating
sensitive corporate data, all in attempts to disrupt business and force payment.
And, with remote work on the rise, exploitation of remote access and user
devices increases corporate exposure to ransomware even more.





What you’ll learn from this webinar:





● Key concepts of ransomware





● Trends observed in hundreds of ransomware attacks as well as new trends on the
intent of ransomware actors





● Critical priorities for creating a cyber-resilient organization





● What should be your Ransomware toolkit





● New AI technologies and tools to cut through the rapidly changing threat
landscape

Learn More
Webinar


DEFENDING YOUR CLOUD WITH MITRE D3FEND (CLICK TO VIEW RECORDING)

August 12, 2021

AUGUST 12th ( 11 AM PDT )





Presented by: Dr. Neil Daswani, Co-Director of the Stanford Advanced
Cybersecurity Program and Dr. Saumitra Das, CTO Founder, Blue Hexagon





Modern cloud threats with complex, multi-stage kill chains cannot be mitigated
simply by compliance and configuration checks. The MITRE ATT&CK framework for
Cloud provides a structure for security teams to reason about attacker tactics
in their cloud. The newly announced MITRE D3FEND framework provides a standard
vocabulary for countermeasures against attackers.





In this live session, we will provide an overview of D3FEND and how it maps to
cloud security. We discuss the countermeasures security teams should consider
that are specific to cloud attack tactics. We also discuss how ATT&CK maps to
the technical root causes of breach that have impacted over 9,000 reported
breaches to date.





Security experts and cloud DevOps/DevSecOps attendees will learn about:





● MITRE ATT&CK and differences between Cloud and On-premises





● How MITRE ATT&CK maps to the technical root causes of breaches





● MITRE D3FEND and how to apply and extend it for your cloud





● How to prioritize and deploy countermeasures based on D3FEND



Learn More
Webinar


TALES FROM THE FRONTLINES OF NATION-STATE ATTACKS (CLICK TO VIEW RECORDING)

August 10, 2021

AUGUST 10th ( 10:15 AM PDT )





Speaker: Dr. Saumitra Das, CTO and Cofounder of Blue Hexagon





In just Q1 of 2021, there were already more than 20 documented high-impact
state-sponsored attacks. These state-sponsored attackers have great operational
security, are willing to lie low patiently, and persist to find the victim’s
crown jewels versus smashing and grabbing, and they are increasingly utilizing
the software supply chain and even the security supply chain and even the
security supply chain to gain initial access.





This webcast covers key tactics being used by state-sponsored attackers in
targeted intrusions with real battlefield examples including software supply
chain infection, security supply chain exploits, evasive C2 and beaconing, AI
and automation for malicious targeting and code generation, and lateral spread
between on-premises to cloud to mobile.





Understanding these tactics provides a framework for reasoning about the most
effective countermeasures. To deal with a sophisticated adversary, a
multipronged approach is needed for defense that includes:





● Focusing on detection and response of the unknown versus rules-based
prevention





● Supercharging security staff with tools that have an opinion versus just
visualizing a ton of log data





● Reducing attack surface proactively



Learn More
events


CLOUDSECNEXT SUMMIT ( JUN 3-4, LOGIN TO VIEW ON DEMAND )

June 4, 2021

JUNE 4th ( 12:35 – 1:10 PM EDT ) – Shift-Left is Not Sufficient: Why Agentless
Runtime AI Security is Necessary for the Cloud





Arun Raman, VP of Cloud Products, Blue Hexagon





There has been a huge hype about tools for dealing with cloud misconfigurations
and cloud security posture. However, modern attacks on the cloud cannot be
thwarted anymore by just shifting left. Attackers have moved to complex,
multi-stage attacks that use supply chain infection, evasive beaconing, zero-day
Linux malware, and ransoming cloud storage. These attacks only manifest at
runtime, and defending against them requires multi-vector inspection of
workload, network, storage, and control plane activity at runtime and in
real-time. As importantly, the security architecture must provide full cloud
coverage and must not introduce supply chain risk.





In this session, we will explore customer case studies on how an agentless
runtime AI security approach helped defend against real-life modern cloud
attacks.





We also demonstrate how such a solution can be deployed within minutes and
easily maintained in complex multi-region, multi-VPC, multi-OS, multi-account,
and multi-cloud architectures.

Learn More
Webinar


WEBCAST: HOW TO MANAGE THE TOP 10 CLOUD SECURITY RISKS ( VIEW ON-DEMAND )

May 26, 2021

In this session, we will go beyond the now pervasive and obvious example of open
cloud storage buckets to discuss the top 10 modern cloud security risks with
real-world examples.





Attendees will learn key techniques that they can deploy right away in their
organization to:
– Mitigate cloud risks across multi-VPC, multi-OS, and multi-account deployment
– Detect unknown malicious code at the build, ship, and run stage
– Inspect and Analyze cloud network packets, API activity, and storage activity





Hear from Dr. Neil Daswani (former CISO of Lifelock and co-author of Big
Breaches and Foundations of Security) and Dr. Saumitra Das (founder and inventor
in AI security) about lessons learned from prior attacks and potential
approaches to strengthen defenses against future attacks.



Learn More



READY TO GET STARTED?
WE’LL SHOW YOU HOW FAST WE ENABLE ACTIONABLE VISIBILITY, REAL-TIME THREAT
DEFENSE, AND CONTINUOUS COMPLIANCE FOR YOUR CLOUD.

Request Demo

 * Products
 * Solutions
 * Resources
 * Company
 * Blog
 * Customers


© 2021 Blue Hexagon. All Rights Reserved.
 * Terms of Service
 * Privacy Policy

 * Facebook
 * LinkedIn
 * Twitter
 * Youtube