bluehexagon.ai
Open in
urlscan Pro
2620:12a:8000::2
Public Scan
Submitted URL: https://go.bluehexagon.ai/MDM2LVdOVC0yMTgAAAF-_bICKaH25Tlck8Ak9gvmyzMMktxVXpDIvQjkHOUdM5sBQFOmysADSVpdBPIY_hsvOiHJHRM=
Effective URL: https://bluehexagon.ai/company/events/?mkt_tok=MDM2LVdOVC0yMTgAAAF-_bICKVmbZ2nN46aDrXhfPSdyfsybosa8lCYD-aGEIqZjwuC82f_Y...
Submission: On August 19 via api from US
Effective URL: https://bluehexagon.ai/company/events/?mkt_tok=MDM2LVdOVC0yMTgAAAF-_bICKVmbZ2nN46aDrXhfPSdyfsybosa8lCYD-aGEIqZjwuC82f_Y...
Submission: On August 19 via api from US
Form analysis
0 forms found in the DOMText Content
* Products * Blue Hexagon for AWS * Blue Hexagon for GCP * Blue Hexagon for Azure * Blue Hexagon for Network * Solutions * Resources * Company * Overview * News * Events * Partners * Careers * Contact * Blog * Customers Free Trial Cloud Security Events COME MEET US * All * Events * Webinar Webinar WHY IS RANSOMWARE SO TOUGH TO AVOID? (CLICK HERE TO REGISTER NOW!) August 17, 2021 AUGUST 17th ( 10 AM PDT ) Join John Petersen, Chief Information Officer, Heffernan Insurance Brokers Trends and Saumitra Das, CTO and Cofounder of Blue Hexagon to learn about Ransomware, the single largest malware impacting a new organization every 14 seconds, and what security leaders can do to avoid falling victim to this cybercrime. Ransomware has now evolved from “encrypting the data on the machine until the ransom is paid” to more nefarious tasks, including disruption-ware, exfiltrating sensitive corporate data, all in attempts to disrupt business and force payment. And, with remote work on the rise, exploitation of remote access and user devices increases corporate exposure to ransomware even more. What you’ll learn from this webinar: ● Key concepts of ransomware ● Trends observed in hundreds of ransomware attacks as well as new trends on the intent of ransomware actors ● Critical priorities for creating a cyber-resilient organization ● What should be your Ransomware toolkit ● New AI technologies and tools to cut through the rapidly changing threat landscape Learn More Webinar DEFENDING YOUR CLOUD WITH MITRE D3FEND (CLICK TO VIEW RECORDING) August 12, 2021 AUGUST 12th ( 11 AM PDT ) Presented by: Dr. Neil Daswani, Co-Director of the Stanford Advanced Cybersecurity Program and Dr. Saumitra Das, CTO Founder, Blue Hexagon Modern cloud threats with complex, multi-stage kill chains cannot be mitigated simply by compliance and configuration checks. The MITRE ATT&CK framework for Cloud provides a structure for security teams to reason about attacker tactics in their cloud. The newly announced MITRE D3FEND framework provides a standard vocabulary for countermeasures against attackers. In this live session, we will provide an overview of D3FEND and how it maps to cloud security. We discuss the countermeasures security teams should consider that are specific to cloud attack tactics. We also discuss how ATT&CK maps to the technical root causes of breach that have impacted over 9,000 reported breaches to date. Security experts and cloud DevOps/DevSecOps attendees will learn about: ● MITRE ATT&CK and differences between Cloud and On-premises ● How MITRE ATT&CK maps to the technical root causes of breaches ● MITRE D3FEND and how to apply and extend it for your cloud ● How to prioritize and deploy countermeasures based on D3FEND Learn More Webinar TALES FROM THE FRONTLINES OF NATION-STATE ATTACKS (CLICK TO VIEW RECORDING) August 10, 2021 AUGUST 10th ( 10:15 AM PDT ) Speaker: Dr. Saumitra Das, CTO and Cofounder of Blue Hexagon In just Q1 of 2021, there were already more than 20 documented high-impact state-sponsored attacks. These state-sponsored attackers have great operational security, are willing to lie low patiently, and persist to find the victim’s crown jewels versus smashing and grabbing, and they are increasingly utilizing the software supply chain and even the security supply chain and even the security supply chain to gain initial access. This webcast covers key tactics being used by state-sponsored attackers in targeted intrusions with real battlefield examples including software supply chain infection, security supply chain exploits, evasive C2 and beaconing, AI and automation for malicious targeting and code generation, and lateral spread between on-premises to cloud to mobile. Understanding these tactics provides a framework for reasoning about the most effective countermeasures. To deal with a sophisticated adversary, a multipronged approach is needed for defense that includes: ● Focusing on detection and response of the unknown versus rules-based prevention ● Supercharging security staff with tools that have an opinion versus just visualizing a ton of log data ● Reducing attack surface proactively Learn More events CLOUDSECNEXT SUMMIT ( JUN 3-4, LOGIN TO VIEW ON DEMAND ) June 4, 2021 JUNE 4th ( 12:35 – 1:10 PM EDT ) – Shift-Left is Not Sufficient: Why Agentless Runtime AI Security is Necessary for the Cloud Arun Raman, VP of Cloud Products, Blue Hexagon There has been a huge hype about tools for dealing with cloud misconfigurations and cloud security posture. However, modern attacks on the cloud cannot be thwarted anymore by just shifting left. Attackers have moved to complex, multi-stage attacks that use supply chain infection, evasive beaconing, zero-day Linux malware, and ransoming cloud storage. These attacks only manifest at runtime, and defending against them requires multi-vector inspection of workload, network, storage, and control plane activity at runtime and in real-time. As importantly, the security architecture must provide full cloud coverage and must not introduce supply chain risk. In this session, we will explore customer case studies on how an agentless runtime AI security approach helped defend against real-life modern cloud attacks. We also demonstrate how such a solution can be deployed within minutes and easily maintained in complex multi-region, multi-VPC, multi-OS, multi-account, and multi-cloud architectures. Learn More Webinar WEBCAST: HOW TO MANAGE THE TOP 10 CLOUD SECURITY RISKS ( VIEW ON-DEMAND ) May 26, 2021 In this session, we will go beyond the now pervasive and obvious example of open cloud storage buckets to discuss the top 10 modern cloud security risks with real-world examples. Attendees will learn key techniques that they can deploy right away in their organization to: – Mitigate cloud risks across multi-VPC, multi-OS, and multi-account deployment – Detect unknown malicious code at the build, ship, and run stage – Inspect and Analyze cloud network packets, API activity, and storage activity Hear from Dr. Neil Daswani (former CISO of Lifelock and co-author of Big Breaches and Foundations of Security) and Dr. Saumitra Das (founder and inventor in AI security) about lessons learned from prior attacks and potential approaches to strengthen defenses against future attacks. Learn More READY TO GET STARTED? WE’LL SHOW YOU HOW FAST WE ENABLE ACTIONABLE VISIBILITY, REAL-TIME THREAT DEFENSE, AND CONTINUOUS COMPLIANCE FOR YOUR CLOUD. Request Demo * Products * Solutions * Resources * Company * Blog * Customers © 2021 Blue Hexagon. All Rights Reserved. * Terms of Service * Privacy Policy * Facebook * LinkedIn * Twitter * Youtube