Story image

Beyond AV Tour hits Auckland & Wellington

05 Sep 17

If malware seems like it’s behind every cyber attack these days, it may surprise you to learn that less than half of breaches originate from malware. It turns out there’s a far greater threat. Most cyber breaches are caused by non-malware attacks. Those attacks can’t be prevented by technologies like machine-learning AV and traditional AV.

Streaming prevention is able to catch both malware and non-malware attacks by spotting malicious activity as it happens. Carbon Black has built this technology into Cb Defense. 

So it's not traditional AV and it's not machine learning. How does it work? At Carbon Black's Beyond AV Tour, which swings by Auckland on September 12 and Wellington on September 14, the team will run a live attack demo that shows why streaming prevention beats other technologies hands down.

What’s in it for you?

  • Learn - About Next-Generation Antivirus (NGAV) and the latest trends in cybersecurity
  • Build An Attack - See how easy it is for an attacker to put together a sophisticated non-malware attack in your environment
  • Network with peers - Meet peers in your area in our Lunch & Learn setting (approx. 50-75 registrants per event)

In one hour, we’ll cover:

  • The truth about legacy AV and why it’s time to replace it
  • The tactics and techniques attackers use to get around legacy AV
  • The limitations of machine-learning AV
  • Carbon Black’s streaming prevention technology - a validated approach for stopping malware and non-malware attacks

Join Carbon Black experts and your peers to learn how to focus your cyber security efforts on streaming prevention through technologies such as Cb Defense.

Beyond AV Tour: Auckland
When: 12 September 2017, 11.30am.  Lunch is provided
Where: Sky City Convention Centre, 88 Federal Street

Be part of the future of security - Register here for the Auckland event

Beyond AV Tour: Wellington
When: 14 September 2017, 11.30am.  Lunch is provided
Where: Intercontinental, 2 Grey Street.

Be part of the future of security - Register here for the Wellington Event

How to stay safe when shopping online
Online shopping is a great way to avoid the crowds – but there are risks.
Dell EMC embeds security in latest servers
Dell EMC's 14th generation of PowerEdge servers has comprehensive management tools to provide security across hardware and firmware.
Why data backups should be a part of daily operations
"Disaster recovery needs to address complete system failure and provide a set of security policies to govern disaster incidents."
Businesses focusing on threats from within - survey
Over 50% of respondents reported that 100 days of dwell time or more was representative of their organisation.
GCSB welcomes Inspector-General's report on intelligence warrants
Intelligence warrants can include surveillance, private communications interception, searches of physical places and things, and the seizure of communications, information and things.
Corelight and Exabeam partner to improve network monitoring
The combination of lateral movement and siloed usage of point security products leaves many security teams vulnerable to compromise.
SailPoint releases first identity annual report
SailPoint’s research found that many organisations are lacking maturity in their governance processes over identities.
Disruption in the supply chain: Why IT resilience is a collective responsibility
"A truly resilient organisation will invest in building strong relationships while the sun shines so they can draw on goodwill when it rains."