Meet us at

Dreamforce 2016

October 4-7, 2016 San Francisco, California

Dreamforce 2016
October 4-7, 2016   |   San Francisco, California

Dreamforce 2016

Event Details
Security Week Hosted by Cisco, Dallas
October 5-6, 2016   |   Dallas,TX

Security Week Hosted by Cisco, Dallas

Event Details
Core BTS IT & Security Conference 2016
October 5, 2016   |   King of Prussia, Pennsylvania

Core BTS IT & Security Conference 2016

Event Details
Session: On-Prem to the Cloud: The Great Threat Migration

Ron Zalkind, CTO and co-founder at CloudLock (now part of Cisco), will explore the migration of on-prem threats to the cloud, presenting key research around connected cloud applications in the corporate setting and walk through a real case study. The audience will come away with crucial defensive measures to take and pitfalls to avoid in a quest to remain secure in this new era.

Speakers
  • Ron Zalkind CloudLock CTO and co-founder (now part of Cisco)
The Security Leadership Forum Hosted by OneLogin, Boston
October 18, 2016   |   Boston, Massachusetts

The Security Leadership Forum Hosted by OneLogin, Boston

Event Details
EDUCAUSE Annual Conference 2016
October 25-28, 2016   |   Anaheim, California

EDUCAUSE Annual Conference 2016

Event Details
ISACA’s CSX Europe 2016
October 31 - November 2, 2016   |   London, United Kingdom

ISACA’s CSX Europe 2016

Event Details
Session: Let’s go Phishing in the Wild OAuth Seas

Join security expert Yishai Beeri, CloudLock’s director of cybersecurity research and CyberLab manager, for a live demonstration on how to build and deliver cloud malware via OAuth. During the interactive session, we’ll cover the methods used to reverse engineer the attack, including detailing how attackers mask their identity and undermine detection methods, explore tactics to pinpoint their location, grasp techniques to determine files accessed, and reveal detection markers. Once familiar with this threat vector, we’ll review some of the common cloud security measures such as gateways, MFA, geolocation, and user behavior analytics, and assess their strengths and weakness in defending against OAuth threats. Finally we construct a solid strategy for each of the Protect, Detect and Respond functions for this type of threat, and touch on possibilities for Identify and Recover as well. Audience participation is strongly encouraged.

Speakers
  • Yishai Beeri Director of Cybersecurity Research, CloudLock
The Security Leadership Forum Hosted by OneLogin, Chicago
November 2, 2016   |   Chicago, Illinois

The Security Leadership Forum Hosted by OneLogin, Chicago

Event Details
The Security Leadership Forum Hosted by OneLogin, Los Angeles
November 17, 2016   |   Los Angeles, California

The Security Leadership Forum Hosted by OneLogin, Los Angeles

Event Details
AWS re:Invent 2016
November 28 - December 2, 2016   |   Las Vegas, Nevada

AWS re:Invent 2016

Event Details

Have A Question?

Contact Us
Browser Not Supported

Your browser version is outdated.

We would recommend you upgrade to a recent version to ensure that you have a good experience on the CloudLock site. Outdated browsers also increase your security risk. So please update your browser and come back later!

Click on the icon below to download the latest version of your browser

Close