Hi [[ session.user.profile.firstName ]]

Rapid7

  • Date
  • Rating
  • Views
  • The CISO's Role in Technology Decisions
    The CISO's Role in Technology Decisions
    Scott King, Senior Director of Advisory Services at Rapid7 Recorded: May 23 2019 60 mins
    Every security leader runs into this challenge at multiple points in their career. How can you support your team and their technology needs, while ensuring alignment with the business and not overreaching to make vendor selections? This issue can easily put security leaders at odds with their teams charged with engineering and operating the technology that manages risk and enables the protection of company data and systems.

    Join Rapid7’s Scott King for an interactive webcast where he will share his personal experiences as the security leader for one of America’s largest energy companies and how he navigated these potentially treacherous waters.
  • Have no Fear, Security Automation is Here
    Have no Fear, Security Automation is Here
    Sydney Coffaro, InsightConnect Product Specialist Recorded: May 16 2019 25 mins
    Security automation is a hot topic today, as security teams are looking to effectively leverage technology to make their security operations run more smoothly. With automation all the rage, comments like “we should be automating more” are becoming an ongoing theme. Dedicating time and resources to implement automation is often viewed as a huge level of effort, but adding automation to your most time-intensive security processes doesn’t have to be an intimidating undertaking. Did you know that with a small investment, you can realize tremendous ROI and value from automation, faster than ever before?

    In this demo of InsightConnect, you will learn about:
    1. Overview of automation workflow building blocks
    2. Real use cases teams struggle with today, including phishing, SIEM investigation and response, patching, and more
    3. How you can integrate security automation and orchestration into your existing SecOps programs
    4. How automation will improve efficiency across the processes and tools you’re executing manually today
  • Shoot for the...Cloud? Getting started with security in AWS
    Shoot for the...Cloud? Getting started with security in AWS
    Josh Frantz, Senior Security Consultant Recorded: May 2 2019 52 mins
    Is your organization moving to Amazon Web Services? Or are you a seasoned AWS pro, but need to know where to start to secure it?

    It’s a fact—Cloud environments aren’t going away anytime soon. Cloud adoption is expected to grow at 12.4% annually until 2025. When you need to get started in a new cloud environment, or secure an existing one, vulnerability management is the place to start.

    Join Josh Frantz to learn the fundamentals of setting up vulnerability management in your cloud environment and common pitfalls to watch out for. You may even pick up a few good wise cracks along the way.

    In this webinar we will cover:

    1. The future of the cloud infrastructure landscape
    2. Some common misconceptions. Did you know AWS doesn’t secure your environment for you?
    3. Vulnerability Management best practices
    4. How Rapid7 and InsightVM can help
  • Slaying the Beast! Getting your arms around your vuln management program.
    Slaying the Beast! Getting your arms around your vuln management program.
    Caspian Kilkelly, Senior Advisory Services Consultant Recorded: Apr 16 2019 48 mins
    Security isn't just about boundaries and defenses. Maintenance, especially in the form of patching, mitigation and threat reduction, are often just as important as a solid set of firewall rules for reducing an attacker's ability to compromise your systems or networks.

    For most security departments, this maintenance comes in the form of a vulnerability management program. Typically, these include patching, scanning, testing, mitigation- when they're done properly, they can prevent incidents before they happen. Vulnerability management is the key to a strong security program in any enterprise, but it's also a lot of work.

    In this webcast, we'll talk about why most security teams need vulnerability management, who to work with to get it done, and strategies to reduce the workload.
  • Trends in Advanced Threat Detection & Vulnerability Management
    Trends in Advanced Threat Detection & Vulnerability Management
    Wade Woolwine, Rapid7, Ajay Uggirala, Juniper Networks & O'Shea Bowens, Null Hat Security & Paul Crichard, BT Global Services Recorded: Apr 16 2019 61 mins
    As cyber attacks become increasingly common, it is vital for organisations to be armed with the most effective tools and knowledge to prevent, detect and respond to cyber threats.

    Join this interactive Q&A panel with top security experts across the ecosystem to learn more about:

    - Trends in Advanced Threat Detection & Vulnerability Management
    - How to use analytics to fight against cyber attacks – patching, detection and response
    - What are the common mistakes made when it comes to Advanced Threat Detection implementation
    - Best practices and recommendations for improving your security posture

    Panel moderated by:
    Michele Drolet, CEO, Towerwall

    Panelists:
    Wade Woolwine, Director of Managed Services, Rapid7
    Ajay Uggirala, Sr. Manager, Product Marketing, Juniper Networks
    O'Shea Bowens, CEO & Founder, Null Hat Security
    Paul Crichard, Security CTO, BT Global Services
  • Vulnerability Management - Why Programs Fail and What You Can Do About It
    Vulnerability Management - Why Programs Fail and What You Can Do About It
    Brian Carey, Manager, Security Consulting, Rapid7 Recorded: Apr 2 2019 60 mins
    Vulnerability Management should be at the core of every Information Security program (it’s CIS Control #3) and yet it is often one of the most misunderstood elements. Requiring strong leadership and many foundational elements to be successful, programs often topple because the legs of the table we have built are not sturdy to hold the weight of our scanning tools, and the data these tools produce.

    Join Rapid7’s Brian Carey for a discussion on some of the more common reasons Vulnerability Management programs fail, and more importantly what we can all do to ensure that doesn’t happen.

    Some of the topics we’ll cover include:

    1. The leadership void - setting goals and expectations from the top.
    2. Roles & Responsibilities
    3. Asset Management
    4. Classification & Prioritization
    5. Remediation
    6. Reporting to your Executive Teams & Board
  • All-in on AppSec: The concepts, technologies, and approaches you need to know.
    All-in on AppSec: The concepts, technologies, and approaches you need to know.
    Jay Paz, Director, Penetration Testing & Ben Glass, Manager, Product Consulting Recorded: Mar 28 2019 43 mins
    Web applications have vulnerabilities—period, full stop. Most “AppSec” efforts focus on creating more secure applications, or attempt to deploy network appliances to protect those in production. The rapid growth of DevOps, microservices, and cloud deployments have made it more essential to secure apps before they get to production, and security software vendors seem to be introducing new, shiny solutions every month. But where do you start? What approach should you take?

    Join Rapid7’s application security experts as they take you through:

    1. Navigating the application security technology landscape
    2. Prioritizing your application security efforts
    3. Ensuring security doesn’t hinder productivity
  • Balancing Prevention, Detection & Response: Your Guide to Success
    Balancing Prevention, Detection & Response: Your Guide to Success
    Alan Foster, Senior Solutions Engineer & Justin Buchanan, Senior Solutions Manager Recorded: Mar 21 2019 45 mins
    Security teams today understand the need to invest across threat prevention, detection, and incident response. But with strained teams, siloed technologies, and ever-looming compliance audits, where do you start?

    Join us for a special session with Justin and Alan, who will share prioritization guidance from working with hundreds of security teams, as well as key findings from an all-new Rapid7 Threat Report. We’ll cover:

    1. How teams are bringing automation to their vulnerability management program
    2. How to prioritize prevention across your modern network, from remote workers to cloud environments
    3. Top alerts & attacker trends, based on findings from Rapid7’s 24/7 Managed Detection and Response service
    4. Using the MITRE ATT&CK framework to assess your current detection capabilities
  • Threat Intelligence Driven Incident Response
    Threat Intelligence Driven Incident Response
    Tim Stiller, Senior Incident Response Consultant Recorded: Feb 20 2019 27 mins
    Threat intelligence is a core component of any Incident Response engagement or SOC investigation. While threat intel comes in many forms, shapes, and sizes—when used properly—it adds critical context that enables quick and accurate investigation decisions. If you understand the different types of threat intelligence used across your organization, your team can respond quickly to threats, and prioritize a detection strategy to stop future attackers.

    In this session, Tim will share:
    1. Key types of threat intelligence
    2. How each type should be used effectively
    3. Recycling: translating investigations into detections
  • Leveraging Your SIEM to Implement Security Best Practices
    Leveraging Your SIEM to Implement Security Best Practices
    Rohit Chettiar, Detection & Response Solutions Engineer, Rapid7 Recorded: Feb 19 2019 28 mins
    The biggest challenge that security analytics addresses is the volume and diversity of information that can be analyzed at a given point to assist security professionals in detecting, responding to and mitigating cyber threats. But how do you leverage that data to implement security best practices?

    InsightIDR is a single solution that provides visibility across your traditional on-premise environment, but also extends monitoring to your remote endpoints and cloud services. Join us to learn how InsightIDR provides visibility into your network and highlight useful metrics to implement security best practices.

    In this webcast, we will discuss:

    1. How to make security analytics more consumable
    2. The data sources you need to collect and analyze
    3. How InsightIDR leverages pre-built analytics to detect top attack vectors

Embed in website or blog