Hi [[ session.user.profile.firstName ]]

SecureWorks - SecureTalk

  • Date
  • Rating
  • Views
  • Lessons from the Field: How Are Skilled Technical Testers Infiltrating? Lessons from the Field: How Are Skilled Technical Testers Infiltrating? Nate Drier (Sr. Security Analysis Consultant), Trenton Ivey (Security Analysis Consultant) Recorded: Jan 30 2017 44 mins
    While many organizations have technical testing performed a couple of times a year for a number of reasons: such as identifying network vulnerabilities or satisfying industry compliance requirements, the results and lessons learned are typically limited.

    However, wouldn’t it be nice to see what tactics and techniques some of the most skilled testers out there are utilizing across all industries in all different levels of scope? Think of it as opportunity to learn from the good guys simulating the bad guys without having to have it done to your organization.

    Watch this webcast and hear from some of SecureWorks most skilled technical testers, Nate Drier and Trenton Ivey, talk about lessons learned from some of their most challenging engagements and the trends they are seeing with clients and their defense practices.

    Key topics covered include:

    - Examples of real-world engagements
    - Tactics and techniques commonly used to achieve their objectives
    - Trends and weaknesses they are seeing in defenses
    - Lessons learned
  • Defending Against Ransomware Attacks in Healthcare Organizations Defending Against Ransomware Attacks in Healthcare Organizations Clifford Kittle - Principal, SecureWorks Healthcare Information Security Recorded: Jan 19 2017 60 mins
    There has been a proliferation of ransomware attacks against healthcare organizations that has ushered in a new wave of extortionware and a new generation of malware attacks. While these types of attacks are not new, they have become more insidious, sophisticated and are growing in popularity.

    In order to defend against such attacks, healthcare organizations need to develop an enterprise information security strategy that not only provides visibility into networks and endpoints but also outlines comprehensive response plans in the event of an attack.

    Attend this webinar to learn the truth behind ransomware attacks and also how to better prepare your organization to think beyond HIPAA compliance and think holistically about its information security program. SecureWorks Healthcare Information Security Principal, Cliff Kittle, will answer vital questions about the nature of ransomware and provide actionable recommendations to meet the challenges of today's threat environment. You will learn valuable insights about how your organization can best adopt the right strategies, tools and skills needed for a stronger information security position.

    In this webinar, you will learn:
    - What is the motivation behind the proliferation of Ransomware attacks? What are the projections for 2017?
    - How does my organization prepare to detect and block ransomware?
    - What information security strategies do healthcare organizations need to be protected?
    - How does my organization respond if attacked by ransomware?
    - How do I ensure that I don't become a victim (again)?
  • 7 Key Cloud Security Trends Shaping 2017 and Beyond 7 Key Cloud Security Trends Shaping 2017 and Beyond Ashley Ferguson - Director, SecureWorks Governance, Risk & Compliance Recorded: Dec 15 2016 48 mins
    Tips for executives and technology leaders

    Cloud computing is enabling business transformation as organizations accelerate time to market and business agility.

    Evolving cloud technologies and approaches, however, can create security gaps and human errors. Data protection rests with you and your organization and not the cloud provider.

    Attend this webinar and you will:

    - Discover key cloud security trends and insights for 2017 and beyond
    - Understand the state of public cloud security today
    - Find out how you can exceed Board expectations around the cloud
    - Learn why no cloud organization is too small or too remote to be targeted
    - Get steps you can take to ensure that your security meets evolving business demands
  • Cloud agility and security: Misperceptions dispelled Cloud agility and security: Misperceptions dispelled Ross Kinder, Senior Security Researcher, SecureWorks Recorded: Oct 18 2016 61 mins
    Real world strategies for migrating to the cloud securely

    When companies move their IT assets to the cloud, they have an opportunity to realize cost savings, accelerate innovation and improve IT performance. Unfortunately, the utility of the cloud is constrained by perceptions and misperceptions about security and control. And even without appropriate controls in place, organizations are moving to the cloud at a very fast pace.

    For those of us responsible for security, this is a terrifying proposition--our most precious assets are seemingly moving outside of our control. However, perhaps, the cloud is more secure than you realize. Perhaps the cloud is a chance for a restart for how your organization looks at security of its data and applications. In this webcast, we’ll dispel some of the misperceptions that exist and jump right into both “lift and shift” and cloud native strategies for migrating to the cloud securely. Knowledge is power and this is an opportunity to advance your team’s understanding of the cloud and how to accelerate the transition.

    You will learn how to:
    - Develop an organization-wide cloud strategy
    - Assess your risk as you adopt cloud solutions
    - Identify common practices and frameworks for cloud migrations
    - Determine which cloud migration architecture meets your business objectives
  • 2016 Underground Hacker Marketplace 2016 Underground Hacker Marketplace James Bettke, Counter Threat Unit researcher, Sean O'Connor & Shawn Cozzolino, Senior Intelligence Analysts - CISO Team Recorded: Oct 12 2016 58 mins
    It’s a Good Time to Be a Bad Guy

    Imagine a marketplace where illegal vendors offer hackers a wide range of goods, tools, and training to enable them to exploit or breach unsuspecting individuals, groups or organizations. Now imagine the walls of this marketplace lined with advertisements offering services and information. The point is, the underground marketplace is booming and only getting bigger, more sophisticated, and competitive.

    Register to take a journey with James Bettke, SecureWorks Counter Threat Unit (CTU) researcher, Sean O’Connor and Shawn Cozzolino from the SecureWorks CISO Intel team as they walk you through their time spent in the Underground, tracking hackers in numerous forums and marketplaces all over the world.

    When you attend this interactive webinar, you will walk away with:
    - Notable trends occurring year over year in the underground hacker market
    - Real examples of goods and services for sale to enable cyber-crime
    - Tips on how to protect data and additional security advice
  • Seeing the Unseen – Detecting the Advanced Persistent Threat Seeing the Unseen – Detecting the Advanced Persistent Threat Justin Turner, Director of the Targeted Threat Hunting & Response Team, SecureWorks Recorded: Sep 14 2016 63 mins
    Learn how Threat Hunting delivers high certainty in detecting compromise

    Many organizations have information security protections in place that still fail to answer with high a level of certainty, "Have we already been compromised?" A cyber threat such as malware or even a large scale Advanced Persistent Threat could be hiding in areas of your network and go unnoticed by the untrained eye.

    That’s where Threat Hunting comes in.

    During this interactive webinar, Justin Turner, Director of the Targeted Threat Hunting & Response Team, will share what Hunting is, what it should tell you, and cut through industry noise. He will share experiences and insights from actual hunting engagements and will also provide recommendations for security leaders and practitioners on how to identify indicators of attacker presence leveraging threat intelligence for context to determine how to engage and resist the adversary.

    In addition, you will:
    - Learn what Targeted Threat Hunting must do for you
    - Hear real-world examples of previous incidents and how targeted threat hunting was used to remove entrenched adversaries
    - Get recommendations on strategies and tactics to aid you in your hunting
  • Security in the Boardroom Series: Keeping Your Seat at the Table Security in the Boardroom Series: Keeping Your Seat at the Table Ashley Ferguson, Director, SecureWorks Governance, Risk & Compliance Recorded: Aug 24 2016 49 mins
    This webinar will explore another aspect of the CISO’s role as an essential business leader: guiding the organization through the crisis of a breach.

    Featuring insights from CISOs and C-suite leaders who have been there and done that, the program will address incident response planning, setting C-suite and board expectations, and tips for providing the right information in a breach crisis situation to aid decision-making and public disclosures. Learn how to establish your role as part of the solution team, and how to avoid a reactionary response that too often leads to finger-pointing at the security team. You’ll take away actionable insights to apply to your own journey as an essential business leader.
  • Security in the Boardroom Series: Earning and Using Your Seat at the Table Security in the Boardroom Series: Earning and Using Your Seat at the Table Ashley Ferguson, Director, SecureWorks Governance, Risk & Compliance Recorded: Jul 21 2016 60 mins
    This webinar will provide tips for successfully navigating the expanding role of the Chief Information Security Officer as an essential business leader. Explore leading practices for managing cybersecurity risk as a people, process and IT leader. Get tips for building a working relationship with other executive stakeholders in audit, compliance and enterprise risk. And hear how other CISOs are establishing more productive reporting relationships with the board of directors. Whether you’d like to expand your role as a risk and security professional, gain more executive support for key initiatives, or improve your relationship with the board, you’ll take away actionable insights to apply to your own journey as an essential business leader.
  • Risk Based Security in a Hyper-Connected World Risk Based Security in a Hyper-Connected World Hadi Hosn, Head of Security Strategy & GRC Consulting, SecureWorks Recorded: Jul 13 2016 49 mins
    For many organizations, investments in new processes and technologies is on top of the priorities list. From behavioral analytics, big data solutions, and “one touch” processes that require no manual intervention, companies are always on the lookout for technology innovations that can achieve a considerable return on investment. When companies consider Cyber Security in such a technology dependent world, most ask, “How can we secure our business and comply with the changing legal and regulatory standards?” instead of “How do we make business focused, intelligent investments given the cyber security risks we face?”

    In this webcast, Hadi Hosn, Head of Security Strategy & GRC Consulting at Dell SecureWorks, will discuss the risk based Cyber Security operating model to help companies identify and protect their most critical information assets and business processes. Hadi will focus on the most critical actions for any organization building a risk based security program.

    Key topics covered include:

    - Prioritizing information assets based on value to the organization
    - Identifying and prioritizing risks to the assets
    - Reduce risks with quick wins
    - Build and deliver a security plan that aligns business and technology
    - Ensure continuous business engagement on the topic of cyber security
  • The Dangerous Misperception of Ransomware The Dangerous Misperception of Ransomware Harlan Carvey, Security Analysis Senior Consultant, SecureWorks Counter Threat Unit Research Team Recorded: May 5 2016 61 mins
    The proliferation of Ransomware has ushered in a new wave of extortionware and a new generation of malware attacks. While these types of attacks are not new, they have become more insidious and sophisticated, growing in popularity in concert with the expansion of electronic payment systems such as bitcoin. In April, the US and Canada both issued formal warnings and suggestions, but how much that is reported about this new malware is true? Are we being naïve in our efforts to block these Ransomware attacks?

    Attend this webcast to learn not only the truth behind Ransomware attacks, but also how to protect your organization utilizing a holistic and unifying visibility into your network and endpoints. Secureworks Security Analysis Senior Consultant, Harlan Carvey will answer vital questions about the nature of Ransomware and provide more insight into the actors, their methods, and their motivations:

    - What is Ransomware?
    - How does it proliferate?
    - How do I detect and block it?
    - How do I know what systems are compromised or how the attacker got in?
    - Do I pay the ransom if I am attacked?
    - How do I ensure that I don’t become a victim (again)?

Embed in website or blog