Hi [[ session.user.profile.firstName ]]

GuidePoint Security

  • Date
  • Rating
  • Views
  • Threat Hunting Lessons: Adversary Tools, Tactics & Procedures
    Threat Hunting Lessons: Adversary Tools, Tactics & Procedures
    David Low, GuidePoint Director of Technology Solutions; and Michael Godin, RSA Senior Systems Engineer Recorded: Dec 14 2016 49 mins
    Today’s attackers use advanced techniques and tools to compromise systems and hide among normal activity. Did you know that most successful attacks have gone undiscovered by a logs-only approach? This can lead to theft of sensitive information, disruption of business operations, or destruction of assets and damage to your business’ reputation.

    We will examine tools and tactics today’s attackers use and demonstrations of attack scenarios including:
    • Webshells
    • Spear phishing
    • Dynamic DNS
    • Data exfiltration

    Attendees will learn about:
    • Real-world examples of how attackers enter and move through an environment
    • Strategies Virtual Security Operations Center (vSOC) analysts and incident responders use to actively hunt for attacks
    • Tools to quickly identify threats in your SOC
  • Conquering Challenges of Incident Response: Real-Time Hunting and Response
    Conquering Challenges of Incident Response: Real-Time Hunting and Response
    Stephen Jones, Director of Managed Services, GuidePoint Security; Justin Scarpaci, Technical Solutions Lead, Carbon Black Recorded: Nov 17 2016 37 mins
    Are you an information security professional struggling with labor-intensive and slow-moving incident response processes? According to a recent Enterprise Strategy Group survey, more than 60 percent of information technology professionals say their organization has taken steps to automate incident response, but 91 percent say the processes are not very effective or efficient. The problem? Information security teams are limited by time and have too many manual processes.

    Join GuidePoint Security and Carbon Black for “Conquering Challenges of Incident Response: Real-Time Incident Hunting and Response,” a free, interactive webinar at 2:30 p.m. Thursday, Nov. 17. Together, we will explore:
    Cost-efficient and time-saving solutions to help your team monitor your environment
    Tools to help you hunt for and find potential attacks, quarantine them, and react before real damage is done

    Learn from real-world analysts and incident responders who know firsthand just how challenging incident response can be. We’ll show you how to leverage today’s threat-hunting tools to:
    - Hunt for incidents in real time
    - Visualize a complete attack kill chain
    - Efficiently defend your environment
    - Monitor endpoints around-the-clock for attacks based on Patterns of Compromise (POCs)
    - Secure devices on or off network
    - Review continuously recorded histories of endpoint activity
    - Quickly conduct comprehensive investigations and identify threat activity
    - Minimize data loss and potential impact on your organization
    - Deploy rapid response and remediation services

    Who Should Attend:
    - Information security professionals struggling with effective incident response because of limited time and resources
    - Current MSSP customers not satisfied with their current provider(s)
    - Information security professionals wanting to improve the effectiveness of their logging and monitoring and/or vulnerability management programs
  • Active Hunting Revealed: How vSOC Identifies Threats in Your Environment
    Active Hunting Revealed: How vSOC Identifies Threats in Your Environment
    Stephen Jones, Dir. of Managed Services, GuidePoint Security & Kris Merritt, Sr. Director, Hunting Operations, CrowdStrike Recorded: Aug 24 2016 43 mins
    The GuidePoint Virtual Security Operations Center (vSOC) was designed to address many of the common complaints and issues customers experience with other managed service providers. We use the cloud to provide dynamic scalability and cost savings. vSOC analysts provide validated security incidents that allow you to focus on what’s really important: remediation.

    vSOC Detect now integrates with CrowdStrike Falcon by leveraging the Falcon Connect API to ingest Falcon host data in to the vSOC Detect monitoring platform. This integration enables vSOC Detect to leverage the CrowdStrike platform for endpoint monitoring and allows analysts to correlate endpoint data against SIEM security logs. This added correlation within our SIEM enables active hunting by vSOC Detect analysts to discover new and emerging threats in customer environments.

    Join us to explore “Hunting with CrowdStrike”— and how our Integrations make CrowdStrike Falcon Versatile and Effective.

    Topics will include:
    - Using the CrowdStrike Integration vSOC Detect
    - Learning how analysts can:
    - Perform ad-hoc searches and queries
    - Quickly Conduct comprehensive investigations
    - Identify insider threat activity
    - Create dashboards and reports
  • Enterprise Security Monitoring: Leaping From Legacy to Leadership
    Enterprise Security Monitoring: Leaping From Legacy to Leadership
    Stephen Jones, Director of Managed Services, GuidePoint Security & Mike Paquette, Vice President of Products, Prelert Recorded: Dec 8 2015 52 mins
    Advanced cyberattacks are occurring at an astounding rate, with more industries and government entities becoming victims of massive data thefts, damaged brands, public trust issues, as well as billions in lost revenues. One of the primary problems is non-existent or inadequate enterprise security monitoring. Contributing issues that exacerbate this problem are inadequate staffing levels for information security practitioners, insufficient experience and/or training of existing staff, and archaic methodologies and practices. There are attainable, affordable options for commercial and government entities to significantly reduce their risks while simultaneously enhancing their security posture through proactive security monitoring and other enterprise information security practices. Join Prelert and GuidePoint Security to learn about:

    •Why enterprise security monitoring is essential
    --You don’t know what you don’t know
    •Emerging security monitoring methodologies and practices
    --Automated analysis of log data
    --Machine learning-based anomaly detection
    --Behavioral Analytics and linked data insights
    •How partnering with a Managed Security Service Provider (MSSP) can help you achieve your enterprise security mission
    --Third party assessment of your enterprise security posture
    --Virtual Security Operations Center (vSOC) monitoring and alerting for network security incidents
    --Additional ad-hoc security technologies and services as needed
  • PCI DSS v3.0 and the Evolution of the Self-Assessment Questionnaire
    PCI DSS v3.0 and the Evolution of the Self-Assessment Questionnaire
    Steve Rosenkranz, Senior Security Consultant, GuidePoint; Aarij Khan, Director of Product Marketing, Tenable Network Security Recorded: Feb 5 2015 61 mins
    When the PCI SSC published version 3.0 of the PCI DSS, they revised their complement of Self-Assessment Questionnaires (SAQs) to align with the new standard. Part of the release included three new SAQs that reflect their maturing perspective on the threat landscape and the appropriate measures needed to safeguard customers’ cardholder data.

    Join Tenable and GuidePoint Security to learn

     Each of the nine different SAQs
     New and updated SAQs due to v3.0
     Approved Scanning Vendor (ASV) external scanning requirements
     How the SAQ differs from a Report on Compliance
     The SAQ selection process; appropriate testing expectations; and how GuidePoint can help
     How Tenable can help achieve PCI Compliance
    o Meeting requirements 2.2.2, 2.2.4, 6.2, 11.2.1,11.2.2, 11.2.3, and
    significant parts of 10
    o Focusing on continuously monitoring for ongoing or business as usual compliance
  • Detecting and Responding More Quickly to Advanced Cyber Attacks
    Detecting and Responding More Quickly to Advanced Cyber Attacks
    Tony Turner, Managing Security Consultant, GuidePoint Security; Jamil (Jamie) Mneimneh, Sales Engineer at LogRhythm Recorded: Sep 24 2014 48 mins
    Most organizations realize it’s no longer a matter of ‘If’ their organization will be breached but ‘When’ (if it hasn’t already happened and they just don’t know it). The key question is ‘How can you gain better visibility, sooner to the signs that your organization is under attack and respond quickly?’ In this webinar we will examine critical dynamics in the cyber threat landscape. We’ll also discuss how integrating security intelligence with a new and more efficient organizational approach to responding to cyber-attacks can enable organizations to detect and respond to these threats faster and with greater precision than ever before.
  • 10 Questions CISOs Should Ask About Mobile Security
    10 Questions CISOs Should Ask About Mobile Security
    Matt Ahrens, Vice President of Technology Integration of GuidePoint Security; Adam Ely, COO of Bluebox Recorded: Jun 24 2014 59 mins
    Come join the interactive conversation about factors CISOs should be considering when implementing a mobile security solution. The mobile landscape is changing rapidly, creating new challenges and opportunities for CISOs tasked with balancing business enablement and risk. The popularity of BYOD and employee use of mobile apps (whether sanctioned and not) has catapulted mobile security to the top of the priority list. The explosion of data outside the four walls of the company raises questions CISOs should be asking to understand how to craft their mobile security strategy and the importance of a data centric approach to protecting sensitive information from unauthorized access or abuse.
    Learn about:
    •Considerations for BYOD
    •Different mobile security approaches
    •The policies and standards that should be in place
    •The Apple vs. Android discussion
  • Security Visibility in the Cloud - Logging and Monitoring in AWS
    Security Visibility in the Cloud - Logging and Monitoring in AWS
    Joey Peloquin, Dir. of Professional Services, GuidePoint Security; Nick Piagentini, Sr. Solutions Architect, CloudPassage Recorded: May 1 2014 63 mins
    Come join the conversation on the pros and cons of commercial and open source options available in AWS, best practices for managing logs and monitoring incidents in the Cloud, and guidance on what to log from two security leaders in the field.

    Learn about:

    · Making security visibility easier based on best practices
    · Yes, host-based firewall policies can improve security
    · See how a reference implementation can be done without tears

Embed in website or blog