Hi [[ session.user.profile.firstName ]]

Delta Risk LLC | Cybersecurity Services

  • Date
  • Rating
  • Views
  • Hacker Secrets Revealed: 5 Security Mistakes to Avoid
    Hacker Secrets Revealed: 5 Security Mistakes to Avoid Paul Brandau & Mike Warren, Delta Risk Recorded: Apr 27 2017 44 mins
    External penetration testing, also known as ethical hacking, is an independent engagement that can help pinpoint common attack vectors and patterns hackers look for in your network. Delta Risk research has identified the attack vectors bad actors most commonly use to get initial access to a network and spread across the rest of the organization. In this 45-minute webinar, our pen testers offer recommendations on how to combat various scenarios and outline the key mistakes defenders must avoid when protecting their security operations.

    WHAT YOU’LL LEARN:
    • Lessons learned from our 2016 external assessments
    • Common weaknesses our testers exploited such as kerberoasting and password reuse
    • Methods our testers use to quickly locate high value assets
    • Vendor-neutral solutions for protecting sensitive information
    • Why third-party penetration testing is in demand

    About the Presenters:
    Paul Brandau is the Managing Consultant with Delta Risk LLC. He has more than 10 years of experience in the cyber security domain providing a unique perspective on cyber exercises, operational (red team) assessments, and training in offensive network operations. He has helped design and lead a Red Team for the United States Department of Homeland Security. Prior to Delta Risk, his duties included reverse engineering malware and threat profile creation.

    Mike Warren is VP of Cyber Resiliency Services for Delta Risk LLC. He has more than 14 years of experience in the cyber security domain providing a threat perspective, operational (red team) assessments, enterprise vulnerability assessments (blue team), and training in defensive and offensive network operations. Prior to Delta Risk, he was an active duty Air Force Communications and Information Engineer Officer.
  • Case Study: 6 Lessons Learned Hunting Advanced Cyber Criminals     
    Case Study: 6 Lessons Learned Hunting Advanced Cyber Criminals      Chris Hendricks, VP of Security Operations Services Recorded: Mar 16 2017 56 mins
    What is it like to find out you’re on the trail of an advanced cyber criminal? What are the tools and skills you need to track them? What is the mindset you need to approach the hunt? And what indicators and intelligence can you use to see who the attacker is? In this webinar, our experts will discuss all of these questions and more, based on an actual case study.
  • How to Invest Your 2017 Cyber Security Training Budget for Maximum ROI
    How to Invest Your 2017 Cyber Security Training Budget for Maximum ROI Matt Kuznia & Jim Mitchell Recorded: Mar 2 2017 58 mins
    When it comes to securing an organization’s network, most stakeholders understand that cyber security education and training are not a luxury – they're a necessity. In this webinar we will discuss how best to spend those precious training dollars to get a solid return on investment.
  • Top 10 Cyber Incident Pain Points: Are You Prepared?
    Top 10 Cyber Incident Pain Points: Are You Prepared? Chris Evans & Ryan Clancy Recorded: Jan 26 2017 50 mins
    In a world where compromise is always a risk, one of the best ways to protect your organization is by ensuring that your response capabilities are effective, and one of the most valuable steps in strengthening a response capability is learning from others’ experiences. This webinar will discuss many issues that security professionals deal with when responding to incidents, and how they can address them.
  • What You Need to Know about Ransomware and HIPAA Compliance
    What You Need to Know about Ransomware and HIPAA Compliance Chris Hendricks, Delta Risk & Garrett Gross, AlienVault Recorded: Oct 27 2016 49 mins
    The healthcare industry is one of the top targets for ransomware attacks, and the US Dept. of Health and Human Services Office for Civil Rights (OCR) has now stated that ransomware incidents should be treated the same way as other data breaches under the Health Insurance Portability and Accountability Act (HIPAA) unless there is substantial evidence to the contrary.

    In this webinar, we'll discuss:
    -Why the OCR guidelines are important
    -Why attackers are going after healthcare firms
    -How to detect a ransomware attack
    -Steps you can take to protect your organization
  • Ignorance Isn’t Bliss: Why Hunting Attackers Is Critical to Network Security
    Ignorance Isn’t Bliss: Why Hunting Attackers Is Critical to Network Security Chris Hendricks, VP of Security Operations Services Recorded: Aug 11 2016 42 mins
    Are you confident attackers aren’t on your network right now? Preventing a determined attacker is nearly impossible. According to recent studies, the average attacker hides for an estimated 250 days before being discovered, often by a third party. In this webinar, Delta Risk experts will discuss how threat hunting enables you to find attackers your security team missed so you can stay in control and minimize damage. We’ll focus on the mindset, people, and capabilities you need to detect undiscovered attackers that could be costing you money and putting your business at risk. Don’t be caught off-guard – get out and hunt.
  • Can Your Security Team Handle a Breach? How to Use Cyber Exercises to Find Out
    Can Your Security Team Handle a Breach? How to Use Cyber Exercises to Find Out Stephanie Ewing-Ottmers Recorded: Jul 14 2016 57 mins
    How prepared is your organization to react to and handle cyber incidents? Whether you’re developing your first cybersecurity exercise program or have a mature program in place, it’s important to know if your organization is evolving or just checking the box. In this webinar, we’ll discuss why cyber exercises give you the most realistic training and gap analysis to improve incident response results and your overall security program. We’ll also show how you to turn cyber exercises into a comprehensive, ongoing workforce development plan.

Embed in website or blog