Hi [[ session.user.profile.firstName ]]

Raytheon Cyber Services

  • Date
  • Rating
  • Views
  • Exposing Threats You Don't Even Know About
    Exposing Threats You Don't Even Know About
    Ross Mathews, V-SOC Operations Manager & Rebekah Wilke, Director Managed Detection & Response, cyber services, Raytheon Recorded: Nov 16 2017 38 mins
    Raytheon cyber services experts will discuss how our Threat Scope Engagement can help organizations of all sizes and complexity mature their cybersecurity posture and operations.

    This session will cover:

    * How we can provide recommendations to enhance prevention, visibility detection capabilities and incident response

    * How to develop custom content to enable more efficient detection of threats and attacks

    * Creating a roadmap to ensure a deep understanding of your network environment and most critical risks to your organization.
  • Ransomware:  Prevention is the Best Medicine
    Ransomware: Prevention is the Best Medicine
    Mark Bartlett, Manager, Research & Development - Cyber Services, Raytheon Recorded: Sep 26 2017 33 mins
    As the threat landscape continues to evolve, the techniques used by cyber criminals become more sophisticated causing more and more attacks to slip through the cracks. Figuring out how ransomware makes its way into your organization is key to preventing these attacks before they occur.

    Join us for a live webinar where we'll discuss how a combination of services and training can help quickly and easily detect digital threat incidents.

    This session will cover:
    * How to detect, investigate and respond to ransomware
    * How to verify the infection and how it happened in order to minimize future risks
    * Utilizing SOC automation tools to save time, money and resources
    * How to use existing tools to hunt for advanced and out of the ordinary patterns or traffic within your environment
  • Be Ready or Pay the Price: Defending Against the Next Ransomware Attack
    Be Ready or Pay the Price: Defending Against the Next Ransomware Attack
    Mark Orlando, Chief Technology Officer, Raytheon Cyber Recorded: Aug 24 2017 40 mins
    Despite 2017 only being halfway over, there is a long list of significant breaches impacting organizational reputation and bottom line across a variety of industries. The WannaCry and NotPetya outbreaks exploited computer security vulnerabilities and disrupted businesses in more than 150 countries on their way to a worldwide cost estimated at more than $4 billion.

    Join us Thursday, August 24, 2017 at 2:00p EDT for our free webinar to learn more about:

    1. How to prioritize fundamentals of network defense while working towards advanced capabilities
    2. Visibility and why it’s so important in defending your enterprise
    3. How to use threat intelligence and automation as an enabler, not a crutch
  • Key Threats To Look Out for in 2017
    Key Threats To Look Out for in 2017
    Josh Douglas, Chief Strategy Officer, Raytheon Foreground Security; Stuart Taylor, Senior Director, Forcepoint Labs Recorded: Dec 13 2016 60 mins
    To close out 2016, we'll be looking at the year in review; the big breaches and notable disclosed vulnerabilities. We'll then use that information to assess the key threats that'll be on the horizon in 2017 and what you can do to protect your organization.
  • Proactive Security: Building A Successful Threat Hunting Program
    Proactive Security: Building A Successful Threat Hunting Program
    Carl Manion, Managing Principal @ Raytheon Foreground Security Recorded: Nov 10 2016 43 mins
    Understanding the key components necessary to build a successful threat hunting program starts with visibility, the appropriate tools and automation. Skilled, experienced analysts, engineers and incident responders with analytical minds who can apply concepts and approaches to a variety of different toolsets are also instrumental to the process. Join Raytheon Foreground Security as we describe and discuss some of the most common challenges, recommended best practices, and focus areas for achieving an effective threat hunting capability based on lessons learned over the past 15 years.

Embed in website or blog