Hi [[ session.user.profile.firstName ]]

IBM Resilient

  • Date
  • Rating
  • Views
  • How a Military Concept can Help Build Your Incident Response Framework
    How a Military Concept can Help Build Your Incident Response Framework Nathaniel Ford, Moderator, (ISC)² EMEA, Craig Roberts, European Technical Engineer, IBM Resilient Recorded: Nov 14 2017 53 mins
    In the current cyber threat landscape, organisations are looking at ways to respond as effectively as possible. This session will look at the role that can be played by OODA loops, a military concept developed to improve fighter pilots' abilities to respond in combat, it stands for Observe, Orient, Decide & Act. Companies can build these concepts into their Incident Response (IR) process to aid clarity of thinking and improve their ability to respond quickly and effectively to cyber attacks.
  • Orchestration in Incident Response: A Game-Changing Strategy
    Orchestration in Incident Response: A Game-Changing Strategy Ted Julian, VP of Product Management, IBM Resilient Recorded: Oct 4 2017 44 mins
    Incident response orchestration and automation are game-changing developments in cyber security – putting people in control and supporting them with the processes and tools they need to fuel dynamic and accelerated response.

    An orchestration strategy allows for security teams to process incidents faster and more accurately. And by automating repetitive and menial tasks and delivering the right information to the right analyst at the right time, orchestration can significantly drive down Mean-Time-To-Response.

    Join your fellow professionals to learn:

    •How orchestration and automation are defined and how the two strategies relate

    •How to effectively leverage automation to support an orchestrated incident response function

    •Best practices for orchestrating your SOC and achieving faster, more efficient, and intelligent incident response
  • The State of Cyber Resilience in the Middle East - new industry research
    The State of Cyber Resilience in the Middle East - new industry research Dr Larry Ponemon, Chairman and Founder, Ponemon Institute, Paul Ayers, GM EMEA, IBM Resilient Recorded: Sep 13 2017 63 mins
    Organisations in the Middle East are dealing with sophisticated cyberattacks every day. As the volume of these attacks continues to grow, and the adversaries’ attacks become more complex, companies need to be able to adapt to defend themselves. Cyber Resilience – an organisation’s ability to maintain normal operations while under attack, is a critical factor.

    Join Dr Larry Ponemon at this webinar on September 13 at 15:00 DST to hear the findings from new research into the state of cyber resilience in the Middle East. Larry and Paul Ayers, GM, EMEA at IBM Resilient will review the findings and discuss:

    •Key steps to help security leaders measure, assess, and grow their organisation’s Cyber Resilience

    •Real-world examples of organisations improving Cyber Resilience by focusing on incident response preparation.
  • Improving Incident Response with Orchestration and Automation
    Improving Incident Response with Orchestration and Automation Bruce Schneier, IBM Resilient CTO Recorded: Jul 21 2017 3 mins
    To effectively respond to today’s complex cyberattacks, security teams need to coordinate their people and technology throughout the entire incident response (IR) process. When IR orchestration is supported by automation, organizations can accelerate their response and make their IR team more intelligent.

    In this video, IBM Resilient CTO Bruce Schneier compares and contrasts orchestration and automation, and outlines how organizations can orchestrate response with an incident response platform.
  • Ted Julian on the Petya Attacks and Dealing with Ransomware
    Ted Julian on the Petya Attacks and Dealing with Ransomware Ted Julian, VP of Product Management, IBM Resilient Recorded: Jul 13 2017 3 mins
    A ransomware attack has impacted businesses across the globe for the second time in as many months. This time, the attack known as Petya spread quickly over the past few days.

    This video explores the Petya attack and how to be prepared for similar attacks in the future. It also highlights how the Resilient Incident Response Platform helps organizations respond quickly to ransomware attacks.
  • Building Breach Notification into your IR process post-GDPR
    Building Breach Notification into your IR process post-GDPR Jamie Cowper, Director, IBM Resilient, Jessica Cholerton, Product Specialist Recorded: Jul 12 2017 62 mins
    The rise in large scale data breaches has been accompanied by a growing number of data privacy reporting regulations across the world. The latest of these, the General Data Protection Regulation (GDPR) will require companies to notify the regulator of a serious incident within 72 hours.

    Companies therefore need to look at their cybersecurity incident response plans and how technology can be leveraged to improve their ability to detect and respond to security incidents faster.

    Join IBM Resilient on July 12 at 2pm to review how organisations can build in data privacy reporting into their incident response strategy whilst using security automation and orchestration tools to enhance their IR processes.

    Attendees will learn:

    •The latest on breach notifications and GDPR; what actions are expected of organisations if data belonging to EU citizens is compromised.

    •How to operationalise GDPR using automation and orchestration to improve IR processes

    • A broader view of global and vertical data breach reporting requirements.

    •What benefits can be achieved through the deployment of an Incident Response Platform (IRP)
  • How to respond to cyber security incidents faster, smarter, better
    How to respond to cyber security incidents faster, smarter, better Chris Neely, Director of Technical Sales, EMEA, IBM Resilient Recorded: Apr 18 2017 57 mins
    How to respond to cyber security incidents faster, smarter, better: an introduction to the Resilient Incident Response Platform

    The Resilient incident response platform (IRP) empowers cyber security teams to orchestrate their incident response processes, and respond to and resolve incidents faster, more effectively, and more intelligently. The Resilient IRP is the leading platform for orchestrating and automating incident response processes.

    This demonstration will showcase the Resilient IRP’s ability to enable complete IR orchestration and automation - aligning security teams' people, process, and technologies into a single hub for incident response.By understanding the capabilities of the solution, attendees can learn how to:

    • Achieve greater intelligence and efficiency by integrating your existing security technologies, including SIEMs, EDR, threat intelligence, and more.

    • Adapt to real-time incident conditions with Resilient Dynamic Playbooks –ensuring a fast and complete response to all incident types.

    • Build, configure, and maintain your own IR action plans within hours or days
  • The Role of Orchestration in Incident Response
    The Role of Orchestration in Incident Response Ted Julian, VP of Product Management, IBM Resilient Recorded: Feb 23 2017 45 mins
    Faced with an avalanche of alerts, insufficient staffing, and a bewildering regulatory environment it's no wonder that most organizations struggle to respond effectively to cyber attacks. Successfully resolving attacks requires fast, intelligent, and decisive action - organizations need to have an orchestrated plan in place before an attack occurs. Indeed, the best organizations leverage an orchestrated response capability to achieve cyber resilience, the ability to weather the inevitable cyber attacks as just another part of doing business.

    Join IBM Resilient’s Ted Julian, VP of Product Management to explore the latest incident response methodology and technology. Can automation really save the day? Or are the naysayers correct that the automation cure is worse than the disease itself? From instant escalation, to automatic enrichment, to guided mitigation, Ted will explore the latest incident response techniques and share what works and what doesn't. Attendees will gain a framework for understanding their incident response capability and a maturity model for evaluating opportunities for orchestration / automation.

Embed in website or blog