Hi [[ session.user.profile.firstName ]]

D3 Security

  • Date
  • Rating
  • Views
  • Go Beyond Incident Response: The Benefits of Full-Lifecycle Incident Management
    Go Beyond Incident Response: The Benefits of Full-Lifecycle Incident Management Rear Admiral Robert Day- USCG. Jim Pflaging- TCG. Fraser Retallack- D3, Chris Crowley- SANS. Recorded: Jan 12 2018 62 mins
    Enterprises face significant financial, reputational, intellectual property, and legal risks from data breaches, with all types of enterprises falling victim – from government agencies like Office of Personnel Management (OPM) and the Internal Revenue Service (IRS), to high-tech companies like LinkedIn and Snapchat, to Fortune 50 companies like J.P. Morgan, Sony, and Oracle.

    Though the U.S. National Institute of Standards and Technology (NIST) has released best practices for incident response, most enterprises struggle to implement incident response strategies because of a lack of a centralized approach that covers the full incident lifecycle, including workflows and playbooks, root cause analysis, and corrective action. Additionally, high volumes of alerts and incidents, the cyber security labor shortage, and the high costs of response services have made responding to breaches even more difficult and detrimental to the bottom line.

    Coinciding with the convergence of IT and security teams within cyber security and risk management operations, many organizations have recognized the need for a comprehensive incident management platform, one that security and IT managers can use to identify the source of incidents and breaches and leverage lessons learned to prevent them down the road.

    In this webinar, a panel of cyber security experts from The Chertoff Group, The SANS Institute, and D3 Security discuss:

    - Threats, costs, and risks associated with today’s cyber security landscape

    - Convergence of IT and security operations

    - Current incident response strategies and landscape

    - Rise of traditional incident response platforms

    - Capabilities of a comprehensive incident management platform.
  • Next-Generation Threat Management
    Next-Generation Threat Management Jason Cook- Managing Director, The Chertoff Group. Rear Admiral Robert Day Recorded: Jan 11 2018 62 mins
    Technological shifts, personnel shortages, evolving threats, and other industry trends are changing the way that organizations must think about cybersecurity. The current landscape necessitates convergence between traditionally siloed areas of the business, by bringing together security, risk, and compliance. We call this new approach Next-Generation Threat Management, and in this webinar, a panel of experts from The Chertoff Group and D3 Security break down the steps you can take to implement it in your organization.

    Watch the Webinar to Get Insights from the Former CISO of British Telecom, the Former Commander of the United States Coast Guard Cyber Command, and the Director of D3’s Cybersecurity Practice regarding:

    - The benefits of next-generation threat management and converged IT and security operations.

    - How threat management tools can drive operational maturity within organizations.

    - How D3 helped a global bank establish a unified system across business functions in order to streamline security, risk, and compliance operations.

    - The next steps organizations can take to get started on next-generation threat management.
  • The CyberWire Podcast- Cybersecurity Vulnerabilities in Public Transport
    The CyberWire Podcast- Cybersecurity Vulnerabilities in Public Transport Stan Engelbrecht Recorded: Dec 20 2017 19 mins
    In today's podcast, we talk about what the Five Eyes see. Implications of North Korean responsibility for WannaCry. Defense and deterrence go with naming and shaming. The Lazarus Group looks to cryptocurrency theft to redress North Korean financial shortfalls. Copperfield cyber espionage campaign in the Middle East. GDPR approaches, and organizations look to get their data houses in order (and buy insurance). Justin Harvey from Accenture on choosing threat intelligence. Guest is Stan Engelbrecht from D3 Security on the vulnerabilities in public transportation. And what to do if your child gets a phone from Santa.

Embed in website or blog