Hi [[ session.user.profile.firstName ]]

D3 Security

  • Date
  • Rating
  • Views
  • How to Prepare Your SOC for Cyber Security Orchestration
    How to Prepare Your SOC for Cyber Security Orchestration
    David Monahan, Security and Risk Management Research Director, EMA and Stan Engelbrecht, Director of Cyber Security, D3 Recorded: Oct 17 2018 64 mins
    D3 Security and EMA Present: How to Prepare Your SOC for Security Orchestration.

    Sophisticated cyber attacks and a siloed IT ecosystem have prompted the rise of Security Orchestration, Automation and Response technology. To keep up with the threat landscape, security professionals and architects must understand how to prepare for and deploy "SOAR".

    In this webinar hosted by EMA Security and Risk Management Expert, David Monahan, and D3 Director of Cyber Security, Stan Engelbrecht learn how to:

    • Define expectations for security and IR orchestration
    • Map your tools, processes and stakeholders
    • Prioritize compliance and business requirements
    • Automate a full-lifecycle Phishing / BEC playbook

    We'll also do a deep-dive on the latest automation and orchestration capabilities, including threat intelligence enrichment, artificial intelligence (AI) and machine learning (ML), and share insight from real-world SOAR deployments and security operations.
  • SOAR Like An Eagle: The Key to Fast, Full-Lifecycle Incident Response
    SOAR Like An Eagle: The Key to Fast, Full-Lifecycle Incident Response
    Jon Oltsik (ESG) and Stan Engelbrecht (D3 Security) Recorded: Jul 19 2018 58 mins
    Join Senior Principal Analyst and ESG Fellow, Jon Oltsik, and Director of Cyber Security at D3 Security, Stan Engelbrecht, CISSP, as they discuss the complexity of today’s security incidents and the need for organizations to utilize SOAR (Security Orchestration, Automation and Response) tools in order to seamlessly, and rapidly, coordinate the people, technology, and processes that make up their security infrastructure.

    In this webinar you will learn how to:

    •Ease the adoption of SOAR through out-of-the-box security product integration
    •Identify, contextualize and rank threats automatically (so your analysts don’t have to)
    •Eliminate silos with visual playbooks that weave human and machine tasks together
    •Automate case management activities, such as incident investigations, link analysis and forensics tracking
    •Extend automation and orchestration capabilities to compliance, privacy and investigative teams
  • Go Beyond Incident Response: The Benefits of Full-Lifecycle Incident Management
    Go Beyond Incident Response: The Benefits of Full-Lifecycle Incident Management
    Rear Admiral Robert Day- USCG. Jim Pflaging- TCG. Fraser Retallack- D3, Chris Crowley- SANS. Recorded: Jan 12 2018 62 mins
    Enterprises face significant financial, reputational, intellectual property, and legal risks from data breaches, with all types of enterprises falling victim – from government agencies like Office of Personnel Management (OPM) and the Internal Revenue Service (IRS), to high-tech companies like LinkedIn and Snapchat, to Fortune 50 companies like J.P. Morgan, Sony, and Oracle.

    Though the U.S. National Institute of Standards and Technology (NIST) has released best practices for incident response, most enterprises struggle to implement incident response strategies because of a lack of a centralized approach that covers the full incident lifecycle, including workflows and playbooks, root cause analysis, and corrective action. Additionally, high volumes of alerts and incidents, the cyber security labor shortage, and the high costs of response services have made responding to breaches even more difficult and detrimental to the bottom line.

    Coinciding with the convergence of IT and security teams within cyber security and risk management operations, many organizations have recognized the need for a comprehensive incident management platform, one that security and IT managers can use to identify the source of incidents and breaches and leverage lessons learned to prevent them down the road.

    In this webinar, a panel of cyber security experts from The Chertoff Group, The SANS Institute, and D3 Security discuss:

    - Threats, costs, and risks associated with today’s cyber security landscape

    - Convergence of IT and security operations

    - Current incident response strategies and landscape

    - Rise of traditional incident response platforms

    - Capabilities of a comprehensive incident management platform.
  • Next-Generation Threat Management
    Next-Generation Threat Management
    Jason Cook- Managing Director, The Chertoff Group. Rear Admiral Robert Day Recorded: Jan 11 2018 62 mins
    Technological shifts, personnel shortages, evolving threats, and other industry trends are changing the way that organizations must think about cybersecurity. The current landscape necessitates convergence between traditionally siloed areas of the business, by bringing together security, risk, and compliance. We call this new approach Next-Generation Threat Management, and in this webinar, a panel of experts from The Chertoff Group and D3 Security break down the steps you can take to implement it in your organization.

    Watch the Webinar to Get Insights from the Former CISO of British Telecom, the Former Commander of the United States Coast Guard Cyber Command, and the Director of D3’s Cybersecurity Practice regarding:

    - The benefits of next-generation threat management and converged IT and security operations.

    - How threat management tools can drive operational maturity within organizations.

    - How D3 helped a global bank establish a unified system across business functions in order to streamline security, risk, and compliance operations.

    - The next steps organizations can take to get started on next-generation threat management.
  • The CyberWire Podcast- Cybersecurity Vulnerabilities in Public Transport
    The CyberWire Podcast- Cybersecurity Vulnerabilities in Public Transport
    Stan Engelbrecht Recorded: Dec 20 2017 19 mins
    In today's podcast, we talk about what the Five Eyes see. Implications of North Korean responsibility for WannaCry. Defense and deterrence go with naming and shaming. The Lazarus Group looks to cryptocurrency theft to redress North Korean financial shortfalls. Copperfield cyber espionage campaign in the Middle East. GDPR approaches, and organizations look to get their data houses in order (and buy insurance). Justin Harvey from Accenture on choosing threat intelligence. Guest is Stan Engelbrecht from D3 Security on the vulnerabilities in public transportation. And what to do if your child gets a phone from Santa.

Embed in website or blog