Hi [[ session.user.profile.firstName ]]

SecureWorks SecureThoughts

  • Date
  • Rating
  • Views
  • How the Counter Threat Unit™ Sets Secureworks Consulting Services Apart
    How the Counter Threat Unit™ Sets Secureworks Consulting Services Apart
    A panel of Secureworks technical and strategic consultants Recorded: Jan 23 2018 60 mins
    As the scope for security skill and expertise demanded of organisations extends, CISOs are increasingly turning to security consulting partners for strategic guidance and technical and advisory expertise.

    There are a broad range of organisations in today’s market offering security consultancy services based on best practices and standard frameworks. Partnering with one of these firms can provide your organisation with the technical expertise to improve network visibility and gain a clearer understanding of your vulnerabilities, provide the strategic and practical guidance that helps you prioritise and build out programmes that enable business objectives, as well as advise on how to effectively engage with the C-suite.

    What truly sets Secureworks’ information security consulting services apart is how we utilise our Counter Threat Unit™ and knowledge garnered from thousands of client engagements to ensure you are being consulted on the latest industry trends and threats. This way, the outcome is based on real-world scenarios that matter to your organisation.

    Join consultants across our technical and strategic practices as they share lessons learned from their most challenging engagements and the value that real-time threat intelligence has brought to those engagements.

    Key topics discussed include:

    - Examples of real-world engagements where the CTU™ and Consulting Practice improved the outcomes for clients
    - Tools consultants use to ensure that your outcome is based on real-world scenarios and threats that matter to your organisation
    - Lessons learned from our most strategic and complex engagements
  • UK Enterprise Security Maturity: How Does Your Organisation Stack Up?
    UK Enterprise Security Maturity: How Does Your Organisation Stack Up?
    Jarad Carleton, Principal Consultant at Frost & Sullivan & Hadi Hosn, Global Consulting Solutions Lead at Secureworks Recorded: Nov 27 2017 51 mins
    During March/April 2017, Secureworks and Frost & Sullivan partnered to conduct security readiness research amongst 201 IT leaders within large UK enterprises to determine how realistic their perceived level of security maturity is. The end result is the white paper, Measuring Cybersecurity Preparedness: Illuminating Perception vs Reality in UK Enterprise.

    In this webcast, Jarad Carleton, Principle Consultant at Frost & Sullivan, will present key findings from the research, which benchmarks UK enterprises against the Security Maturity Model (SMM), co-developed by Secureworks and Frost & Sullivan.

    Hadi Hosn, Global Consulting Solutions Lead at Secureworks, will then explain the Secureworks point of view on some of the challenges UK enterprises are currently facing on their quest for greater security maturity, and how organisations can take positive steps to tackle them.

    During this live webcast we will cover:

    - How you rate against the UK’s Security Leaders
    - The top aspects of security Underprepared organisations should focus on
    - The key security weakness where even Security Leaders are vulnerable
    - Steps you can take to improve the security posture of your organisation
  • How Hackers Exploit Your Windows Tools, Part 2: The WMI Threat
    How Hackers Exploit Your Windows Tools, Part 2: The WMI Threat
    Lee Lawson, Special Operations Researcher, SecureWorks Counter Threat Unit Recorded: Sep 13 2017 51 mins
    Windows Management Instrumentation (WMI) is a Microsoft Windows administrative tool that has access to all system resources, making it powerful for both legitimate and illegitimate use. Via WMI you can do things like execute, delete and copy files; change registry values; and identify which security products are installed to aid in bypassing them.

    The malicious use of WMI and other legitimate tools continues to grow and was identified as a top trend in a recent SecureWorks Threat Intelligence Executive Report. Like PowerShell, WMI is often used to create file-less attacks that are difficult to identify and stop with technology alone. This makes WMI the perfect tool for threat actors to use as camouflage while acting inside your organisation.

    Join Counter Threat Unit - Special Operations Researcher, Lee Lawson, for the second webcast in our two-part series on how threat actors are exploiting Windows tools in “living off the land” attacks.

    You will learn:

    - Why WMI is so risky
    - Tips to identify malicious use of WMI
    - How threat actors hide their tracks and how you can unmask them
    - WMI threats identified by SecureWorks researchers
    - How you can avoid becoming a victim to this growing threat vector
  • How Hackers Exploit Your Windows Tools, Part 1: The PowerShell Risk
    How Hackers Exploit Your Windows Tools, Part 1: The PowerShell Risk
    Lee Lawson, Special Operations Researcher, SecureWorks Counter Threat Unit Recorded: Aug 24 2017 49 mins
    In a recent SecureWorks engagement, 98.5% of the 3,477 commands executed by threat actors were native to the Windows operating system.

    PowerShell is a popular tool that Microsoft has been including with the Windows OS since 2009, but malicious PowerShell use is rivalling ransomware in popularity with threat actors. Security products focused on preventing endpoint threats are often not enough to differentiate legitimate from malicious PowerShell use.

    In the first webcast of a two-part series on how threat actors are exploiting Windows tools in “living off the land” attacks, SecureWorks Counter Threat Unit - Special Operations Researcher, Lee Lawson, will discuss why PowerShell is so risky, how SecureWorks researchers identify PowerShell threats, and how you can defend your organisation.

    You Will Learn:

    - What PowerShell is and how it is used in “living off the land” attacks
    - Why built-in tools like PowerShell are so attractive to threat actors
    - Examples of malicious PowerShell use
    - How to defend your organisation against common methods threat actors use to evade prevention and detection
  • 3 Key Principles for Managing Cloud Security Risk
    3 Key Principles for Managing Cloud Security Risk
    Hadi Hosn, Head of Security Strategy & GRC Consulting in EMEA Recorded: Jul 19 2017 57 mins
    Whether you like it or not, the security industry is being cloudified. As IT moves into the Cloud, security must follow, and with IT losing its grip on the endpoint, Cloud is the only Security option. In addition, the Internet of Things continues to scale upwards, and Cloud computing will be its data repository, application engine, provisioning system and Security platform.

    Join Hadi Hosn, Head of Security Strategy & GRC Consulting in EMEA, as he explains why cloud security is so important, and provides guidance on key considerations when building out a cloud security programme.

    In this webcast you will learn:

    - 3 key principles for managing cloud security risk
    - 5 common misconceptions and how to avoid them
    - The 5 fundamental cloud security controls you should implement
  • The Victim’s Perspective: What Makes Me a Target?
    The Victim’s Perspective: What Makes Me a Target?
    Chris Yule, Senior Security Researcher Recorded: Mar 14 2017 49 mins
    SecureWorks’ incident responders assist hundreds of organisations annually with the containment and remediation of threats during security incidents, including both targeted and opportunistic threats. Visibility of these incidents provides the SecureWorks Counter Threat Unit™ (CTU) research team with a unique and comprehensive view of emerging threats and developing trends.

    In this webcast Chris Yule, Senior Security Researcher with the CTU, will draw on recent research garnered from SecureWorks’ incident response engagements in Q1 and Q2 of 2016 to address some of the most prominent threats and security challenges organisations face today.

    Chris will be viewing and presenting this insight through the lens of the victim, and will answer the following questions which many organisations will be familiar with:

    - Am I likely to be a victim?
    - Should I care about targeted or opportunistic threats?
    - What makes me a victim of a targeted threat?
    - How can I protect myself against the most common threats?
  • 2017 Cybersecurity Threat Insights Report for Leaders
    2017 Cybersecurity Threat Insights Report for Leaders
    Chris Yule, Senior Researcher, Counter Threat Unit Recorded: Feb 24 2017 53 mins
    In our “Cybersecurity Threat Insights Report for Leaders”, we shared several key findings and observations from our client engagements and about the security industry. This webcast will cover our findings and observations but will also provide you with clear direction on where you need to focus your resources to evoke positive action in your security program.

    During this webcast one of our lead Counter Threat Unit™ researchers, Chris Yule, who helped develop the report, will give his perspective, observations and guidance through responses to a series of questions led by our EMEA Marketing Manager, Andy Patton.
  • 2017 Threat Landscape: Increased Sophistication, or More of the Same?
    2017 Threat Landscape: Increased Sophistication, or More of the Same?
    SecureWorks Counter Threat Unit Research Team Recorded: Dec 7 2016 45 mins
    As 2016 draws to a close, security professionals worldwide will be left pondering another year of publicised breaches, vulnerabilities and threats. So what are the key takeaways and how can global security events from the past 12 months inform your plans for 2017?

    We’ve asked a panel of experts from the SecureWorks Counter Threat Unit (CTU), our highly-trained team of experienced security researchers, to paint a picture of threat actors and their tradecraft across the globe by sharing their views on 2016’s most significant security events. The panel will end the session by providing actionable insights and recommendations for organisations to factor into their security strategy in 2017.

    Join this exclusive webcast to gain CTU insight on the following topics and more:

    - eCrime trends including the rise of ransomware, business email compromise and the Mirai IoT botnet activity
    - Nation state sponsored threats and whether organisations are set up to defend against them
    - How organisations can use threat intelligence gathered in 2016 to improve security
  • TI Spotlight Series Part 4: The Cybercrime Landscape, 2016 in Review
    TI Spotlight Series Part 4: The Cybercrime Landscape, 2016 in Review
    Pallav Khandar, Researcher, CTU EMEA Recorded: Nov 9 2016 34 mins
    The underground cybercrime marketplace is now a well-organised machine that follows the level of business processes you would expect from a legitimate industry. Cybercrime has evolved into a nexus of highly-organised actors, each with a dedicated function to perform, with each individual fulfilling a specific role to propel the mission of cybercrime forward.

    In this short 30-minute on-demand webcast, the final instalment of the four-part SecureWorks Threat Intelligence Spotlight Series, Pallav Khandar, Senior Researcher with the SecureWorks Counter Threat Unit (CTU), looks at how the cybercrime landscape has evolved over the past 12 months.

    Key topics include:

    - Botnet prevalence
    - Industry and geo targeting
    - Distribution vectors
    - New attack vectors
    - The rise of ransomware
  • TI Spotlight Series Part 2: An Exposé of a West African Fraud Syndicate
    TI Spotlight Series Part 2: An Exposé of a West African Fraud Syndicate
    Lee Lawson, Senior Researcher, CTU EMEA Recorded: Nov 4 2016 25 mins
    "Nigerian prince" and "419" scams have plagued victims for decades and transitioned to the Internet in the 1990s. There are many variations and names for these scams, which originated in Nigeria. The scammers refer to their trade using the terms "yahoo yahoo" or "G-work," calling themselves "yahoo-yahoo boys," "yahoo boiz," or "G-boys." However, the simple con man fraud practiced by many West African-based threat actors is being replaced by a new crime they refer to as "wire-wire," "waya-waya," or "the new G-work."

    In this short 25-minute on-demand webcast, the second in the four-part SecureWorks Threat Intelligence Spotlight Series, Lee Lawson, Senior Researcher with the SecureWorks Counter Threat Unit (CTU), explains how the low-level con games these threat actors are typically known for have evolved into more sophisticated and conventional cybercrime that is compromising businesses around the world.

Embed in website or blog