Hi [[ session.user.profile.firstName ]]

SecureWorks SecureThoughts

  • Date
  • Rating
  • Views
  • You’re The One That They Want: Targeted Threats and You You’re The One That They Want: Targeted Threats and You Don Smith, SecureWorks, Ian Glover, CREST & Peter Wood, First Base Technologies Recorded: Jun 15 2016 46 mins
    The rise in targeted threats means that security teams must move beyond a general understanding of the threat landscape, to a detailed understanding of their own context and the ability to spot threats targeted at their specific organisation.

    In a world of information-overload and an explosion in communication channels, how do you sift through the noise and identify true threats to your business?

    Key themes:

    •The challenges faced by organisations from the rise in targeted threats
    •Limitations of security processes in protecting from targeted threats
    •How to gain early visibility into the threats targeting your particular organisation

    Don Smith leads the CTU™ Cyber Intelligence Cell: a team of experienced threat analysts who, through the application of established intelligence practices, deliver actionable and timely intelligence products on the threats most relevant to SecureWorks clients. Don also leads the CTU research team in EMEA.

    Don joined SecureWorks in 2005 and, since then, has been instrumental in establishing a CTU presence in EMEA and building important relationships for SecureWorks in the region. His enthusiasm and threat expertise means that he regularly represents SecureWorks at industry events in EMEA. Don has 24 years’ experience in the IT industry and was previously responsible for security architecture and operations for a multi-billion enterprise, where he took a lead role in successfully integrating 14 acquisitions. He is a recognized subject-matter expert many areas of cybersecurity and advises SecureWorks and SecureWorks’ clients globally.
  • 6 Steps to Risk-Based Security in a Hyper-Connected World 6 Steps to Risk-Based Security in a Hyper-Connected World Hadi Hosn, Head of Security Strategy and GRC Consulting, EMEA Recorded: Jun 13 2016 14 mins
    Achieving total security in an organisation is impossible. Security controls need to be pragmatic and investments prioritised. In this presentation, Hadi Hosn, Head of Security Strategy and GRC Consulting in EMEA, discusses six steps to implementing and operating a risk-based model to help companies identify and protect their most critical information assets and business processes.
  • Strategy Talks: Evolutions in APT Tactics Strategy Talks: Evolutions in APT Tactics Lee Lawson, Counter Threat Unit, Special Operations Recorded: Jun 13 2016 26 mins
    Lee discusses the rise of advanced persistent threats, how the security threat landscape is evolving and what you can do to keep pace. The presentation examines techniques deployed for intrusion, persistence, lateral expansion and exfiltration and highlights where changes to the detective or preventative control frameworks could have prevented attackers from achieving their objectives.

    Lee covers off three types of evolutions recently observed:

    - Defensive Evasion
    - “Living Off the Land”
    - Virtualisation
  • Top 5 Emerging Trends in Information Security Top 5 Emerging Trends in Information Security Chris Yule, Senior Principal Consultant, Security Strategy Recorded: Jun 13 2016 18 mins
    As Information Security continues to evolve, cybercriminals are busier than ever, and when organisations are faced with an ever-evolving range of increasingly sophisticated attacks from threat actors, they turn to SecureWorks for help.

    As a Senior Principal Consultant at SecureWorks, Chris works with a range of clients from different industries and of varying sizes, to help them formulate and hone their security strategy. In this presentation, Chris provides an overview of the five key information security trends that he has seen emerge during his conversations with clients over the past 12 months.

    During this presentation, Chris covers the following five trends;

    - Organisation
    - Threat Intelligence
    - Securing the Cloud
    - Emerging security controls
    - Intelligence-led testing
  • Risk Based Security in a Hyper-Connected World Risk Based Security in a Hyper-Connected World Hadi Hosn, Head of Security Strategy & GRC Consulting, EMEA Recorded: May 10 2016 43 mins
    For many organisations, investments in new processes and technologies is on top of the priorities list. From behavioural analytics, big data solutions, and “one touch” processes that require no manual intervention, companies are always on the lookout for technology innovations that can achieve a considerable return on investment. When companies consider Cyber Security in such a technology dependent world, most ask, “How can we secure our business and comply with the changing legal and regulatory standards?” instead of “How do we make business focused, intelligent investments given the cyber security risks we face today?”

    In this webcast, Hadi Hosn, Head of Security Strategy & GRC Consulting at Dell SecureWorks, will discuss the risk based Cyber Security operating model to help companies identify and protect their most critical information assets and business processes. Hadi will focus on the most critical actions for any organisation building a risk based security programme.

    Key topics covered include:

    · Prioritising information assets based on value to the organisation

    · Identifying and prioritising risks to the assets

    · Reduce risks with quick wins

    · Build and deliver a security plan that aligns business and technology

    · Ensure continuous business engagement on the topic of cyber security
  • Securing Your Network & Endpoints Securing Your Network & Endpoints Phil Burdette, Senior Security Researcher, Dell SecureWorks Counter Threat Unit, Special Ops Recorded: Apr 13 2016 47 mins
    Unifying Visibility, Capabilities and Intelligence for Action

    Advanced and evasive threats are growing exponentially and getting harder to detect. Adversaries are continuing to get more sophisticated and targeted in their attacks even sometimes gaining access to your company’s network by “living off the land” and using little to no malware at all. Unified visibility and interpretation of all of the data across your network and endpoints has never been so valuable to ensure that your team is able to accurately detect and quickly respond threats to your organisation.

    Attend this webinar to learn more about the benefits of unifying visibility across your network and endpoint with the right intelligence, people and processes to enable you to reduce the time to detect and effort to respond by answering the following questions:

    - Is there an advanced threat actor present on my network or endpoints?
    - Who is behind the attack?
    - How did they get in?
    - What did they take?
    - Which systems have been compromised?
    - How do I best repair the damage quickly and get them out?

    In addition, we’ll go over analyst insights and predictions about industry trends as well as specific use cases examples from the SecureWorks Counter Threat UnitTM research team that showcase how our clients are leveraging endpoint and network visibility to significantly reduce their risk as well as costs to respond to identified threats.
  • From RAM to Reality From RAM to Reality Tom Finney and Matthew Webster, Counter Threat Unit security researchers at Dell SecureWorks Recorded: Mar 8 2016 56 mins
    Observations of Geopolitical Conflicts Transitioning to Cyberattacks

    Geopolitical conflicts are more publicly transitioning into the cyber realm. With current conflicts, a cyber-component is almost always included – and the outcome can be observed in the physical world. What is the impact of these events? Can it expose trade secrets? Shut down financial markets? Or worse?

    During this interactive webinar, Tom Finney and Matthew Webster, Counter Threat Unit security researchers at Dell SecureWorks, will cover known events, discuss the actors behind them and generally talk about the potential impacts from these threats.

    In addition you will:

    - Understand the relationship between specific geopolitical events and cyberattacks
    - Learn about the actors behind these cyberattacks and the impact to your businesses
    - Get insight into the latest attack trends
    - Receive recommendations on security solutions and threat intelligence to help protect your network
  • Top Five Information Security Trends for 2016 Top Five Information Security Trends for 2016 Chris Yule, Senior Principal Consultant Recorded: Jan 19 2016 44 mins
    Information Security continues to evolve, with cybercriminals busier than ever. Targeted attacks like the recent TalkTalk breach continue to make headlines and increase the fear factor among senior executives at organisations.

    As executives keep asking new questions of their teams, so those teams continue to ask new questions of Dell SecureWorks.

    In this webcast Chris Yule, Senior Principal Consultant at Dell SecureWorks, will discuss the top 5 trends identified over the past few months which we have identified from these discussion and expect to continue throughout 2016.

    These are the topics security professionals should be prepared to talk about this year, and will include 5 different perspectives on security:

    1. Organisation: How are enterprises organising and preparing themselves to respond to the latest threats?

    2. Intelligence: What’s being done to utilise Threat Intelligence effectively?

    3. Expansion: Key areas to focus on as information security expands to cover suppliers and cloud services

    4. Control: What new technologies and services are emerging to better control your information and environment?

    5. Testing: How can all of the above be combined to effectively test the security you have in place?
  • Advanced Incident Investigation: Lessons Learned From APT Victims Advanced Incident Investigation: Lessons Learned From APT Victims Don Smith, Technology Director, Dell SecureWorks Recorded: Dec 1 2015 45 mins
    The increased complexity and frequency of attacks, combined with reduced effectiveness of detective or preventative control frameworks, elevate the need for organisations to roll out enterprise wide incident response initiatives to ensure rapid containment and eradication of threats.

    In this webcast, Don Smith, Technology Director at Dell SecureWorks, describes three organisation’s experience with “APT” actors, examining techniques deployed for intrusion, persistence, lateral expansion and exfiltration.

    Don will highlight where changes to the detective or preventative control frameworks could have prevented the attackers from achieving their objectives and outline key steps to building a robust incident response plan.

    Webcast takeaways include:

    · Real-world examples of APT attacks from the coalface

    · The latest tools and techniques that advanced threat actors are using

    · Recommendations for preventing and responding to APTs

Embed in website or blog