The Dell SecureWorks Counter Threat Unit has monitored and responded to hundreds of APT attacks across our 3,000+ customer base in the last 12 months. The information gathered from this activity – and information shared with intelligence agencies around the world - includes advanced knowledge of the
The Dell SecureWorks Counter Threat Unit has monitored and responded to hundreds of APT attacks across our 3,000+ customer base in the last 12 months. The information gathered from this activity – and information shared with intelligence agencies around the world - includes advanced knowledge of the adversary, their tools and techniques. Most importantly the Counter Threat Unit has perfected how to identify, protect against and respond to APT attacks.
This webcast will examine the threat posed by Advanced Persistent Threats and look at the lifecycle of an attack. Lee Lawson, Security Architecht at Dell SecureWorks, will walk through a genuine APT attack and look at the different phases of attack that were encountered. Considering the motivation behind these attacks, and the range of tactics which are used, how concerned should you really be?
Lee will give insight into best practice for protecting your organisation from APTs, and how you should respond once an incident does occur.
Key topics covered in the webcast include:
•understanding the threat posed by APTs
•understand best practice for defending your organisation from APT attacks
•how to outwit an attacker that anticipates all your defensive moves
Lee Lawson is the Solutions Architect for Security and Risk Consulting Services at Dell SecureWorks EMEA. In this role he is in charge of envisioning and creating combinations of new and existing services to solve the most unique and difficult customer problems. His past experience was as a Principal Consultant managing the EMEA Security Testing and Response team responsible for all adversarial-testing services such as penetration testing, social engineering and physical intrusions, and all responsive services such as digital forensics and security incident response/handling. This background has provided him with a deep knowledge of the subject having led complex and challenging projects for customers in all industries.
RecordedMay 1 201235 mins
Your place is confirmed, we'll send you email reminders
Email remains a critical component of business process. Strong interest and adoption of Microsoft’s Office 365 online productivity and collaboration suite is pushing email to the cloud. However, Office 365 has many security and risk professionals scrambling to figure out what security controls are necessary to secure email.
While Office 365 can provide native functionality baked in, enterprises need to understand the gaps and where additional security might be necessary to protect you from today’s advanced threats. Join Ryan Kalember, Proofpoint SVP of Cybersecurity, to discuss the key capabilities that enterprises should consider for their Office 365 email environment.
Key takeaways include:
• Why the shift to Office 365 increases criticality of email security
• Common pitfalls to avoid in the planning stages
• Key security capabilities to protect from advanced threats
Learn more about how Proofpoint has helped customers find success with their Office 365 initiative with advanced security, end-to-end insights and rapid response capabilities, and email continuity.
Guest speaker Kelley Mak of Forrester Research will also be on hand to discuss the industry at large from an independent perspective.
PCI compliance is a steep enough challenge, but what happens when your entire infrastructure is in AWS? Do the same concepts of network segmentation and separation apply, and if so how? At what point do AWS compliance efforts intersect with your compliance efforts?
Join this webinar where we will cover how a customer is using the Palo Alto Networks VM-Series for AWS to maintain separation of data and traffic in AWS to improve security and achieve PCI compliance.
Join Keyaan Williams, Senior Executive, C|CISO Programs at EC-Council for his Corporate Governance for CISOs webinar series! The first webinar in the series will cover the topic of Asset Management from an executive perspective. This session will focus on some fundamental concerns that an organization must address to support an effective information security program. How do you identify asset owners? What are examples of effective classification strategies? What type of inventory do you maintain to manage your asset information? What relationship do asset management and change management share?
Between constraints of IT security skills and the rise of cloud adoption it is increasingly difficult to control security policies across the heterogeneous network. Network security and operations teams are expected to ensure and initiate connectivity while protecting the attack surface from the next cyber threat and complying with internal policies and industry regulations. Join us for a Webinar session with ESG senior principal analyst Jon Oltsik, as he reviews the latest findings of a recent survey on how cloud adoption is transforming network security operations. In this session we will also examine how security policy orchestration can help address some of the key challenges of managing security and connectivity in the cloud, and across hybrid cloud and physical networks.
Are you an (ISC)² member with questions about your certification? Would you like to hear more about member benefits and how (ISC)2 can help you? Join the Guide to your (ISC)2 Membership in EMEA webinar to learn more about these topics and others including:
•CPE opportunities, member benefits and getting involved
•Your membership requirements summarized
•Who are the (ISC)2 EMEA team and how we can help you
Application Defender can provide consistent and centralized logging of application use and abuse to SOCs or others tasked with Security Monitoring. Learn about the Application Logging categories and use cases that will enable you to gain visibility into application activity across the whole enterprise without changing source or parsing logs.
The Industrial Internet of Things is rapidly evolving, both in terms of its business requirements and the enabling technologies needed to improve decision-making and gain competitive advantage. The ideal technical solution should be able to fuse streaming Fast Data coming from IoT devices and sensors with static Big Data about customers and assets.
In this webinar, hosted by Brian Clark of Objectivity and analyst Jason Stamper of 451 Research, we’ll discuss how to augment these critical categories:
We’ll explain the technical challenges involved when supporting massive volumes of data in a mixed workload environment, and how to leverage open technologies, such as Spark and HDFS, to enable real-time IoT intelligence.
Security practitioners must take a proactive, inside out approach to managing their organization’s cyber risk. But the challenges lie in effectively measuring the overall risk posture of the business. The manual process tied to analyzing security data today is demanding and error prone. To address this, the security and risk department needs an automated and repeatable process that makes sense of the volumes of security data from their existing solutions. This would allow them to effectively communicate a traceable and actionable view of cyber risk to line of business owners and the board of directors.
Please join us on Thursday, April 28, 2016 at 10:00 a.m. PT for a live Bay Dynamics webinar as Humphrey Christian, Vice President, Product Management, explains how your organization can obtain a 360 degree view of your cyber risk posture.
Hadi Hosn, Head of Security Strategy & GRC Consulting, EMEA
For many organisations, investments in new processes and technologies is on top of the priorities list. From behavioural analytics, big data solutions, and “one touch” processes that require no manual intervention, companies are always on the lookout for technology innovations that can achieve a considerable return on investment. When companies consider Cyber Security in such a technology dependent world, most ask, “How can we secure our business and comply with the changing legal and regulatory standards?” instead of “How do we make business focused, intelligent investments given the cyber security risks we face today?”
In this webcast, Hadi Hosn, Head of Security Strategy & GRC Consulting at Dell SecureWorks, will discuss the risk based Cyber Security operating model to help companies identify and protect their most critical information assets and business processes. Hadi will focus on the most critical actions for any organisation building a risk based security programme.
Key topics covered include:
· Prioritising information assets based on value to the organisation
· Identifying and prioritising risks to the assets
· Reduce risks with quick wins
· Build and deliver a security plan that aligns business and technology
· Ensure continuous business engagement on the topic of cyber security
Phil Burdette, Senior Security Researcher, Dell SecureWorks Counter Threat Unit, Special Ops
Unifying Visibility, Capabilities and Intelligence for Action
Advanced and evasive threats are growing exponentially and getting harder to detect. Adversaries are continuing to get more sophisticated and targeted in their attacks even sometimes gaining access to your company’s network by “living off the land” and using little to no malware at all. Unified visibility and interpretation of all of the data across your network and endpoints has never been so valuable to ensure that your team is able to accurately detect and quickly respond threats to your organisation.
Attend this webinar to learn more about the benefits of unifying visibility across your network and endpoint with the right intelligence, people and processes to enable you to reduce the time to detect and effort to respond by answering the following questions:
- Is there an advanced threat actor present on my network or endpoints?
- Who is behind the attack?
- How did they get in?
- What did they take?
- Which systems have been compromised?
- How do I best repair the damage quickly and get them out?
In addition, we’ll go over analyst insights and predictions about industry trends as well as specific use cases examples from the SecureWorks Counter Threat UnitTM research team that showcase how our clients are leveraging endpoint and network visibility to significantly reduce their risk as well as costs to respond to identified threats.
Tom Finney and Matthew Webster, Counter Threat Unit security researchers at Dell SecureWorks
Observations of Geopolitical Conflicts Transitioning to Cyberattacks
Geopolitical conflicts are more publicly transitioning into the cyber realm. With current conflicts, a cyber-component is almost always included – and the outcome can be observed in the physical world. What is the impact of these events? Can it expose trade secrets? Shut down financial markets? Or worse?
During this interactive webinar, Tom Finney and Matthew Webster, Counter Threat Unit security researchers at Dell SecureWorks, will cover known events, discuss the actors behind them and generally talk about the potential impacts from these threats.
In addition you will:
- Understand the relationship between specific geopolitical events and cyberattacks
- Learn about the actors behind these cyberattacks and the impact to your businesses
- Get insight into the latest attack trends
- Receive recommendations on security solutions and threat intelligence to help protect your network
Information Security continues to evolve, with cybercriminals busier than ever. Targeted attacks like the recent TalkTalk breach continue to make headlines and increase the fear factor among senior executives at organisations.
As executives keep asking new questions of their teams, so those teams continue to ask new questions of Dell SecureWorks.
In this webcast Chris Yule, Senior Principal Consultant at Dell SecureWorks, will discuss the top 5 trends identified over the past few months which we have identified from these discussion and expect to continue throughout 2016.
These are the topics security professionals should be prepared to talk about this year, and will include 5 different perspectives on security:
1. Organisation: How are enterprises organising and preparing themselves to respond to the latest threats?
2. Intelligence: What’s being done to utilise Threat Intelligence effectively?
3. Expansion: Key areas to focus on as information security expands to cover suppliers and cloud services
4. Control: What new technologies and services are emerging to better control your information and environment?
5. Testing: How can all of the above be combined to effectively test the security you have in place?
The increased complexity and frequency of attacks, combined with reduced effectiveness of detective or preventative control frameworks, elevate the need for organisations to roll out enterprise wide incident response initiatives to ensure rapid containment and eradication of threats.
In this webcast, Don Smith, Technology Director at Dell SecureWorks, describes three organisation’s experience with “APT” actors, examining techniques deployed for intrusion, persistence, lateral expansion and exfiltration.
Don will highlight where changes to the detective or preventative control frameworks could have prevented the attackers from achieving their objectives and outline key steps to building a robust incident response plan.
Webcast takeaways include:
· Real-world examples of APT attacks from the coalface
· The latest tools and techniques that advanced threat actors are using
· Recommendations for preventing and responding to APTs
Chris Carlis, Principal Consultant, Dell SecureWorks Red Team
Every day your organisation is under attack. External adversaries are probing your defences, malicious insiders are looking to exploit their trusted positions and users are fighting to correctly identify the latest phishing attack.
Your adversaries are not going to play by the rules. They will use whatever methods are available to compromise your security and hit you where it hurts the most. Red Team testing can identify gaps in your defences, show how minor vulnerabilities can result in large compromises and demonstrate the need for solid planning and preparation.
Red Team testing simulates a real-world attack by combining intelligence gathering, network and physical testing with social engineering to target your organisation’s critical assets. This goal-based testing provides a depth of findings that vulnerability scanning and conventional penetration testing can’t achieve.
1.Learn How Red Team testing complements your existing security program.
2.Hear real-world examples of Red Team engagements.
3.Find out if a Red Team test is right for your organisation.
Justin Turner, Delivery Team Manager, Targeted Threat Hunting & Response
How Targeted Threat Hunting Inspects Your Network for Cyber Attacker Presence.
Many organisations have some form of information security protection in place but also wonder "Have I already been compromised?" A cyber threat such as malware or even a large scale Advanced Persistent Threat could be hiding in file systems and several other areas of your network that may go unnoticed by the untrained eye. A deep inspection of your networks is an excellent way to identify the presence of compromises and entrenched threat actors operating in your environment.
During this interactive webinar, Justin Turner, Delivery Team Manager from the Targeted Threat Hunting & Response Team, will share why it is critical to identify targeted threat indicators of attacker presence and leverage threat intelligence to provide context to determine how to engage and resist the adversary.
In addition you will:
- Learn what Targeted Threat Hunting is and why it is important.
- Hear real-world examples of previous incidents and how targeted threat hunting was used to remove entrenched adversaries.
- Receive a standard list of questions that should be answered during an engagement.
With the threat environment growing more complex, and the rise in advanced and targeted attacks, how does your response plan hold up? Threat actors have changed their tactics; so must you.
During this webcast, Rafe Pilling, Senior Security Researcher for Dell SecureWorrks Counter Threat Unit (CTU), will share advice based on real-world examples to help ensure your organisation is infinitely better prepared to respond to a security breach.
Key topics covered include:
· A view of the evolving threat landscape and how this could impact you
· Examples of critical mistakes Dell SecureWorks has viewed in real-world cases
· Developing a robust incident response plan
· Maximising the value of current controls and improving your overall security posture
Hadi Hosn, Managing Principal Consultant, Dell SecureWorks
Information security is becoming more and more vital to organisations in an ever changing landscape with the role of the Chief Information Security Officer (CISO) growing in magnitude with hacker based activity, cloud computing, and work-from-anywhere initiative adding to the complexity. New privacy regulations, social media and BYOD have added further challenges and put additional strains on compliance…
In this webcast, Hadi Hosn, Managing Principal Consultant at Dell SecureWorks, will discuss the five key areas we believe a CISO should focus today to help shape and drive a security programme. Hadi will focus on the most important areas that are applicable in all market sectors and centre in on those activities that, in his experience, deliver the most value, security improvement and return on investment.
Key topics covered include:
•Understanding your organisation’s extended enterprise
•How to improve visibility into what’s going on in your environment
•Building a culture of security in your organisation
Information is a business critical asset, forming the backbone of organisation globally, and driving growth. However, the security of information is often overlooked, which is why most security breaches actually come from within the organisation – a result of poor policy, procedures, staff training and their awareness of security risks.
In response, organisations are now exploring the benefits of certifying to ISO27001 – the industry standard for information security.
In this latest webcast, Hadi Hosn, Managing Principal consultant at Dell Secureworks, will discuss how certifying to ISO27001 provides a framework for implementing security controls and resolving security issues and can offer the business a competitive advantage and business enablement.
This webcast will cover the following key topics:
•Benefits of ISO27001 – Information Security Management System (ISMS)
•Defining the ISMS scope
•ISMS implementation and certification process overview
The webcast will take you on a journey through the threat landscape, taking in sights such as the latest activity on trojans and viruses, how the ‘bad guys’ are stealing intellectual property through the use of malware and the future of cyber warfare.
During this webcast, Technology Director, Don Smith, will present intelligence gleaned from the Dell SecureWorks Counter Threat Unit (CTU). He will discuss the rise of advanced persistent threats, and how the security threat landscape is evolving and what you can do to keep pace.
What are the motives of the threat actors, and what could make your organisation a target? Don will provide pragmatic advice on what you can do to protect your critical information assets and reduce the risk.
Key webcast topics include:
•Evolution and revolution in the cyber landscape
•War stories and examples from the coalface - An analysis of threat intelligence we have gathered
•Inferences, conclusions, and the road ahead: what are the qualitative outcomes of our findings and how can these help inform your security strategy
Dell SecureWorks processes more than 70 billion security events across thousands of networks around the globe on a daily basis, leveraging the Counter Threat Unit (CTU) research team who perform in-depth analysis of emerging threats and vulnerabilities.
This global visibility and unmatched expertise enables early warnings and actionable security intelligence to customers to protect against threats and vulnerabilities before they impact their organisation.
In this webcast we look at one of the most crucial elements of security leadership: building security awareness throughout an organisation. End users will often be the weakest link in the security stack; building an understanding amongst your users of why security is important and what their responsibilities are is a crucial component of protecting your organisation’s information and ensuring you stay out of the headlines.
Chris Yule, Senior Security Consultant at Dell SecureWorks, will discuss the need to educate employees on proper safeguards in today's climate of social engineering malware scams and targeted attacks.
Key webcast topics covered:
•How to approach an awareness campaign, target training at those who need it most and measure effectiveness.
•The different of domains of training which are appropriate and necessary for different user groups.
•How to target education at all levels of the organisation, from informing end users about password security and phishing risks, to educating board members on the threats and risks faced by the business and the typical approach taken by your industry peers.
Florian Malecki, Product Marketing & Solution Director for EMEA at Dell Software
Each and every day you face the risk of your network being hacked by the newest zero-day threat. Not long ago, it was the HeartBleed bug and then the IE vulnerability. And, while you’re still working to defend your infrastructure from these two critical threats, the cybercriminal community is working just as hard trying to exploit the weaknesses of your network. So how well are you prepared for the next attack?
Florian Malecki, Product Marketing & Solution Director for EMEA at Dell Software discusses the threat landscape and suggests ways that you can take advantage and achieve ongoing protection.
Hadi Hosn, Security and Risk Consulting Managing Principal
The role of the Chief Information Security Officer (CISO) has grown in complexity and magnitude with hacker based activity, cloud computing, and work-from-anywhere initiative only adding to the dilemma. New privacy regulations, social media and BYOD have added further challenges and put additional strains on compliance…
Information security is becoming more and more vital to organisations in this ever changing landscape, with the role of the CISO now more important than ever. The education and preparation of the cyber security leaders of today must keep pace with this change.
During the webcast, Hadi Hosn, Senior Solutions Architect at Dell SecureWorks, will provide expertise and practical advice as well as real world examples from those that have lived and breathed the role of the CISO.
Key topics discussed:
•Succeed as an effective CISO/Director of Security/Head of Information Security
•Improve and validate your skills
•Be recognised as an industry leader and stand out from the crowd
The remit of information security has grown to encompass all aspects of an organisation. It is no longer just a question of IT security. CISOs now need to understand the risks faced by their organisation, where security fits into every business process, and bridge the gap between technical and business stakeholders.
As the remit has broadened, the need for insightful assistance has deepened, from help defining organisation-wide security strategy and metrics down to monitoring of individual log events, with policy, compliance, architecture, intelligence, incident response and end user security training in between.
Chris Yule, Senior Security Consultant at Dell SecureWorks, will discuss how a security partner that can deliver at all levels of the security stack allows for a greater understanding of your organisation, which ultimately delivers better intelligence-led security.
Key topic outlined:
•Evolving from a traditional MSS-focused client/vendor approach to a security partnership
•Examples of successful operating and engagement models
•Delivering value and results to your organisation
Malware targeting Point of Sale (POS) terminals has been exploited by eCrime operators for a number of years but has recently been catapulted to the forefront of industry attention with a number of high-profile breaches. Properly executed, a malware attack on POS terminals can reap huge volumes of credit card numbers in a short space of time without resorting to low-rate of return strategies involving large phishing campaigns. Due to its low risk/ high reward nature, this type of attack is only likely to become more popular with eCrime operators.
In the session Rafe Pilling, Counter Threat Unit Special Operations, will look at the nature of the POS malware threat and how it can be defeated through proper application of threat intelligence.
What will attendees learn:
* A potted history of POS malware
* What does the POS malware threat landscape look like?
* Effective use of threat intelligence to detect and prevent POS malware attacks.
Sandip Wadje, Practice Leader SOC Consulting at Dell SecureWorks
Security Operation Centres (SOCs) act as the nerve centre of an organisation providing real-time alerts, security intelligence and reports to act against internal and external threats. SOCs often use multiple event monitoring tools, ticketing systems and workflow solutions and as a result, building an effective SOC still remains a challenge for most organisations.
How do organisations choose a security monitoring solution that gives optimal asset coverage and at the same time address the evolving threat landscape and compliance requirements? How can organisations demonstrate the value of SOC investment to board level stakeholders? How do organisations choose the correct operating model (outsource, in-source, and hybrid) to run and maintain a SOC?
Sandip Wadje, Practice Leader for SOC Consulting at Dell SecureWorks, will help answer these questions and provide pragmatic next steps to rolling out an effective SOC.
Key Webcast Topics and Takeaways:
•The blueprint for an effective SOC
•SOC tools and integration
•Metrics and reporting
•Choosing the right operating model
Join the latest Dell SecureWorks webcast to learn more on how to effectively secure the extended enterprise.
The modern enterprise is operating in a hybrid world with data residing inside and outside the organisation; blurring boundaries of responsibility and challenging traditional security strategies. Whilst the complexity of the IT environment is increasing, so is the hostility of the cyber threat landscape.
How do organisations remain agile and embrace innovation whilst dealing with increasingly sophisticated threats that are looking to exploit any weak points in the extended enterprise?
This webcast will cover:
•The latest intelligence from cyber threat researchers in the Counter Threat Unit
•Security strategy considerations for the move to cloud computing
•Practical steps for retaining control and reducing risk across the extended enterprise
Dell SecureWorks is relentlessly driven to protect the integrity of the world's digital assets against cyberthreats. We do that with intelligent defences that combine our proprietary technology, global threat visibility and deep expertise. We are 100% focused on information security – it's all we do. That's why we are trusted by thousands of customers. Dell SecureWorks offers a full suite of Managed Security, Threat Intelligence and Security and Risk Consulting services.
Dell SecureWorks is positioned in the Leaders Quadrant of Gartner's Magic Quadrant for MSSPs and has been recognised by SC Magazine’s readers with the “Best Managed Security Service” award for 2006, 2007, 2008, 2009, 2011 (U.S. and Europe) and 2012. Additionally, our experts frequently provide authoritative information security commentary in major media outlets including the New York Times, The Wall Street Journal, The Financial Times, USA Today, The Guardian and many others.