Hi [[ session.user.profile.firstName ]]
Sort by:
    • Incident Response aus der Nähe Incident Response aus der Nähe Mathias Fuchs, Incident Response Consultant bei Mandiant Recorded: Nov 26 2015 12:00 pm UTC 49 mins
    • Mathias Fuchs, Incident Response Consultant bei Mandiant erklärt warum erfolgreiche Angriffe auf Unternehmen immer noch unausweichlich sind. Zu verstehen wie Angreifer arbeiten und wie Incident Response optimal durchgeführt wird hilft, die Angreifer zu stoppen bevor sie ihre Ziele erreichen. In diesem Webcast beschreibt Mathias Fuchs den mehrstufigen Incident Response Prozess der von der Vorbereitung über Erkennung und Analyse bis hin zur Bereinigung der Situation. Er beschreibt dabei die Herausforderungen jedes Schrittes und mögliche Lösungsansätze.
      Auf Basis einer Fallstudie eines Systemeinbruchs in einem Unternehmen mit 50.000 Endpoints wird beleuchtet wie APT Akteure in ein Netzwerk einbrechen und Daten stehlen.

      Read more >
    • Phishing, Malware and Incidents – Oh my! How to handle the daily deluge. Phishing, Malware and Incidents – Oh my! How to handle the daily deluge. David MacKinnon, Director of Research and William Galway, Product Manager and former Incident Responder Recorded: Mar 23 2016 4:00 pm UTC 59 mins
    • No one understands the strain of constant battle better than those in Incident Response (IR). Daily cyber assaults require an unattainable perfect response – every time. However, teams are constantly working within constraints and breaches continue to occur in record number. Technology has been introduced to help but has failed time and time again. Breach identification takes an exorbitantly long time. And above all, attackers continue to target that last line of defense – the vulnerable, easily fooled human assets. When that last line of defense is surpassed, the IR team is expected to catch the attacks in progress – wading through millions of false alerts while attackers continue to hone their approach and deliver evolved malicious payloads.

      It’s enough to make you wonder why you got into this line of work!

      Join PhishMe’s David MacKinnon and Will Galway to hear why it’s not all doom and gloom. Previous to PhishMe, both David and Will worked as incident responders in the Fortune 500 market, collecting years of security operations insight and best practices to share. In this session, you’ll gain tips and knowledge around new threats and solutions for Incident Responders such as:

      •The new wave of malware to watch for and trends and threats collected from 2015
      •The evolution of phishing emails, their targets and the payloads they deliver
      •How to forge a new line of defense and triage potential attacks – quickly and easily

      Read more >
    • Proactive Incident Management Webcast Proactive Incident Management Webcast Tom Sammel, Senior Incident Management Consultant for Proactive Services at Dell SecureWorks Recorded: Apr 30 2015 6:00 pm UTC 64 mins
    • An Eyes-Wide-Open Approach to Cyber Security

      The last thing any organization wants is its name in a headline due to a cyber-breach. With cyber-crime on the rise, how do organizations ensure that they have their eyes open to the ever-changing threat landscape and that they’re taking the best steps to mitigate risk before a breach occurs?

      Watch this in-depth webcast to learn how the proactive measures of incident management benefit organizations more than reactive incident response alone. You’ll learn:

      - Why investing in preparation up front is more valuable than investing after a breach occurs
      - The key people, process and technology components of an effective incident management program
      - The difference between the wise way and the risky way to manage an incident, through real examples
      - How the evolution to proactive services will improve your security framework

      Read more >
    • Order from Chaos: The Importance of Digital Forensics in Incident Response Order from Chaos: The Importance of Digital Forensics in Incident Response Randy Stone, Principal Consultant, Dell SecureWorks Incident Reponse and Digital Forensics Team Recorded: Dec 2 2014 8:35 pm UTC 61 mins
    • When a breach happens, chaos ensues. However, for proactive organizations, a digital forensics capability can bring order to chaos and contribute to minimizing overall business impact. Digital forensics plays an integral role in any effective response to a security incident and in its aftermath.

      Digital forensics investigations can help you:
      •Assess which assets were compromised
      •Determine what unauthorized activities were carried out
      •Establish an appropriate mitigation strategy
      •Assess impact to the organization for a variety of stakeholders
      •Learn from previous incidents to adjust security strategy using your own threat intelligence

      In this webcast, Randy Stone of the Dell SecureWorks’ Incident Response and Digital Forensics practice will share examples of how digital forensics techniques were used to understand threat actors, attack methods, and impact to organizations. Randy will highlight key operational and technical capabilities required to build and sustain a digital forensics function. He will share common mistakes made by response teams that inhibit the ability to investigate and determine the facts around an incident. Lastly, he will share tips and guidance for how organizations can assess the maturity of their digital forensics capabilities.

      In this webcast, you will:
      •Hear examples of previous incidents and how digital forensics techniques were used to assess impact and respond accordingly
      •Find out common pitfalls that prevent an effective forensic investigation of an incident
      •Learn strategies for assessing the digital forensics capabilities of your organization’s incident management function

      Read more >
    • Adapting Incident Response to Meet the Threat Adapting Incident Response to Meet the Threat Jeff Schilling - Director of Incident Response and Digital Forensics at Dell SecureWorks Recorded: Jan 28 2014 7:00 pm UTC 66 mins
    • As the frequency and sophistication of cyber-attacks continue to evolve, so too must your capabilities to respond. The reality of information security today is that a breach is inevitable and you must ask yourself:

      - Am I prepared for a major compromise today and how will I adapt to a changing threat in the future?
      - Do I really know my environment?
      - Do I really understand the threat?
      - Do I know where to focus my limited incident Response Capabilities?
      - Do I know how to measure the success of my Incident Response and Security plan?

      In this webcast, Jeff Schilling - Director of Incident Response and Digital Forensics at Dell SecureWorks, provides a vision for how IT security must evolve to combat the changing nature of the cyber security threat. Jeff will discuss & share:

      - The best methods for layering incident response into the security stack
      - Developing a proven capability to handle a major data breach.
      - Examples of actual incidents
      - And also provide practical recommendations you can implement quickly to minimize the "detection to response" window and better protect your networks, servers, hosts and end users.

      Read more >
    • Measuring Your Plan with a Tabletop Exercise Measuring Your Plan with a Tabletop Exercise Tony Kirtley, Senior Incident Response Consultant at Dell SecureWorks Recorded: Feb 16 2016 7:00 pm UTC 56 mins
    • Ensuring your CIRP is a plan for disaster – not a disaster waiting to happen.

      Most organizations establish Cybersecurity Incident Response Plans (CIRP) with great intentions of leveraging them during security breaches. The reality is, many times once a CIRP is established it gets filed away to collect dust on a shelf until a breach occurs, leaving it out of date and out of mind. If a breach occurred tomorrow, would your organization know the proper steps and procedures to eradicate the threat... who the key stake holders are and the communications flow... when and how to reach out to a third-party for support?

      All of these are included as a part of your CIRP, but using a dusty CIRP as a guide for the first time during a breach is not a plan – it’s a disaster waiting to happen. Testing your plan prior to an incident is the key to minimize the duration, impact and cost of a breach to your organization.

      During this interactive webinar, Tony Kirtley, Senior Incident Response Consultant at Dell SecureWorks, will share the importance of testing your CIRP plan through regular tabletop exercises to help identify your organization's strengths and weaknesses, and further the development of your proactive security capabilities.

      In addition you will learn:

      - What makes an effective tabletop exercise?
      - Real stories of how organizations benefited from tabletop exercises.
      - The benefit of bringing in an objective third party to facilitate your table top exercise.

      Read more >
    • Advanced Incident Investigation: Lessons Learned From APT Victims Advanced Incident Investigation: Lessons Learned From APT Victims Don Smith, Technology Director, Dell SecureWorks Recorded: Dec 17 2015 5:00 pm UTC 50 mins
    • The increased complexity and frequency of attacks, combined with reduced effectiveness of detective or preventative control frameworks, elevate the need for organizations to roll out enterprise wide incident response initiatives to ensure rapid containment and eradication of threats.

      In this webcast, Don Smith, Technology Director at Dell SecureWorks, describes three organization’s experience with “APT” actors, examining techniques deployed for intrusion, persistence, lateral expansion and exfiltration.

      Don will highlight where changes to the detective or preventative control frameworks could have prevented the attackers from achieving their objectives and outline key steps to building a robust incident response plan.

      Webcast takeaways include:

      · Real-world examples of APT attacks
      · The latest tools and techniques that advanced threat actors are using
      · Recommendations for preventing and responding to APTs

      Read more >
    • Fuel Incident Response With Threat Intelligence to Lower Breach Impact Fuel Incident Response With Threat Intelligence to Lower Breach Impact Ondrej Krehel, Chief Executive Officer, LIFARS Recorded: Mar 29 2016 6:00 pm UTC 51 mins
    • As we’ve all learned from recent incidents at large companies, a data breach can cause insurmountable damage that is difficult to rebound from. To effectively counteract cyber attacks, companies need to have a two-pronged approach that includes both targeted threat intelligence and expedient incident response (IR).

      In this webinar, Scott Donnelly of Recorded Future, will explain how threat intelligence can help secure your company, how to implement an intelligence strategy, and how a thorough threat intelligence program can reduce the risk of breaches.

      Next, LIFARS CEO and Founder Ondrej Krehel will discuss how this intelligence spearheads an incident response and describe the process of investigation and evidence collection.

      Register now to learn:

      * How threats manifest in different ways on different layers of the Web.
      * The difference between a hoax and a possible threat to companies, customers, or infrastructure.
      * How having the right threat intelligence will speed up an IR process and reduce the business impact of a data breach.
      * The steps of an effective IR and how having a proper incident response plan in place makes all the difference.

      Read more >
    • Beautiful Panic: Incident response doesn’t have to be like this Beautiful Panic: Incident response doesn’t have to be like this Duane Kuroda Recorded: Jan 26 2016 4:00 pm UTC 43 mins
    • 451 Research Group and Proofpoint are delighted to invite to you a 30 minute Webinar targeting IT Security and Operations Professionals that will address:
      • Cutting through the noise: Only 1 in 25 critical alerts* are responded to. The panel will discuss why there is an increasing level of security incidents & alerts.
      • Taking Control: Finding the Needle in the Haystack that is Incident Response. The panel will discuss the approaches to take and the broader industry solutions on the market to help achieve this.
      • Actionable Intelligence: Derived from inside and outside your business. The panel will cover how context around an incident can make all the difference.
      • Conclusion: Actionable tips and tricks to help you begin to gain control of your incident response process and reduce the panic!

      Read more >
    • The Discipline of Major Incident Management The Discipline of Major Incident Management Richard Josey, Solution Architect, Edge Service Management by Unisys Recorded: Dec 10 2015 1:00 pm UTC 48 mins
    • Major incidents are characterized by a high level of complexity and high priority to the business. The resolution of these mandates a team of specialists with diverse skills and extensive communication both within the team of resolvers and with the users. If you have the right set of people, processes and technology in place, a major incident need not result in confusion and chaos. The true essence of major incident management lies in not only in quick and efficient resolution of major incidents, but also in creating and delivering value within the team and outside it. In this engaging webinar, Richard Josey, Service Management Architect, discusses the operational and psychological dimensions of major incident management and highlights the key areas that organizations need to work on to ensure that they have efficient mechanisms in place to tackle major incidents.

      Read more >