Hi [[ session.user.profile.firstName ]]
Sort by:
    • Take your Incident Response plan to a whole new level!
      Take your Incident Response plan to a whole new level! Gary Southwell, General Manager, CSPi & John Black, Cisco Recorded: Oct 17 2017 3:00 pm UTC 44 mins
    • In this webinar, join Cisco and CSPi as they discuss how automated breach notification takes Cisco’s incident response services to a whole new level. With FirePOWER and nVoy the incident response process can start immediately after a breach is verified and therefore be completed faster, in some cases the full impact of a breach can be determined in minutes.

      This can be extremely powerful for companies which rely on managed services providers for their cyber breach incident response strategy. With FirePOWER and nVoy Cisco’s IR professional services team will proactively monitor the solution for you and will receive email notifications when a potential incident is occurring against your organizations critical assets to trigger IR activity as per services contract.

      Shortening the breach identification and investigation phase provides several benefits:
      - Meet stringent data privacy compliance regulations, like GDPR
      - Focus efforts on effective forensic analysis and remediation
      - Limit breach exposure and the expenses related to handling breaches

      Up your incident response game!

      Read more >
    • Incident Response aus der Nähe
      Incident Response aus der Nähe Mathias Fuchs, Incident Response Consultant bei Mandiant Recorded: Nov 26 2015 12:00 pm UTC 49 mins
    • Mathias Fuchs, Incident Response Consultant bei Mandiant erklärt warum erfolgreiche Angriffe auf Unternehmen immer noch unausweichlich sind. Zu verstehen wie Angreifer arbeiten und wie Incident Response optimal durchgeführt wird hilft, die Angreifer zu stoppen bevor sie ihre Ziele erreichen. In diesem Webcast beschreibt Mathias Fuchs den mehrstufigen Incident Response Prozess der von der Vorbereitung über Erkennung und Analyse bis hin zur Bereinigung der Situation. Er beschreibt dabei die Herausforderungen jedes Schrittes und mögliche Lösungsansätze.
      Auf Basis einer Fallstudie eines Systemeinbruchs in einem Unternehmen mit 50.000 Endpoints wird beleuchtet wie APT Akteure in ein Netzwerk einbrechen und Daten stehlen.

      Read more >
    • Phishing, Malware and Incidents – Oh my! How to handle the daily deluge.
      Phishing, Malware and Incidents – Oh my! How to handle the daily deluge. David MacKinnon, Director of Research and William Galway, Product Manager and former Incident Responder Recorded: Mar 23 2016 4:00 pm UTC 59 mins
    • No one understands the strain of constant battle better than those in Incident Response (IR). Daily cyber assaults require an unattainable perfect response – every time. However, teams are constantly working within constraints and breaches continue to occur in record number. Technology has been introduced to help but has failed time and time again. Breach identification takes an exorbitantly long time. And above all, attackers continue to target that last line of defense – the vulnerable, easily fooled human assets. When that last line of defense is surpassed, the IR team is expected to catch the attacks in progress – wading through millions of false alerts while attackers continue to hone their approach and deliver evolved malicious payloads.

      It’s enough to make you wonder why you got into this line of work!

      Join PhishMe’s David MacKinnon and Will Galway to hear why it’s not all doom and gloom. Previous to PhishMe, both David and Will worked as incident responders in the Fortune 500 market, collecting years of security operations insight and best practices to share. In this session, you’ll gain tips and knowledge around new threats and solutions for Incident Responders such as:

      •The new wave of malware to watch for and trends and threats collected from 2015
      •The evolution of phishing emails, their targets and the payloads they deliver
      •How to forge a new line of defense and triage potential attacks – quickly and easily

      Read more >
    • Proactive Incident Management Webcast
      Proactive Incident Management Webcast Tom Sammel, Senior Incident Management Consultant for Proactive Services at Dell SecureWorks Recorded: Apr 30 2015 6:00 pm UTC 64 mins
    • An Eyes-Wide-Open Approach to Cyber Security

      The last thing any organization wants is its name in a headline due to a cyber-breach. With cyber-crime on the rise, how do organizations ensure that they have their eyes open to the ever-changing threat landscape and that they’re taking the best steps to mitigate risk before a breach occurs?

      Watch this in-depth webcast to learn how the proactive measures of incident management benefit organizations more than reactive incident response alone. You’ll learn:

      - Why investing in preparation up front is more valuable than investing after a breach occurs
      - The key people, process and technology components of an effective incident management program
      - The difference between the wise way and the risky way to manage an incident, through real examples
      - How the evolution to proactive services will improve your security framework

      Read more >
    • Passive Detection Doesn’t Work: Non-Reactive Approaches To Incident Response
      Passive Detection Doesn’t Work: Non-Reactive Approaches To Incident Response Devon Kerr, Incident Response Manager, Professional Services, Mandiant Recorded: Jul 27 2016 3:00 pm UTC 59 mins
    • Intrusion investigations are a response to the detection of a threat in the environment. Organizations are investing heavily in technology, training, and personnel who can quickly detect and respond to threats after they’ve gained some amount of access to their environments. It’s this process that leads to containment and gives businesses back control.

      Companies are getting better at detecting threats as a result, but actors may still have been in the environment for several months before that critical moment when tools and personnel finally detect the bump in the night and the investigative process can begin.

      During this conversation, we’ll look at the security ecosystem and some of the reasons why technologies that react to threat activity may not be adequate in this golden age of cyber threats. We’ll also discuss a few of the most important skillsets necessary to cultivate and why personnel and expertise are your secret weapons. Lastly, we’ll suggest some of the most effective sources of evidence to examine as well as some of the analysis techniques you should be using to filter through the noise.

      Register today!

      Read more >
    • Order from Chaos: The Importance of Digital Forensics in Incident Response
      Order from Chaos: The Importance of Digital Forensics in Incident Response Randy Stone, Principal Consultant, Dell SecureWorks Incident Reponse and Digital Forensics Team Recorded: Dec 2 2014 8:35 pm UTC 61 mins
    • When a breach happens, chaos ensues. However, for proactive organizations, a digital forensics capability can bring order to chaos and contribute to minimizing overall business impact. Digital forensics plays an integral role in any effective response to a security incident and in its aftermath.

      Digital forensics investigations can help you:
      •Assess which assets were compromised
      •Determine what unauthorized activities were carried out
      •Establish an appropriate mitigation strategy
      •Assess impact to the organization for a variety of stakeholders
      •Learn from previous incidents to adjust security strategy using your own threat intelligence

      In this webcast, Randy Stone of the Dell SecureWorks’ Incident Response and Digital Forensics practice will share examples of how digital forensics techniques were used to understand threat actors, attack methods, and impact to organizations. Randy will highlight key operational and technical capabilities required to build and sustain a digital forensics function. He will share common mistakes made by response teams that inhibit the ability to investigate and determine the facts around an incident. Lastly, he will share tips and guidance for how organizations can assess the maturity of their digital forensics capabilities.

      In this webcast, you will:
      •Hear examples of previous incidents and how digital forensics techniques were used to assess impact and respond accordingly
      •Find out common pitfalls that prevent an effective forensic investigation of an incident
      •Learn strategies for assessing the digital forensics capabilities of your organization’s incident management function

      Read more >
    • Adapting Incident Response to Meet the Threat
      Adapting Incident Response to Meet the Threat Jeff Schilling - Director of Incident Response and Digital Forensics at Dell SecureWorks Recorded: Jan 28 2014 7:00 pm UTC 66 mins
    • As the frequency and sophistication of cyber-attacks continue to evolve, so too must your capabilities to respond. The reality of information security today is that a breach is inevitable and you must ask yourself:

      - Am I prepared for a major compromise today and how will I adapt to a changing threat in the future?
      - Do I really know my environment?
      - Do I really understand the threat?
      - Do I know where to focus my limited incident Response Capabilities?
      - Do I know how to measure the success of my Incident Response and Security plan?

      In this webcast, Jeff Schilling - Director of Incident Response and Digital Forensics at Dell SecureWorks, provides a vision for how IT security must evolve to combat the changing nature of the cyber security threat. Jeff will discuss & share:

      - The best methods for layering incident response into the security stack
      - Developing a proven capability to handle a major data breach.
      - Examples of actual incidents
      - And also provide practical recommendations you can implement quickly to minimize the "detection to response" window and better protect your networks, servers, hosts and end users.

      Read more >
    • Automation as a Force Multiplier in Cyber Incident Response
      Automation as a Force Multiplier in Cyber Incident Response Mike Fowler (CISSP, EnCE), VP of Professional Services at DFLabs Recorded: Sep 6 2017 5:00 pm UTC 33 mins
    • Four Best Practices to eliminate Security Analyst Alert Fatigue

      Join us in this webinar to learn industry best practices to improve your security analyst’s effectiveness by eliminating Alert Fatigue.

      By 2019, ISACA predicts a shortage of 2 million cyber security professionals. This scarcity of skilled labor and a security alert false positive rate of over 52% means that your security team is overstretched and overwhelmed.

      Security Analysts are subjected to such a volume and frequency of alerts that they become desensitized to the information they are meant to analyze, resulting in critical alerts being disregarded or missed.

      When responding to tens of thousands of security alarms a month, how can you reliably distinguish what's important from what's just a noise in the background?

      Join us in this webinar and learn how you can help your overwhelmed cyber response team to "SOAR" above the noise when responding to incidents. Mike Fowler will present proven best practices to reduce and avoid alert fatigue:

      ● What is “Alert/Alarm Fatigue” and why should you care?
      ● What is the impact of alert fatigue on Security Operations and Incident Response?
      ● How you can cultivate a state of continuous alertness by applying the SOC Analyst Sanity Saver
      ● How to reinforce the front line
      ● How to leverage automation capabilities to act as a Force Multiplier through Incident Automation and Orchestration

      Our webinar presenter, Mike Fowler (CISSP, EnCE), is the Vice President of Professional Services at DFLabs and has over two decades of experience in incident response and forensic investigations.

      Read more >
    • CTO's Perspective on Creating a Template for an Incident Response
      CTO's Perspective on Creating a Template for an Incident Response Sam McLane, CTO/Head of Security Ops; Dave Martin, Head of Product Mgmt; Sridhar Karnam, Director of Product Mktg Recorded: Sep 7 2017 6:00 pm UTC 49 mins
    • When you have a security incident, do you have a documented incident response plan? If not, who makes the decisions? These incidents could result in a complicated and costly legal, regulatory, and/or security proceedings. The people, process, and technology responsible for responding to these incidents are collectively known as Incident Response (IR).

      For those who don’t yet have a set plan but are looking to establish one, having a template to reference can be helpful. There are number of key pieces that should be incorporated into every incident response plan.

      Join us for a panel discussion featuring our CTO, head of product management, and head of product strategy as they talk about executing an incident response plan. The discussion will cover:

      •How to create a template for IR
      •What are the critical elements of an IR plan
      •Testing frequency and methods to ensure you have a good IR plan in place

      About Our Key Speaker: Sam McLane leads Security Engineering at Arctic Wolf, bringing over 20 years of security experience to the team. Prior to joining Arctic Wolf, Sam led Product Management for and other sales functions for Blue Coat Systems’ Cloud Security Services business. Before Blue Coat, Sam was a sales leader at Lucent Technologies, managing the system engineering team for the eastern US. Prior to Lucent, Sam was a networking consultant at KPMG and network manager at Temple University.

      Read more >