Hi [[ session.user.profile.firstName ]]
Sort by:
    • Seeing the Unseen – Detecting the Advanced Persistent Threat
      Seeing the Unseen – Detecting the Advanced Persistent Threat Justin Turner, Director of the Targeted Threat Hunting & Response Team, SecureWorks Recorded: Sep 14 2016 6:00 pm UTC 63 mins
    • Learn how Threat Hunting delivers high certainty in detecting compromise

      Many organizations have information security protections in place that still fail to answer with high a level of certainty, "Have we already been compromised?" A cyber threat such as malware or even a large scale Advanced Persistent Threat could be hiding in areas of your network and go unnoticed by the untrained eye.

      That’s where Threat Hunting comes in.

      During this interactive webinar, Justin Turner, Director of the Targeted Threat Hunting & Response Team, will share what Hunting is, what it should tell you, and cut through industry noise. He will share experiences and insights from actual hunting engagements and will also provide recommendations for security leaders and practitioners on how to identify indicators of attacker presence leveraging threat intelligence for context to determine how to engage and resist the adversary.

      In addition, you will:
      - Learn what Targeted Threat Hunting must do for you
      - Hear real-world examples of previous incidents and how targeted threat hunting was used to remove entrenched adversaries
      - Get recommendations on strategies and tactics to aid you in your hunting

      Read more >
    • Prevention Week Pt 3: Use Automation to Prevent Evasive Threats and C2 Traffic
      Prevention Week Pt 3: Use Automation to Prevent Evasive Threats and C2 Traffic Scott Simkin, Sr. Manager Threat Intelligence at Palo Alto Networks Upcoming: Mar 15 2017 5:00 pm UTC 60 mins
    • Turn Raw Threat Intelligence Into Context and Action

      Attackers don’t stand still; your defenses shouldn’t either. See how multi-method threat prevention can be used to detect and prevent the most evasive threats and command-and-control traffic, and open up any source of threat intelligence to be used for automated prevention. These capabilities drive up the cost of successful data breaches for attackers, making their efforts too expensive to consider.

      You will learn more about:

      •How an evasion-resistant analysis environment defeats whole classes of VM evasion techniques.
      •Threat prevention capabilities that automate the blocking of command-and-control traffic in a way that previously required teams of signature writers.
      •How to enable security teams to gain leverage from any source of threat intelligence and drive automated prevention.

      Read more >
    • Outcome-Driven Threat Intelligence with AutoFocus
      Outcome-Driven Threat Intelligence with AutoFocus Palo Alto Networks: Ryan Olson, Intelligence Director of Unit 42 & Scott Simkin, Sr. Group Manager, Threat Intelligence Cloud Recorded: Dec 16 2016 6:00 pm UTC 58 mins
    • More data doesn’t always equal better prevention. It often feels like there is an arms race underway, with security operations and response professionals in the sights of an escalating amount of alerts and threat data, which can sometimes do more harm than good. You need a new outcome-driven approach to threat intelligence, with a focus on prevention and operationalizing action, versus simply adding more data.

      Unit 42, the Palo Alto Networks® threat research team, is putting this new mindset into practice, discovering new malware families, campaigns and adversaries with the AutoFocus threat intelligence service. Join Ryan Olson, Intelligence Director for Unit 42, to see how his team uses AutoFocus to help automate research, hunting and security operations workflows. You will see real applications of threat intelligence, by one of the best teams in the industry, including:

      --- How AutoFocus can help you scale detection and prevention efforts without additional, specialized security staff.
      --- How to automate security analysis and response workflows with AutoFocus.
      --- Real world use-cases from Unit 42’s research efforts.

      Read more >
    • Prioritizing Cyber Threats With Real-Time Threat Intelligence
      Prioritizing Cyber Threats With Real-Time Threat Intelligence Greg Reith, Threat Intelligence Analyst, T-Mobile Recorded: Nov 17 2016 7:00 pm UTC 63 mins
    • Creating a threat intelligence strategy is essential for a company to identify and prioritize threats effectively. Curating the necessary relevant data for this strategy, however, can be incredibly time consuming and resource intensive.

      In this webinar, Greg Reith, Threat Intelligence Analyst at T-Mobile, will discuss how to use real-time threat intelligence from Recorded Future to create a forward-looking strategy, including:

      • Identifying and analyzing hard-to-find threat data from the entire web including content in multiple languages.
      • Gaining relevant intelligence effectively from large volumes of threat data with smart automation, alerts, and queries.
      • Discovering trends and patterns that are useful in developing a forward-looking shift in strategy from multiple perspectives.

      Find out how you can reduce the time to collect the necessary information for building an effective threat intelligence strategy by over 400 percent.

      Read more >
    • 2016 Malware Year in Review: Tricks, Threats, and Triumphs
      2016 Malware Year in Review: Tricks, Threats, and Triumphs Brendan Griffin, Threat Intelligence Manager at PhishMe Upcoming: Mar 14 2017 8:00 pm UTC 60 mins
    • In 2016, the PhishMe Intelligence team saw over 2,500 active threat reports, the widespread implementation of anti-analysis methods, a notable evolution in techniques and tools to deliver malware, and the growing threat of encryption ransomware.

      Now more than ever, it has become more important to detect and interdict malware during the delivery phase. What can you do to defend your environment? What will threat actors do to step things up in 2017?

      Join Brendan Griffin, to learn about:

      •The evolution of malware and encrypted ransomware
      •2016’s most prevalent threats
      •Identifying the latest malware delivery tools and techniques
      •Developing a modern defense strategy and empowering your users
      •What to look out for in 2017

      Read more >
    • How St. Jude Medical Uses Threat Intelligence in Its SOC
      How St. Jude Medical Uses Threat Intelligence in Its SOC Russ Staiger, Lead Analyst, Cyber Threat Action Center, St. Jude Medical Recorded: Jun 7 2016 6:00 pm UTC 54 mins
    • St. Jude Medical is a leading global medical device manufacturer and is dedicated to transforming the treatment of some of the world’s most expensive epidemic diseases.

      In this webinar, Russ Staiger, lead analyst of the Cyber Threat Action Center (CTAC) at St. Jude Medical, will explain how the company combines real-time threat intelligence from Recorded Future with its Splunk SIEM to more effectively fulfill CTAC’s mission to identify, protect against, respond to, and enhance resiliency against cyber security threats.

      Register now to learn:

      • How St. Jude Medical uses threat intelligence to monitor for emerging threats against the healthcare industry.
      • How St. Jude Medical makes informed verdicts on events in its SIEM using context gained from Recorded Future threat intelligence.
      • How Recorded Future helps St. Jude Medical detect more complex events and potential incidents that could have possibly been missed without enrichment.
      • How the team fosters secure collaboration between the SOC, other security teams, and the business.

      Featured Speaker Bio:

      Russ Staiger is the Cyber Threat Action Center lead for information security teams concerned with investigation of APT (advanced persistent threats), malware remediation, and SIEM-based security strategies. Russ’s expertise also includes defensive systems data analysis, operational metrics (ITSM), in-line IDS-IPS implementation and action planning, security training and education, incident response, and team operations SLA enforcement.

      Read more >
    • Europe: How St. Jude Medical Uses Threat Intelligence in Its SOC
      Europe: How St. Jude Medical Uses Threat Intelligence in Its SOC Russ Staiger, Lead Analyst, Cyber Threat Action Center, St. Jude Medical Recorded: Jun 7 2016 1:00 pm UTC 51 mins
    • St. Jude Medical is a leading global medical device manufacturer and is dedicated to transforming the treatment of some of the world’s most expensive epidemic diseases.

      In this webinar, Russ Staiger, lead analyst of the Cyber Threat Action Center (CTAC) at St. Jude Medical, will explain how the company combines real-time threat intelligence from Recorded Future with its Splunk SIEM to more effectively fulfill CTAC’s mission to identify, protect against, respond to, and enhance resiliency against cyber security threats.

      Register now to learn:

      • How St. Jude Medical uses threat intelligence to monitor for emerging threats against the healthcare industry.
      • How St. Jude Medical makes informed verdicts on events in its SIEM using context gained from Recorded Future threat intelligence.
      • How Recorded Future helps St. Jude Medical detect more complex events and potential incidents that could have possibly been missed without enrichment.
      • How the team fosters secure collaboration between the SOC, other security teams, and the business.

      Featured Speaker Bio:

      Russ Staiger is the Cyber Threat Action Center lead for information security teams concerned with investigation of APT (advanced persistent threats), malware remediation, and SIEM-based security strategies. Russ’s expertise also includes defensive systems data analysis, operational metrics (ITSM), in-line IDS-IPS implementation and action planning, security training and education, incident response, and team operations SLA enforcement.

      Read more >
    • 2017 Threat Landscape: Increased Sophistication, or More of the Same?
      2017 Threat Landscape: Increased Sophistication, or More of the Same? SecureWorks Counter Threat Unit Research Team Recorded: Dec 7 2016 2:00 pm UTC 45 mins
    • As 2016 draws to a close, security professionals worldwide will be left pondering another year of publicised breaches, vulnerabilities and threats. So what are the key takeaways and how can global security events from the past 12 months inform your plans for 2017?

      We’ve asked a panel of experts from the SecureWorks Counter Threat Unit (CTU), our highly-trained team of experienced security researchers, to paint a picture of threat actors and their tradecraft across the globe by sharing their views on 2016’s most significant security events. The panel will end the session by providing actionable insights and recommendations for organisations to factor into their security strategy in 2017.

      Join this exclusive webcast to gain CTU insight on the following topics and more:

      - eCrime trends including the rise of ransomware, business email compromise and the Mirai IoT botnet activity
      - Nation state sponsored threats and whether organisations are set up to defend against them
      - How organisations can use threat intelligence gathered in 2016 to improve security

      Read more >
    • The Real World Value of Cyber Threat Intelligence
      The Real World Value of Cyber Threat Intelligence Laura Galante, Dir, Threat Intel Production/Analysis, FireEye. Jayce Nichols, Dir., Threat Intel Research, FireEye. Recorded: Nov 15 2016 7:00 pm UTC 57 mins
    • Modern cyber attackers are sophisticated, well-funded, well-organized and use highly-targeted techniques that leave technology-only security strategies exposed. To identify and stop attackers, organizations need to understand how they think, how they work, and what they want. Why? Because today, the most serious data breaches and disruptions result from well-planned, complex attacks that target specific companies or industries. Bolster your defenses with a proactive, forward-looking approach to security. Join our live webcast, Tuesday, November 15 at 2:00pm ET to learn:

      -What cyber threat intelligence truly is and the benefits of being intelligence-led.
      -How to tailor threat intelligence to your unique security mission.
      -How FireEye iSIGHT’s 160 security experts around the globe mobilize to transform raw information into finished actionable intelligence.

      Hunt advanced, tiered attacks lying in wait within your systems. Prioritize the most relevant threats amidst 1,000s of daily security alerts. Join us live and discover how savvy organizations operationalize intelligence up and down the organization to preempt attack, inform strategy and more.

      Register today.

      Read more >
    • Operationalizing Threat Intelligence
      Operationalizing Threat Intelligence Jeff Berg, Sr. Manager, Cyber Threat Intelligence Services, Mandiant Recorded: Nov 17 2016 7:00 pm UTC 51 mins
    • In a rapidly evolving threat landscape with the realities of limited security program resources, it can be difficult for organizations to know what the most critical risks and exposures are, presently and looking forward. While most organizations recognize the importance of cyber threat intelligence (CTI), Mandiant consulting frequently finds organizations have limited capabilities to operationalize CTI throughout all aspects of their security program.

      A recent online poll conducted by FireEye about the operational use of CTI found that 84% of responders use threat intelligence for business decision-making. 67% use it to make decisions about resources and security tools while 17% said they use it for risk assessment on new business initiatives. 17% don’t use it at all.

      In this webinar, Jeff Berg, Senior Manager of Mandiant’s Cyber Threat Intelligence Services, discusses the role of intelligence in cyber security programs and steps organizations can take to transform security operations to be intelligence-led, so they can continuously adapt to the threat landscape, and ultimately infuse intelligence capabilities across the entire organization for informed decision making.

      Read more >
    • Weaponize Your Threat Intelligence for Breach Prevention
      Weaponize Your Threat Intelligence for Breach Prevention Scott Simkin, Sr. Threat Intelligence Manager at Palo Alto Networks Recorded: Apr 21 2016 6:00 pm UTC 55 mins
    • Today the economics of cyber attacks favor the adversary. With the explosion of access to automated and highly effective attack techniques, now everyone has the ability to become an “advanced attacker,” a status once reserved for the most sophisticated advanced persistent actors. With this evolution, the cost of launching successful attacks has plummeted, putting more pressure on Cybersecurity professionals to manually defend against an increasing volume and sophistication of attacks.

      Organizations require new ways to “weaponize” the threat intelligence they have to prevent attacks before they can cause damage, without adding additional security resources.

      We will cover:
      •How to know your network better than an adversary.
      •The value of delivering real-time prevention for targeted attacks.
      •How to architect your defenses for prevention to save time and resources traditionally spent on remediation.

      Read more >
    • Intel & Threat Analysis – The Defensive Duo
      Intel & Threat Analysis – The Defensive Duo Jens Monrad, Global Threat Intelligence Liaison, FireEye; Al Maslowski-Yerges Manager, Americas Systems Engineering Recorded: Nov 4 2016 11:30 am UTC 41 mins
    • The ongoing battle with cybercrime is asymmetric. You’ve invested millions in protection technology but unknown attackers still find a way in. So how do you stay ahead of the curve?

      "The core problem is that most cyber security tools do not make a distinction between everyday malware and advanced targeted attacks. If security tools cannot tell the difference, security teams have no way of prioritizing the alerts that matter the most."

      Join Jens Monrad, Global Threat Intelligence Liaison from FireEye in this webinar that will discuss:

      •How to ensure you are responding to the alert that matters

      •Benefits of Alerts with threat Intelligence

      •Using threat intelligence to think like your attacker

      •How to apply threat intelligence, expert rules and advanced security data analytics in order to shut down threats before they cause damage

      •How security teams can prioritize and optimize their response efforts.

      Read more >
    • 2017 Cybersecurity Threat Insights for Leaders
      2017 Cybersecurity Threat Insights for Leaders Alex Tilley, Counter Threat e-crime lead and Daniel Eden, Senior Incident Responder, SecureWorks Upcoming: Mar 8 2017 11:00 pm UTC 60 mins
    • Partnering to Fight Cybercrime

      In our “2017 Cybersecurity Threat Insights Report for Leaders ” report, we shared several key findings and observations from our client engagements and about the security industry. This webcast will cover our findings and observations but will also provide you with clear direction on where you need to focus your resources to evoke positive action in your security program.

      During this webcast our Counter Threat Unit™ e-crime lead, Alex Tilley, and Senior Incident Responder Daniel Eden, will give their perspective, observations and guidance through responses to a series of questions led by a moderator.

      You Will Learn About:

      - Our observations from our engagements and findings
      - How you need to rethink core security processes and operations
      - Whether the current nature and behaviors of the threat are evolving or staying constant
      - What the common attack vectors are and how to protect your organization against the fundamentals of cyber-attacks
      - How to focus your resources from a tactical and strategic perspective

      Read more >
    • Are Advanced Persistent Threats Hiding in Your Network?
      Are Advanced Persistent Threats Hiding in Your Network? Justin Turner, Delivery Team Manager, Targeted Threat Hunting & Response Recorded: Sep 14 2015 6:00 pm UTC 59 mins
    • How Targeted Threat Hunting Inspects Your Network for Cyber Attacker Presence.

      Many organizations have some form of information security protection in place but also wonder "Have I already been compromised?" A cyber threat such as malware or even a large scale Advanced Persistent Threat could be hiding in file systems and several other areas of your network that may go unnoticed by the untrained eye. A deep inspection of your networks is an excellent way to identify the presence of compromises and entrenched threat actors operating in your environment.

      During this interactive webinar, Justin Turner, Delivery Team Manager from the Targeted Threat Hunting & Response Team, will share why it is critical to identify targeted threat indicators of attacker presence and leverage threat intelligence to provide context to determine how to engage and resist the adversary.

      In addition you will:

      - Learn what Targeted Threat Hunting is and why it is important.
      - Hear real-world examples of previous incidents and how targeted threat hunting was used to remove entrenched adversaries.
      - Receive a standard list of questions that should be answered during an engagement.

      Read more >