Hi [[ session.user.profile.firstName ]]

[PANEL] Beyond Perimeter-Based Security

For years organisations have relied on perimeter-based security strategies to protect and secure their networks. As the workplace becomes increasingly fluid, it is clear that relying solely on perimeter-based security is no longer suitable.

Join this exclusive panel of industry experts as they discuss:
• Where traditional perimeter-based security models fall short
• Notable cyber attack methods and how to protect against them
• Strategies for improved network security and how to implement them

- Jo Peterson, VP Cloud Services, Clarify360 (moderator)
- Tina Gravel, SVP Global Channels, Cyxtera
- Adrian Taylor, CTO, ITC Secure
- Josh Frantz, Lead Security Consultant, Rapid7
Recorded Aug 19 2019 48 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jo Peterson (Clarify360) | Tina Gravel (Cyxtera) | Adrian Taylor (ITC) | Josh Frantz (Rapid7)
Presentation preview: [PANEL] Beyond Perimeter-Based Security

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The Foundations of Strong Cloud Security Sep 24 2019 6:00 pm UTC 48 mins
    Rapid7 & AWS Cloud Experts
    As more organizations start migrating to the cloud, more security teams are discovering that while security best practices remain the same, cloud environments present some unique challenges that demand new approaches.

    For the last webcast in our Security Fundamentals series, we’re here to help get you started on the right foot with securing your cloud infrastructure. In this webcast, we’ll discuss:

    1. How to make sure you have visibility into your full cloud environment, even if it's spread across hundreds of different accounts.
    2. Why it’s vital for your developers to embrace security and how you can help lead that change in mindset.
    3. Techniques that allow your developers to move fast yet ensure the assets they create are still secure.
    4. The most common pitfalls of securing cloud environments and how you can avoid them.
  • Security Fundamentals: Application Security 101 Sep 17 2019 6:00 pm UTC 57 mins
    Bria Grangard, Product Marketing Manager, Rapid7
    When it comes to application security, it’s about enabling builders and defenders to jointly balance speed to production with acceptable risk. By prioritizing security earlier in the development cycle, potential downstream consequences of exposing application vulnerabilities to the wild can be avoided.

    Our panel will discuss the effective methods of integrating security into the life of an application including:

    1. Bridging the gap between security and development
    2. Security tools within the SDLC and why and when to use them
    3. Embedding security with existing tools and workflows
    4. Why DAST
    5. Ongoing monitoring and protection
  • Security Fundamentals: Orchestration and Automation 101 Recorded: Sep 10 2019 53 mins
    Lauren Taylor, Rapid7
    Summer vacation may be a thing of the past for today’s security and IT professionals, but we think these hazy, sunny days are a great time to channel your inner student and reflect on what you’ve learned, summer school style. For the first session of our Security FUNdamentals series, we’ve gathered a panel of security orchestration and automation (SOAR) experts for SOAR 101.

    In this interactive webcast, they’ll touch on topics including:

    1. Best practices for getting started with automation and orchestration
    2. Common use cases you can automate
    3. What to look for in a SOAR solution
    4. How to measure ROI

    Raise your hand, earn some (honorary) extra credit, and prepare to learn more about what security orchestration and automation can bring to your organization in the year ahead.
  • Security Fundamentals: Vulnerability Management 101 Recorded: Sep 3 2019 42 mins
    Tori Sitcawich, Product Marketing Manager
    School may be out for the summer, but we’re here to bring you an interactive educational experience that covers the basics of vulnerability management in the modern environment. For the second session of our Security Fundamentals series, we’ve gathered a panel of experts to share their knowledge and experiences with vuln management and lessons learned.

    In this interactive webcast, they’ll touch on topics including:

    1. The importance of a vulnerability management program
    2. Best practices for improving your VM program
    4. Best practices for moving to the cloud

    Raise your hand, earn some (honorary) extra credit, and prepare to learn more about what vulnerability management can bring to your organization in the year ahead.
  • Under the Hoodie: Lessons from a Season of Penetration Testing Recorded: Aug 27 2019 62 mins
    Tod Beardsley, Research Director, Rapid7 & Kwan Lin, Senior Data Scientist, Rapid7
    In 2017, Rapid7 launched the “Under the Hoodie” project to shed light on the “dark art” of pen testing by revealing the process, techniques, and tools that go into it, as well as the insights that can be extracted. The 2019 Under the Hoodie report continues to provide visibility into this often occult niche of information security. Based on the results of about 180 engagements conducted in the most recent season of penetration testing, as well as real-world anecdotes from our engineers and investigators, our research explores recent trends and patterns derived from penetration testing.

    Join Rapid7 experts for an engaging discussion where you will learn:

    1. The report’s most significant findings, including the most commonly exploited vulnerability classes and network misconfigurations
    2. The most effective methods our team has found to compromise high-value credentials
    3. How you can use the data in the report to effectively detect and prevent breaches on your own network
  • Gaining Complete Visibility of Your Environment with Attack Surface Monitoring Recorded: Aug 21 2019 56 mins
    Tori Sitcawich, Product Marketing Manager; Jon Hart, Principal Security Researcher
    Join Rapid7 experts for an in-depth look into Attack Surface Monitoring with Rapid7s Project Sonar research and industry reports. Learn how data from these sources can be leveraged in Rapid7s industry-leading vulnerability management solution, InsightVM, to provide complete visibility into your environment.

    During this webinar, youll learn about:

    1. The importance of having complete visibility of both your organizations known and unknown assets
    2. Rapid7s unique research project, Project Sonar, that regularly catalogs the public internet
    3. Industry reports released by Rapid7 based on data from Project Sonar, among other sources
    4. How data from Project Sonar can be leveraged within Rapid7s industry-leading vulnerability management tool, InsightVM
  • Driving Increased Productivity with Your Vulnerability Management Program Recorded: Aug 20 2019 46 mins
    Tori Sitcawich, Product Marketing Manager, Rapid7
    In today’s world, security teams are faced with challenges that can oftentimes hinder the productivity of their vulnerability management programs. These challenges include working with operations teams, demonstrating ROI to leadership, and finding ways to accelerate remediation. In this session with Rapid7, learn about best practices to overcome these challenges and improve collaboration, communication, and overall productivity.

    We’ll cover:
    1. How to break down organizational silos
    2. How to track meaningful progress and build effective reports for leadership
    3. How to effectively make automation a part of your day-to-day remediation workflow
  • [PANEL] Beyond Perimeter-Based Security Recorded: Aug 19 2019 48 mins
    Jo Peterson (Clarify360) | Tina Gravel (Cyxtera) | Adrian Taylor (ITC) | Josh Frantz (Rapid7)
    For years organisations have relied on perimeter-based security strategies to protect and secure their networks. As the workplace becomes increasingly fluid, it is clear that relying solely on perimeter-based security is no longer suitable.

    Join this exclusive panel of industry experts as they discuss:
    • Where traditional perimeter-based security models fall short
    • Notable cyber attack methods and how to protect against them
    • Strategies for improved network security and how to implement them

    - Jo Peterson, VP Cloud Services, Clarify360 (moderator)
    - Tina Gravel, SVP Global Channels, Cyxtera
    - Adrian Taylor, CTO, ITC Secure
    - Josh Frantz, Lead Security Consultant, Rapid7
  • Breaking Bad: Why Legacy AppSec Tools Can’t Assess Threats in Today's Web Apps Recorded: Jul 23 2019 45 mins
    David Howe, Lead Application Security Specialist, Rapid7
    Modern web applications are rising to the challenge of satisfying user expectations. New versions can be deployed at a moment’s notice, bug fixes can be pushed several times a day, and user behavior can help guide the thought processes behind the next big feature. While cloud hosting can guarantee uptime and automatically scale as demand increases, this shift in application development and delivery has also introduced a whole new category of risk.

    Join Dave Howe, Lead Application Security Specialist, as he lays out the complexity of securing modern web applications and key considerations for organizations wanting to address web application risk exposure. Dave will cover:

    1. The evolution of traditional web applications into the modern ones we build and use today
    2. The hidden vulnerabilities that come with today’s web apps, and why legacy application scanning tools overlook them
    3. How InsightAppSec, Rapid7’s cloud-powered dynamic application security testing (DAST) tool, can address the issues and risk associated with today’s modern web apps.
  • How to Build Threat Intelligence into an Incident Detection & Response Strategy Recorded: Jul 17 2019 50 mins
    Kwan Lin, Senior Data Scientist, Rapid7; Eric Sun, Senior Solutions Manager, Rapid7
    Leveraging threat intelligence is a critical component of breach prevention, detection, and response. However, not all threat intelligence is created equal and it’s important to understand the different sources that are available and how to use them effectively to enhance your defenses and detection.

    In this webcast, Rapid7 experts will share an overview of the importance of threat intelligence, what key threats Rapid7 experts are tracking, and how this information can improve your IDR program.

    Some of the topics our team will cover include:

    1. The most prevalent threats facing modern environments
    2. Top cybersecurity incidents of 2019 thus far and how we anticipate those to impact the rest of the year
    3. Key takeaways to help you put our team’s threat intelligence research into practice at your organization
    4. How Rapid7’s cloud SIEM, InsightIDR, allows teams to incorporate threat intelligence into their investigations
  • Red vs. Blue: Using Attack Simulation to Detect Stealthy Techniques Recorded: Jul 16 2019 26 mins
    Garrett Enochs, Rapid7 & Julius Callahan, Rapid7
    Nearly every security product on the market today will help you “detect threats”. But, how do you know if your tools are working well, and where to invest next?

    We believe the answer lies at the intersection of proactive threat modeling and consistent attack simulation. If you can model and predict the types of attacks you’ll face (e.g. phishing, insider threat, DDOS), then your monitoring efforts can focus on the key techniques that power the attack (e.g. Powershell commands are used by attackers to evade AV & whitelisting defenses).

    If you’d like a refresher on the top threats facing industries today, and how penetration testers and attackers alike move through a network, this special webcast is for you. Come see:

    1. The core techniques that penetration testers & attackers use alike
    2. How blue teams are monitoring for these stealthy behaviors
    3. Why teams are turning to cloud-scale security analytics

    This webcast will include footage of Metasploit, common attacker techniques, and our cloud SIEM, InsightIDR.
  • [PANEL] Prevailing Trends in Cyber Crime Recorded: Jul 15 2019 45 mins
    Robin Smith (Rosint Labs), Bob Rudis (Rapid7), Monique Becenti (SiteLock), Trevor Pott (Juniper)
    The average cost of a malware attack on a company is $2.4 million, according to Accenture. Organizations need to ensure they are following cybersecurity best practices in order to mitigate risk.

    Join this interactive Q&A panel to learn more about:
    • What’s new on the threatscape
    • The latest hacking tools, strategies and methods and how to protect against them
    • How to implement proactive strategies rather than reactive
    • Recommendations for improving security and steps to take today

    Robin Smith, Presales Consultant, Gospel Technology
    Bob Rudis, Chief Data Scientist, Rapid7
    Monique Becenti, Product & Channel Marketing Specialist, SiteLock
    Trevor Pott, Product Marketing Director, Juniper Networks
  • Cloud Security Isn’t Just Security on Someone Else’s Computer Recorded: Jun 11 2019 56 mins
    Wade Woolwine, Director of Technology for Rapid7’s Managed Services
    How many times have you heard the phrase “the cloud is just someone else’s computer”? While this is mostly true, this kind of thinking sets a dangerous mindset when it comes to securing your assets in cloud-based services.

    Join Wade Woolwine, Director of Technology for Rapid7’s Managed Services as he discusses various threat prevention, detection, and response strategies for Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). At the conclusion of this webinar, you’ll be equipped with use cases including:

    1. Monitoring strategies for Microsoft O365
    2. Secure SDLC strategies for web applications and APIs in AWS
    3. Defense in depth and least privilege strategies for hosted infrastructure
  • Groundhog Day - Waking Up from the Security Nightmare Recorded: Jun 11 2019 46 mins
    Brian Carey, Manager of Advisory Services, Rapid7
    Do you feel sometimes that you are living the movie Groundhog Day? That each day, week, month or quarter you are waking up to the same cybersecurity problems and challenges? Are you struggling to make progress on key projects or initiatives?

    If this sounds familiar, join Rapid7’s Brian Carey as he discusses leveraging the CIS Top 20 Controls for success. Some of the topics Brian will cover include:

    1. Strategies for understanding your environment
    2. Protecting your environment
    3. Preparing your organization for the challenges that lay ahead
  • Building a Security Strategy to Encompass the Internet of Vulnerable Things Recorded: Jun 10 2019 24 mins
    Deral Heiland, IoT Research Lead, Rapid7
    With IoT expanding into every corner of our world it becomes critical to create a strategy to successfully secure your organization. But, where should you start when creating an IoT strategy for your organization?

    Join Rapid7’s IoT research lead, Deral Heiland, to learn how to protect your organization in today’s IoT-centric world. Some of the topics Deral will discuss include:

    1. IoT guidelines that have been created or are currently under construction by civilian and government standards organizations
    2. What these guidelines mean for citizens and organizations
    3. How these various recommendation can be effectively used to build a robust IoT security strategy for your organization
  • [PANEL] IoT Security Strategy Best Practices Recorded: Jun 10 2019 42 mins
    Deral Heiland, Rapid7 | Sandy Carielli, Entrust Datacard
    As the world becomes increasingly connected, we have become more vulnerable to IoT threats and attacks. Having a comprehensive and strong security strategy in place is vital to organisational success.

    Join this exclusive panel of industry experts as they discuss:
    - IoT Security Maturity Model
    - Trends in cyber-attacks and breaches affecting the IoT
    - How to proactively prevent breaches and attacks
    - New in IoT Security
    - Security Strategy recommendations for CISOs

    Panelist confirmed:
    - Deral Heiland, IoT Research Lead, Rapid7
    - Sandy Carielli, Director of Security Technologies, Entrust Datacard
  • Live Dragons and Incident Response Plans Recorded: Jun 6 2019 54 mins
    Jeremiah Dewey, Senior Director, Global Consulting, Rapid7
    J. R. R. Tolkien may not be the obvious starting point for incident response planning, but he definitely had a good deal to say about the perils of dragons. As his character, Gandalf correctly states in the story of the Hobbit “It does not do to leave a live dragon out of your calculations, if you live near him.” – very wise words indeed. Unless you’re reading this from Middle Earth, we’re pretty sure there aren’t any actual dragons living in your neighborhood, so during this webcast we’ll be focussing on how you can be well prepared in case of analogous ones by having a solid and relevant incident response plan. Join Jeremiah Dewey, seasoned incident response wizard (not his actual job title, although it probably should be), to ensure your organization’s IR plans are analogous-dragon-ready.

    In this session, you’ll hear about:

    1. What your incident response plans should cover (and what they should not)
    2. Who you should involve in the IR planning process
    3. How you can use threat modeling and business impact as your guide
    4. When you should review and update your IR plans
    5. Why you should put your IR plans through their paces outside of a real incident
  • Java Serialization: A Practical Exploitation Guide Recorded: May 28 2019 48 mins
    Tod Beardsley, Research Director at Rapid7 and Jon Hart, Principal Security Researcher at Rapid7
    Java Serialized Objects (JSOs) are a mechanism to allow for data exchange between Java services. Because they also give attackers a stable and reliable vector for gaining remote control of systems running Java applications, they are increasingly responsible for vulnerabilities and public exploits against internet-accessible services. Join Tod and Jon as they discuss the exposure of Java Serialized Objects and the recent uptick in vulnerability research around JSO exploitation, culminating in Rapid7’s most recent research report, Java Serialization: A Practical Exploitation Guide.
  • The CISO's Role in Technology Decisions Recorded: May 23 2019 60 mins
    Scott King, Senior Director of Advisory Services at Rapid7
    Every security leader runs into this challenge at multiple points in their career. How can you support your team and their technology needs, while ensuring alignment with the business and not overreaching to make vendor selections? This issue can easily put security leaders at odds with their teams charged with engineering and operating the technology that manages risk and enables the protection of company data and systems.

    Join Rapid7’s Scott King for an interactive webcast where he will share his personal experiences as the security leader for one of America’s largest energy companies and how he navigated these potentially treacherous waters.
  • Have no Fear, Security Automation is Here Recorded: May 16 2019 25 mins
    Sydney Coffaro, InsightConnect Product Specialist
    Security automation is a hot topic today, as security teams are looking to effectively leverage technology to make their security operations run more smoothly. With automation all the rage, comments like “we should be automating more” are becoming an ongoing theme. Dedicating time and resources to implement automation is often viewed as a huge level of effort, but adding automation to your most time-intensive security processes doesn’t have to be an intimidating undertaking. Did you know that with a small investment, you can realize tremendous ROI and value from automation, faster than ever before?

    In this demo of InsightConnect, you will learn about:
    1. Overview of automation workflow building blocks
    2. Real use cases teams struggle with today, including phishing, SIEM investigation and response, patching, and more
    3. How you can integrate security automation and orchestration into your existing SecOps programs
    4. How automation will improve efficiency across the processes and tools you’re executing manually today
Powering the Practice of SecOps
Rapid7 (NASDAQ:RPD) powers the practice of SecOps by delivering shared visibility, analytics, and automation that unites security, IT, and DevOps teams. The Rapid7 Insight platform empowers these teams to jointly manage and reduce risk, detect and contain attackers, and analyze and optimize operations. Rapid7 technology, services, and research drive vulnerability management, application security, incident detection and response, and log management for more than 7,000 organizations across more than 120 countries, including 52% of the Fortune 100.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: [PANEL] Beyond Perimeter-Based Security
  • Live at: Aug 19 2019 3:00 pm
  • Presented by: Jo Peterson (Clarify360) | Tina Gravel (Cyxtera) | Adrian Taylor (ITC) | Josh Frantz (Rapid7)
  • From:
Your email has been sent.
or close