Hi [[ session.user.profile.firstName ]]

Security Fundamentals: Vulnerability Management 101

School may be out for the summer, but we’re here to bring you an interactive educational experience that covers the basics of vulnerability management in the modern environment. For the second session of our Security Fundamentals series, we’ve gathered a panel of experts to share their knowledge and experiences with vuln management and lessons learned.

In this interactive webcast, they’ll touch on topics including:

1. The importance of a vulnerability management program
2. Best practices for improving your VM program
4. Best practices for moving to the cloud

Raise your hand, earn some (honorary) extra credit, and prepare to learn more about what vulnerability management can bring to your organization in the year ahead.
Recorded Sep 3 2019 42 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Tori Sitcawich, Product Marketing Manager
Presentation preview: Security Fundamentals: Vulnerability Management 101

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Security Fundamentals: Threat Detection & Response 101 Recorded: Nov 13 2019 33 mins
    Meg Donlon, Hannah Coakley, and Wade Woolwine
    As more organizations start migrating to the cloud, security teams are discovering that while security best practices remain the same, cloud environments present some unique challenges that demand new approaches. To successfully manage risk in cloud environments, today’s security teams need to be able to quickly detect and remediate threats. If your organization is already fully utilizing the cloud, or just beginning the migration, this webcast will help to make sure you’re set up for success.

    In this webcast, the Rapid7 team will discuss key considerations for threat detection and response in modern environments that span on-premises and cloud infrastructures. Discussion topics will include:

    1. What’s the same—and what’s different—about on-premises and cloud threat detection?
    2. How can frameworks, like MITRE ATT&CK, help teams decide where to start?
    3. Where do traditional threat detection and response programs fail in the cloud?

    Register now to save your spot!
  • [PANEL] Threatscape 2020: Strategies for Better Security Recorded: Nov 12 2019 59 mins
    Jo Peterson (Clarify360) | Jessica Bryar (Masergy) | Wade Woolwine (Rapid7) | Jeff Barto (DigiCert)
    Join this keynote panel with security experts as they discuss the biggest threats organizations are facing and their strategies for better security in 2020:
    - The threat landscape in 2020
    - Key priorities for CISOs
    - Best practices for improving security

    Speakers:
    - Jo Peterson, VP Cloud Services at Clarify360
    - Jessica Bryar, Global Account Manager at Masergy
    - Wade Woolwine, Director, Managed Services, Rapid7
    - Jeff Barto, Trust Strategist, DigiCert
  • The 2020 Threatscape: What to Look for and How to Prepare Recorded: Nov 11 2019 59 mins
    Rapid7 Threat Intelligence Experts
    The threat landscape is a moving, shifting form that will look different to different organizations—it all depends on where you are standing. Wondering what the top threats are for your organization in 2020?

    Join Rapid7 experts for a discussion of the top threats our team is tracking for the new year and how your organization can prepare to address them. Through extensive research and the engagements of our managed detection and response team, Rapid7 threat intelligence experts will share their research to help you protect your organization in the new year. 



    Some of the topics our experts will cover include: 



    1. The most prevalent threats we are tracking for 2020
    2. Top cybersecurity incidents of 2019 and how we expect those to impact 2020
    3. Key takeaways to help you put our research into practice at your organization
  • Vulnerability Risk Management: How to Collaborate to Drive Remediation Recorded: Nov 5 2019 53 mins
    Justin Buchanan, Senior Solutions Manager, Rapid7 | Bulut Ersavas, Senior Manager, Product Management, Rapid7
    When it comes to Security and IT/DevOps teams partnering to remediate vulnerabilities, there are numerous challenges that can make this partnership quite burdensome. From differing priorities and work spaces to misaligned terminology, Security and IT/DevOps teams oftentimes struggle to form common ground. Learn about tactical best practices to overcome common challenges, as well as how Rapid7 InsightVM’s capabilities foster collaboration between these teams to drive remediation.

    During this webcast, you’ll learn about:

    1. What your peers view as the top challenges that exist between Security and IT/DevOps teams
    2. Actionable tactics to implement within your own Security and IT/DevOps teams to improve working relationships
    3. Specific InsightVM capabilities that help these teams work better together to drive remediation efforts
  • How to Build Threat Intelligence into an Incident Detection & Response Strategy Recorded: Oct 29 2019 49 mins
    Kwan Lin, Senior Data Scientist, Rapid7; Eric Sun, Senior Solutions Manager, Rapid7
    Leveraging threat intelligence is a critical component of breach prevention, detection, and response. However, not all threat intelligence is created equal and it’s important to understand the different sources that are available and how to use them effectively to enhance your defenses and detection.

    In this webcast, Rapid7 experts will share an overview of the importance of threat intelligence, what key threats Rapid7 experts are tracking, and how this information can improve your IDR program.

    Some of the topics our team will cover include:

    1. The most prevalent threats facing modern environments
    2. Top cybersecurity incidents of 2019 thus far and how we anticipate those to impact the rest of the year
    3. Key takeaways to help you put our team’s threat intelligence research into practice at your organization
    4. How Rapid7’s cloud SIEM, InsightIDR, allows teams to incorporate threat intelligence into their investigations
  • Driving Increased Productivity with Your Vulnerability Management Program Recorded: Oct 22 2019 45 mins
    Tori Sitcawich, Product Marketing Manager, Rapid7
    In today’s world, security teams are faced with challenges that can oftentimes hinder the productivity of their vulnerability management programs. These challenges include working with operations teams, demonstrating ROI to leadership, and finding ways to accelerate remediation. In this session with Rapid7, learn about best practices to overcome these challenges and improve collaboration, communication, and overall productivity.

    We’ll cover:
    1. How to break down organizational silos
    2. How to track meaningful progress and build effective reports for leadership
    3. How to effectively make automation a part of your day-to-day remediation workflow
  • Shoot for the Cloud...? Getting Started with Security in AWS. Recorded: Oct 8 2019 35 mins
    Josh Frantz, Lead Security Consultant, Rapid7
    Is your organization moving to Amazon Web Services? Or are you a seasoned AWS pro, but need to know where to start to secure it?

    It’s a fact—Cloud environments aren’t going away anytime soon. Cloud adoption is expected to grow at 12.4% annually until 2025. When you need to get started in a new cloud environment, or secure an existing one, vulnerability management is the place to start.

    Join Josh Frantz to learn the fundamentals of setting up vulnerability management in your cloud environment and common pitfalls to watch out for. You may even pick up a few good wise cracks along the way.

    In this webinar we will cover:

    1. The future of the cloud infrastructure landscape
    2. Some common misconceptions. Did you know AWS doesn’t secure your environment for you?
    3. Vulnerability Management best practices
    4. How Rapid7 and InsightVM can help
  • The Foundations of Strong Cloud Security Recorded: Sep 24 2019 48 mins
    Rapid7 & AWS Cloud Experts
    As more organizations start migrating to the cloud, more security teams are discovering that while security best practices remain the same, cloud environments present some unique challenges that demand new approaches.

    For the last webcast in our Security Fundamentals series, we’re here to help get you started on the right foot with securing your cloud infrastructure. In this webcast, we’ll discuss:

    1. How to make sure you have visibility into your full cloud environment, even if it's spread across hundreds of different accounts.
    2. Why it’s vital for your developers to embrace security and how you can help lead that change in mindset.
    3. Techniques that allow your developers to move fast yet ensure the assets they create are still secure.
    4. The most common pitfalls of securing cloud environments and how you can avoid them.
  • Security Fundamentals: Application Security 101 Recorded: Sep 17 2019 57 mins
    Bria Grangard, Product Marketing Manager, Rapid7
    When it comes to application security, it’s about enabling builders and defenders to jointly balance speed to production with acceptable risk. By prioritizing security earlier in the development cycle, potential downstream consequences of exposing application vulnerabilities to the wild can be avoided.

    Our panel will discuss the effective methods of integrating security into the life of an application including:

    1. Bridging the gap between security and development
    2. Security tools within the SDLC and why and when to use them
    3. Embedding security with existing tools and workflows
    4. Why DAST
    5. Ongoing monitoring and protection
  • Security Fundamentals: Orchestration and Automation 101 Recorded: Sep 10 2019 53 mins
    Lauren Taylor, Rapid7
    Summer vacation may be a thing of the past for today’s security and IT professionals, but we think these hazy, sunny days are a great time to channel your inner student and reflect on what you’ve learned, summer school style. For the first session of our Security FUNdamentals series, we’ve gathered a panel of security orchestration and automation (SOAR) experts for SOAR 101.

    In this interactive webcast, they’ll touch on topics including:

    1. Best practices for getting started with automation and orchestration
    2. Common use cases you can automate
    3. What to look for in a SOAR solution
    4. How to measure ROI

    Raise your hand, earn some (honorary) extra credit, and prepare to learn more about what security orchestration and automation can bring to your organization in the year ahead.
  • Security Fundamentals: Vulnerability Management 101 Recorded: Sep 3 2019 42 mins
    Tori Sitcawich, Product Marketing Manager
    School may be out for the summer, but we’re here to bring you an interactive educational experience that covers the basics of vulnerability management in the modern environment. For the second session of our Security Fundamentals series, we’ve gathered a panel of experts to share their knowledge and experiences with vuln management and lessons learned.

    In this interactive webcast, they’ll touch on topics including:

    1. The importance of a vulnerability management program
    2. Best practices for improving your VM program
    4. Best practices for moving to the cloud

    Raise your hand, earn some (honorary) extra credit, and prepare to learn more about what vulnerability management can bring to your organization in the year ahead.
  • Under the Hoodie: Lessons from a Season of Penetration Testing Recorded: Aug 27 2019 62 mins
    Tod Beardsley, Research Director, Rapid7 & Kwan Lin, Senior Data Scientist, Rapid7
    In 2017, Rapid7 launched the “Under the Hoodie” project to shed light on the “dark art” of pen testing by revealing the process, techniques, and tools that go into it, as well as the insights that can be extracted. The 2019 Under the Hoodie report continues to provide visibility into this often occult niche of information security. Based on the results of about 180 engagements conducted in the most recent season of penetration testing, as well as real-world anecdotes from our engineers and investigators, our research explores recent trends and patterns derived from penetration testing.

    Join Rapid7 experts for an engaging discussion where you will learn:

    1. The report’s most significant findings, including the most commonly exploited vulnerability classes and network misconfigurations
    2. The most effective methods our team has found to compromise high-value credentials
    3. How you can use the data in the report to effectively detect and prevent breaches on your own network
  • Gaining Complete Visibility of Your Environment with Attack Surface Monitoring Recorded: Aug 21 2019 56 mins
    Tori Sitcawich, Product Marketing Manager; Jon Hart, Principal Security Researcher
    Join Rapid7 experts for an in-depth look into Attack Surface Monitoring with Rapid7s Project Sonar research and industry reports. Learn how data from these sources can be leveraged in Rapid7s industry-leading vulnerability management solution, InsightVM, to provide complete visibility into your environment.

    During this webinar, youll learn about:

    1. The importance of having complete visibility of both your organizations known and unknown assets
    2. Rapid7s unique research project, Project Sonar, that regularly catalogs the public internet
    3. Industry reports released by Rapid7 based on data from Project Sonar, among other sources
    4. How data from Project Sonar can be leveraged within Rapid7s industry-leading vulnerability management tool, InsightVM
  • Driving Increased Productivity with Your Vulnerability Management Program Recorded: Aug 20 2019 46 mins
    Tori Sitcawich, Product Marketing Manager, Rapid7
    In today’s world, security teams are faced with challenges that can oftentimes hinder the productivity of their vulnerability management programs. These challenges include working with operations teams, demonstrating ROI to leadership, and finding ways to accelerate remediation. In this session with Rapid7, learn about best practices to overcome these challenges and improve collaboration, communication, and overall productivity.

    We’ll cover:
    1. How to break down organizational silos
    2. How to track meaningful progress and build effective reports for leadership
    3. How to effectively make automation a part of your day-to-day remediation workflow
  • [PANEL] Beyond Perimeter-Based Security Recorded: Aug 19 2019 48 mins
    Jo Peterson (Clarify360) | Tina Gravel (Cyxtera) | Adrian Taylor (ITC) | Josh Frantz (Rapid7)
    For years organisations have relied on perimeter-based security strategies to protect and secure their networks. As the workplace becomes increasingly fluid, it is clear that relying solely on perimeter-based security is no longer suitable.

    Join this exclusive panel of industry experts as they discuss:
    • Where traditional perimeter-based security models fall short
    • Notable cyber attack methods and how to protect against them
    • Strategies for improved network security and how to implement them

    Speakers:
    - Jo Peterson, VP Cloud Services, Clarify360 (moderator)
    - Tina Gravel, SVP Global Channels, Cyxtera
    - Adrian Taylor, CTO, ITC Secure
    - Josh Frantz, Lead Security Consultant, Rapid7
  • Breaking Bad: Why Legacy AppSec Tools Can’t Assess Threats in Today's Web Apps Recorded: Jul 23 2019 45 mins
    David Howe, Lead Application Security Specialist, Rapid7
    Modern web applications are rising to the challenge of satisfying user expectations. New versions can be deployed at a moment’s notice, bug fixes can be pushed several times a day, and user behavior can help guide the thought processes behind the next big feature. While cloud hosting can guarantee uptime and automatically scale as demand increases, this shift in application development and delivery has also introduced a whole new category of risk.

    Join Dave Howe, Lead Application Security Specialist, as he lays out the complexity of securing modern web applications and key considerations for organizations wanting to address web application risk exposure. Dave will cover:

    1. The evolution of traditional web applications into the modern ones we build and use today
    2. The hidden vulnerabilities that come with today’s web apps, and why legacy application scanning tools overlook them
    3. How InsightAppSec, Rapid7’s cloud-powered dynamic application security testing (DAST) tool, can address the issues and risk associated with today’s modern web apps.
  • How to Build Threat Intelligence into an Incident Detection & Response Strategy Recorded: Jul 17 2019 50 mins
    Kwan Lin, Senior Data Scientist, Rapid7; Eric Sun, Senior Solutions Manager, Rapid7
    Leveraging threat intelligence is a critical component of breach prevention, detection, and response. However, not all threat intelligence is created equal and it’s important to understand the different sources that are available and how to use them effectively to enhance your defenses and detection.

    In this webcast, Rapid7 experts will share an overview of the importance of threat intelligence, what key threats Rapid7 experts are tracking, and how this information can improve your IDR program.

    Some of the topics our team will cover include:

    1. The most prevalent threats facing modern environments
    2. Top cybersecurity incidents of 2019 thus far and how we anticipate those to impact the rest of the year
    3. Key takeaways to help you put our team’s threat intelligence research into practice at your organization
    4. How Rapid7’s cloud SIEM, InsightIDR, allows teams to incorporate threat intelligence into their investigations
  • Red vs. Blue: Using Attack Simulation to Detect Stealthy Techniques Recorded: Jul 16 2019 26 mins
    Garrett Enochs, Rapid7 & Julius Callahan, Rapid7
    Nearly every security product on the market today will help you “detect threats”. But, how do you know if your tools are working well, and where to invest next?

    We believe the answer lies at the intersection of proactive threat modeling and consistent attack simulation. If you can model and predict the types of attacks you’ll face (e.g. phishing, insider threat, DDOS), then your monitoring efforts can focus on the key techniques that power the attack (e.g. Powershell commands are used by attackers to evade AV & whitelisting defenses).

    If you’d like a refresher on the top threats facing industries today, and how penetration testers and attackers alike move through a network, this special webcast is for you. Come see:

    1. The core techniques that penetration testers & attackers use alike
    2. How blue teams are monitoring for these stealthy behaviors
    3. Why teams are turning to cloud-scale security analytics

    This webcast will include footage of Metasploit, common attacker techniques, and our cloud SIEM, InsightIDR.
  • [PANEL] Prevailing Trends in Cyber Crime Recorded: Jul 15 2019 45 mins
    Robin Smith (Rosint Labs), Bob Rudis (Rapid7), Monique Becenti (SiteLock), Trevor Pott (Juniper)
    The average cost of a malware attack on a company is $2.4 million, according to Accenture. Organizations need to ensure they are following cybersecurity best practices in order to mitigate risk.

    Join this interactive Q&A panel to learn more about:
    • What’s new on the threatscape
    • The latest hacking tools, strategies and methods and how to protect against them
    • How to implement proactive strategies rather than reactive
    • Recommendations for improving security and steps to take today

    Speakers:
    Robin Smith, Presales Consultant, Gospel Technology
    Bob Rudis, Chief Data Scientist, Rapid7
    Monique Becenti, Product & Channel Marketing Specialist, SiteLock
    Trevor Pott, Product Marketing Director, Juniper Networks
  • Cloud Security Isn’t Just Security on Someone Else’s Computer Recorded: Jun 11 2019 56 mins
    Wade Woolwine, Director of Technology for Rapid7’s Managed Services
    How many times have you heard the phrase “the cloud is just someone else’s computer”? While this is mostly true, this kind of thinking sets a dangerous mindset when it comes to securing your assets in cloud-based services.

    Join Wade Woolwine, Director of Technology for Rapid7’s Managed Services as he discusses various threat prevention, detection, and response strategies for Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). At the conclusion of this webinar, you’ll be equipped with use cases including:

    1. Monitoring strategies for Microsoft O365
    2. Secure SDLC strategies for web applications and APIs in AWS
    3. Defense in depth and least privilege strategies for hosted infrastructure
Powering the Practice of SecOps
Rapid7 (NASDAQ:RPD) powers the practice of SecOps by delivering shared visibility, analytics, and automation that unites security, IT, and DevOps teams. The Rapid7 Insight platform empowers these teams to jointly manage and reduce risk, detect and contain attackers, and analyze and optimize operations. Rapid7 technology, services, and research drive vulnerability management, application security, incident detection and response, and log management for more than 7,000 organizations across more than 120 countries, including 52% of the Fortune 100.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Security Fundamentals: Vulnerability Management 101
  • Live at: Sep 3 2019 6:00 pm
  • Presented by: Tori Sitcawich, Product Marketing Manager
  • From:
Your email has been sent.
or close