Hi [[ session.user.profile.firstName ]]

10 Minute Take: How to Accelerate Risk Identification & Threat Remediation

Join Rapid7's Meaghan Donlon, Product Marketing for the Detection & Response practice and Jane Mann Product Management for Vulnerability Management practice as they discuss how the Insight Platform can help identify risks and remediate threats more quickly. They will discuss how Rapid7 aims to combat complexity by investing in areas that help drive customer value. Join us for this quick and insightful 10 minute talk!
Recorded Jun 3 2021 14 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Meaghan Donlon and Jane Man
Presentation preview: 10 Minute Take: How to Accelerate Risk Identification & Threat Remediation

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Building and Maintaining Trust With Your Security Oct 19 2021 4:00 pm UTC 60 mins
    Tod Beardsley, Director of Research at Rapid7
    A Guide to Operational Security in 2021: Episode 9

    When it comes to operational security, a holistic risk-based approach allows you to break down every level of your business to provide first-class security for your organization.

    But what are the essential, core pillars of an effective approach to security? From availability to transparency, this session will discuss best practices, use cases, and how to adopt a security program that puts the client and their data at the center.

    This session will give a comprehensive, one-stop shop approach to security, and discuss the essential pillars of cybersecurity that every company should have.

    Join as we discuss:
    - What is meant by “trust,” and how to achieve it
    - The value of transparency, privacy, and availability
    - The state of cybersecurity in 2021
    - Trends and patterns we expect to see in 2022
  • Breaking Down Cloud Security: Securing Your Infrastructure Oct 5 2021 4:00 pm UTC 60 mins
    Tod Beardsley, Director of Research at Rapid7
    A Guide to Operational Security in 2021: Episode 8

    Organizations are relying more and more on the flexibility and efficiency provided by cloud services. But it’s important to remember that cloud service providers only take responsibility for some security tasks. The customer is responsible for securing end user data, network traffic, and operating systems, as well as ensuring compliance with industry standards and regulations.

    Cloud platforms also introduce some extra complications for security, such as complex cloud-based security tools, security information silos that make identifying attacks difficult, and attacks that focus on cloud platforms. To address risks and navigate cloud security challenges, you need to find a vulnerability management solution that continuously monitors misconfigurations in cloud networks. But what solution is best for your organization, and what does cloud security look like on a day-to-day basis?

    In this session, we will discuss:
    - How to find vulnerabilities in the cloud
    - Cloud security complications and how to address them
    - How to detect threats and ensure compliance across hybrid and multi-cloud environments
  • How to Stay Ahead of Threats With Deception Technology Sep 21 2021 4:00 pm UTC 60 mins
    Tod Beardsley, Rapid7 | Chris Dodt, Freedom Financial Network
    A Guide to Operational Security in 2021: Episode 7

    Deception technology deceives attackers by distributing traps and decoys across your system infrastructure. As breaches and attacks become more sophisticated, it is vital that security teams can detect suspicious activity as soon as possible in order to neutralize the threat. Deception technology is also beneficial because it decreases attacker time within the network, reduces alert fatigue, and produces useful metrics that demonstrate indicators of compromise, helping to prevent future breaches.

    When it comes to incident detection, time and context are crucial, and the quicker threats are neutralized the better. Choosing deception technology that recognizes malicious activity early on in the attack chain buys your security team the time needed to respond quickly, and is the difference between a business just keeping up with new threats, and a business that is always one step ahead of attackers.

    In this session, we will discuss:
    - How deception technology provides a 360-degree approach to security
    - Why it’s important to have a deep understanding of attacker behavior
    - How deception technology improves visibility

    - Tod Beardsley, Director of Research at Rapid7
    - Chris Dodt, Information Security Specialist at Freedom Financial Network
  • A Comprehensive Guide to User Behavior Analytics Sep 7 2021 4:00 pm UTC 60 mins
    Tod Beardsley, Director of Research at Rapid7
    A Guide to Operational Security in 2021: Episode 6

    User behavior analytics (UBA) uncover patterns and insights, and are able to identify intruder compromise, insider threats, and suspicious activity within your network. As UBA is based on behavior, it can detect attacks that bypass threat intelligence, providing alerts earlier on in the attack chain and giving security teams more time to respond.

    Join us in this episode as we uncover the inherent value that UBA can provide, and why it is so useful for unveiling and neutralizing threats.

    In this session, we will discuss:
    - How user behavior analytics can accelerate your incident detection and response
    - Why having insight into user behavior is so critical for businesses today
    - The value of an integrated detection and investigation solution, and how it uses UBA to detect attacks early on
  • How to Protect Against Phishing Attacks at All Business Levels Aug 24 2021 4:00 pm UTC 60 mins
    Tod Beardsley, Rapid7 | Carl Stern, Experity | Michael Palazzolo, Herman Miller | Ryan Manni, Hologic
    A Guide to Operational Security in 2021: Episode 5

    In a recent SANS survey, it was found that phishing was observed in 78% of organizations. With this amount of phishing occurring, it is crucial that organizations prepare themselves with effective and impactful phishing protection strategies.

    Though technology alone can’t stop phishing, it can help to reduce the harmful impact of phishing attacks on your business. For example, phishing protection allows employees to report suspected phishing attacks, while also providing your organization with the collaborative tools needed to tackle phishing when it occurs.

    So, given the business benefits of phishing protection, what solution is right for your business?

    In this session, we will discuss:
    - Why phishing protection solutions are a must-have for your business
    - How to help employees more easily report suspected phishing
    - How to provide security teams with the necessary tools to investigate phishing reports

    - Tod Beardsley, Director of Research at Rapid7
    - Carl Stern, CISSP, Director, Information Security at Experity
    - Michael Palazzolo, IT Analyst Technical Architect at Herman Miller
    - Ryan Manni, Senior Manager, Information Security at Hologic
  • BrightTalk Originals: Zero Trust for the New Normal Aug 18 2021 6:00 pm UTC 61 mins
    Mari Galloway, Women's Society of Cyberjutsu - Jonathan Nguyen, Fortinet - Bob Rudis, Rapid7
    Working remotely has become the new normal. This, and many other changes organizations adopted last year in response to the pandemic are likely to stay for the long term. According to Gallup, about two-thirds of U.S. remote workers want to continue to work remotely. So, how can organizations continue to support their growing distributed workforce at a time where reports of security threats have increased by 400% compared to pre-pandemic levels?

    Here is where the zero-trust approach to security comes into play.

    Join this month's episode of The (Security) Balancing Act with Diana Kelley and guests as they discuss the emergence of zero trust (“Trust Nothing, Verify Everything”) and what it helps achieve for enterprises in the age of cloud and remote work.

    Viewers will learn about:
    - The evolution of the security perimeter and the shift to zero trust
    - Why zero trust is an approach and not a product
    - Zero Trust Network Access (ZTA) vs. corporate VPN
    - Real-world stories and practical hands-on guidance from people who have deployed a ZTA
  • [APAC] Series: SOC Automation 101: The Future of Detection and Response Aug 18 2021 4:00 am UTC 63 mins
    Sydney Coffaro, Senior Technical Advisor, SOAR at Rapid7 and Jeffrey Gardner, Practice Advisor at Rapid7
    Today’s security operations–whether part of a formal SOC or not–require IT and Security teams to identify and address threats as quickly and decisively as possible. The growing list of threats, along with their methods of entry, techniques used, and means of detection and resolution have grown to a point where it’s nearly impossible to address manually. Part 4 of 4 of series: Focus on What Matters Most with Detection and Response
  • Hardening Your Environment Against Common Attack Techniques Aug 12 2021 6:00 pm UTC 55 mins
    Zach Paul, Ted Samuels, & Robert Knapp
    Join Incident Response Consultants, Robert Knapp, Ted Samuels, and Zach Paul as they discuss various techniques to help prevent many cyberattacks making headlines today. Learn about common trends in cyberattacks across all industry verticals, gleaned from recent Rapid7 Incident Response engagements. Viewers will leave with a list of actions they can take, using their existing tools and technology, to better harden their environment against attackers.
  • [APAC] Series: Looking Ahead: The 2021 Threat Landscape Aug 11 2021 4:00 am UTC 55 mins
    Jeremiah Dewey, VP Managed Services MDR at Rapid7 and Wade Woolwine, Principal Security Researcher at Rapid7
    The threat landscape continues to evolve and adapt, requiring organizations to have a high level of security visibility. However, when security teams, managers, and leaders have limited time and budget, prioritizing investments to achieve the greatest impact and reduction in risk becomes even more critical. Part 3 of 4 of series: Focus on What Matters Most with Detection and Response
  • Incident Detection and Response: Getting Into the Mindset of an Attacker Aug 10 2021 4:00 pm UTC 60 mins
    Tod Beardsley, Rapid7 | Chad Kliewer, Pioneer | Steve Winterfeld, Akamai
    A Guide to Operational Security in 2021: Episode 4

    Nowadays, it's not a question of if you'll be breached, but when. Therefore, you need the people, processes, and technology in place to respond quickly and efficiently to attacks.

    While breaches have become a certainty, by adopting the mindset of an attacker, you can detect breaches in your network before they’re able to cause damage. This approach to incident detection and response directly informs the software and services needed to equip security professionals to do their best work.

    In this session, we will discuss:
    - Why it is so important to have an incident detection and response program before you are compromised
    - The kinds of technology solutions needed to support your organization
    - The value of incident detection solutions that adopt the mindset of an attacker, and what this can do for your business

    - Tod Beardsley, Director of Research at Rapid7
    - Chad Kliewer, Information Security Officer at Pioneer
    - Steve Winterfeld, Advisory CISO at Akamai
  • EMEA Series: Security - a transformation enabler Aug 5 2021 9:00 am UTC 50 mins
    Marcus Eaton, Senior Security Solutions Engineer, Rapid7, International & Ash Dunn, Head Of Information Security, OVO Energy
    Go back just a few years and the phrase ‘transformation enabler’ wouldn’t be seen for love nor money with ‘security’. In some quarters it’s still viewed as a cost centre, a handbrake on innovation and a reluctant spend, rather than a way to help the business progress. That was until progressive organisations began to realise its value in the transformation process. As well as how the somewhat ‘forced’ drive (resulting from the global pandemic), to adopt cloud to offer greater experiences and enable distributed workforces, has pushed security firmly into corporate strategy.

    In our third and final webinar, we discuss how you can change the conversation within your organisation. Instead of running from one fire to the next, we outline the tools and practices vital in allowing you to take the time to examine your posture, consolidate and enable the business to transform.
  • [APAC] Series: A CISOs guide to Security Planning Aug 4 2021 4:00 am UTC 30 mins
    Jeffrey Gardner, Detection and Response Practice Advisor at Rapid7
    The Cybersecurity industry’s resource gap has been well documented over the years, but in 2020 we've seen that gap widen. The attack surface has grown with remote workforces and a slew of new applications, but in many cases budgets are tightening and teams are wearing many hats.
  • EMEA Series: Is my SOC round-the-clock? Recorded: Jul 29 2021 60 mins
    Matt Rider, Director, Sales Engineering International Rapid7; Richard Harris, International Director, Managed Services Rapid7
    The scarcity of security resources is a well-known fact - it's estimated between 70-80% of organisations suffer from a shortage. And when you do find good talent, you don't want it to go to waste performing transactional tasks.

    Enter automation and managed services. Between the security talent gap and the rapid increase of threats, automation as well as the skills of a service provider can be used to help strengthen your defense and response capabilities.

    In this session, we'll cover:

    - Round-the-clock response SOC team: internal vs outsourced to MDR
    - Data enrichment: can automated systems do the heavy lifting of investigating potential attacks after an alert comes in?
    - Business continuity: how to ensure your systems remain intact in the event of an attack
  • 10 Minute Take: How to Accelerate Risk Identification & Threat Remediation Recorded: Jul 28 2021 14 mins
    Meaghan Donlon and Jane Man
    Join Rapid7's Meaghan Donlon, Product Marketing for the Detection & Response practice and Jane Mann, Product Management for the Vulnerability Management practice, as they discuss how the Insight Platform can help identify risks and remediate threats more quickly. They will discuss how Rapid7 aims to combat complexity by investing in areas that help drive customer value. Join us for this quick and insightful 10 minute talk!
  • [APAC] Series: Doing More with Less: Detection and Response Planning for 2021 Recorded: Jul 28 2021 62 mins
    Margaret Wei, Product Marketing Manager at Rapid7 and Jake Williams, SANS analyst
    Despite a year of “new normals,” one thing that most teams can still count on this fall is annual security planning. However, this year, in addition to supporting growing remote workforces, many SOCs are facing increased budget scrutiny and pressure to demonstrate ROI as they go into 2021. Part 1 of 4 of series: Focus on What Matters Most with Detection and Response'
  • Understanding Ransomware: Prepare and Prevent Recorded: Jul 27 2021 43 mins
    Tod Beardsley, Rapid7 | Jen Ellis, Rapid7 | Megan Stifel, Global Cyber Alliance
    A Guide to Operational Security in 2021: Episode 3

    In 2020 ransomware surged by 150%, according to a new Group-IB report. With this level of risk, leaders and security professionals must double down on their vulnerability management while also looking internally to increase operational security.

    A ransomware attack is more than a mere annoyance. It can bring your organization to a crashing halt, while also exposing your sensitive data and negatively impacting your brand reputation. As the risk of a ransomware attack on your organization increases, it’s important to take a look at the prevention and response methods you have in place.

    Join us in this session as we discuss:
    - Why user education is vital to protecting against ransomware attacks
    - Why a disaster recovery plan is a must for your organization
    - Why ransomware attacks are on the rise and methods to secure your organization

    - Tod Beardsley, Director of Research at Rapid7
    - Jen Ellis, Vice President, Community and Public Affairs at Rapid7
    - Megan Stifel, Global Policy Officer and Capacity & Resilience Program Director at Global Cyber Alliance
  • Multi-Cloud for Resilient Organizations: Strategies for Success Recorded: Jul 27 2021 58 mins
    Alex Hilton, Cloud Industry Forum | Jeremy Snyder, Rapid7 | Eyal Arazi, Radware | Pierre-Francois Guglielmi, Rubrik
    The modern business demands a modern approach to IT infrastructure, and in 2021 that’s increasingly meaning multi-cloud. Veering away from vendor lock-in, and driven by the spirit of collaboration, multi-cloud is being heralded as the approach future-proof, resilient businesses need to take.

    In this episode of Digital Transformation in Action, we’re asking why that is. We’ll be looking closely at how multi-cloud can enable businesses to not only unlock their future potential, but drive innovation and superior customer experience.

    Join host Alex Hilton and guests as they discuss:
    - Key reasons why a multi-cloud architecture can help future proof your business
    - How multi-cloud advances Digital Transformation strategies
    - How businesses can overcome common multi-cloud adoption challenges
    - What multi-cloud ‘done right’ looks like
    - And more

    Eyal Arazi - Product Marketing Manager, Radware
    Jeremy Snyder - Senior Director of Corporate Development, Rapid7
    Pierre-Francois (PF) Guglielmi - Field CTO, Alliances, Rubrik
  • EMEA Series: You Can't Protect What You Can't See Recorded: Jul 22 2021 39 mins
    Matt Rider, Director, Sales Engineering, International, Rapid7 & Graeme McMillan, Senior Security Solutions Engineer, Rapid7
    As organisations continue to transform to what is for many, a hybrid cloud environment interspersed with multi - clouds, things become incredibly complex very quickly.Yet with the drive towards innovation, also comes risk - and the balance between the two can be fraught with ‘debate’ among the business stakeholders, developers and security teams alike.

    As such, integrations across the range of environments need detailed consideration. The security puzzle needs to be carefully put together to ensure other factors are not compromised either up or downstream the business. Disparate systems for example, leave environments vulnerable to attack caused by gaps in visibility and the noise and confusion of managing multiple tools.

    In this session, we'll cover:

    - Total Infrastructure Assessment: you can't improve your visibility until you first know where you stand.
    - SOC Visibility Triad: a network-centric approach to threat detection and response (SIEM, NDR, EDR)
    - Cyber Risk as a Business Problem
    - Always be Alert: You're only as secure as your most insecure asset
  • [APAC] The SOC Visibility Triad Recorded: Jul 22 2021 24 mins
    Marcus Eaton - Lead Solutions Engineer, UK & Ireland & Roy Tobin - Detection & Response Services Manager, EMEA
    To get ahead of the attackers, security teams are increasingly moving from prevention only ideologies to focusing on early detection. Successful and comprehensive threat detection requires understanding common adversary techniques, which ones may especially pose a threat to your organization, and how to detect and mitigate these attacks. With that said, the volume and breadth of attack tactics make it nearly impossible for any single organization to monitor every single attack type—never mind catalog and translate those findings in a constructive way to anyone outside of their organization.

    Join this webinar to learn more about Gartner’s Security Operations Center (SOC) Visibility Triad, a network-centric approach to threat detection and response and how you can apply it to improve the detection and response capabilities in your organisation.
  • Risiko- und Schwachstellen-management für klinische Einrichtungen Recorded: Jul 20 2021 27 mins
    Christian Giebner, Senior Security Solutions Engineer & Arne Trittelvitz, Regional Sales Director
    Die IT-Verantwortlichen in klinischen Einrichtungen stehen vor zentralen Herausforderungen im Bereich der kritischen IT-Infrastruktur. Es gibt immer noch eine große Anzahl veralteter, manchmal proprietärer Systeme, die nur schwer zu patchen sind. Dem gegenüber stehen sehr begrenzte Mittel für die IT-Sicherheit.

    In unserem 30-minütigen Webcast schauen wir uns diese Herausforderungen genauer an. Wir bieten Ihnen praktikable Lösungsansätze für ein wirksames Schwachstellen-Management für Ihre Klinik-IT- und Medizingeräte-Umgebung.
Supercharge Your Security Impact
Rapid7 is advancing security with visibility, analytics, and automation delivered through our Insight platform. Our solutions simplify the complex, allowing security teams to work more effectively with IT and development to reduce vulnerabilities, monitor for malicious behavior, investigate and shut down attacks, and automate routine tasks. Over 9,300 customers rely on Rapid7 technology, services, and research to improve security outcomes and securely advance their organizations. For more information, visit our website rapid7.com.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: 10 Minute Take: How to Accelerate Risk Identification & Threat Remediation
  • Live at: Jun 3 2021 2:57 pm
  • Presented by: Meaghan Donlon and Jane Man
  • From:
Your email has been sent.
or close