Hi [[ session.user.profile.firstName ]]

10 Minute Take: How to Accelerate Risk Identification & Threat Remediation

Join Rapid7's Meaghan Donlon, Product Marketing for the Detection & Response practice and Jane Mann, Product Management for the Vulnerability Management practice, as they discuss how the Insight Platform can help identify risks and remediate threats more quickly. They will discuss how Rapid7 aims to combat complexity by investing in areas that help drive customer value. Join us for this quick and insightful 10 minute talk!
Recorded Jul 28 2021 14 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Meaghan Donlon and Jane Man
Presentation preview: 10 Minute Take: How to Accelerate Risk Identification & Threat Remediation

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • [APAC] How to Stay Ahead of Threats With Deception Technology Oct 27 2021 3:00 am UTC 42 mins
    Tod Beardsley, Rapid7 | Chris Dodt, Freedom Financial Network | Jorge Orchilles, SCYTHE | Bryan Seely, Cyemptive
    A Guide to Operational Security in 2021: Episode 7

    Deception technology deceives attackers by distributing traps and decoys across your system infrastructure. As breaches and attacks become more sophisticated, it is vital that security teams can detect suspicious activity as soon as possible in order to neutralize the threat. Deception technology is also beneficial because it decreases attacker time within the network, reduces alert fatigue, and produces useful metrics that demonstrate indicators of compromise, helping to prevent future breaches.

    When it comes to incident detection, time and context are crucial, and the quicker threats are neutralized the better. Choosing deception technology that recognises malicious activity early on in the attack chain buys your security team the time needed to respond quickly, and is the difference between a business just keeping up with new threats, and a business that is always one step ahead of attackers.

    In this session, we will discuss:
    - How deception technology provides a 360-degree approach to security
    - Why it’s important to have a deep understanding of attacker behavior
    - How deception technology improves visibility

    Speakers:
    - Tod Beardsley, Director of Research at Rapid7
    - Chris Dodt, Information Security Specialist at Freedom Financial Network
    - Jorge Orchilles, Chief Technology Officer at SCYTHE
    - Bryan Seely, Senior Security Architect & Evangelist at Cyemptive Technologies Inc
  • [APAC] A Comprehensive Guide to User Behaviour Analytics Oct 20 2021 3:00 am UTC 32 mins
    Tod Beardsley, Rapid7 | Carraig Stanwyck, Wave HQ | Nicholas Ashton, RFusion
    A Guide to Operational Security in 2021: Episode 6

    User behavior analytics (UBA) uncover patterns and insights, and are able to identify intruder compromise, insider threats, and suspicious activity within your network. As UBA is based on behavior, it can detect attacks that bypass threat intelligence, providing alerts earlier on in the attack chain and giving security teams more time to respond.

    Join us in this episode as we uncover the inherent value that UBA can provide, and why it is so useful for unveiling and neutralising threats.

    In this session, we will discuss:
    - How user behavior analytics can accelerate your incident detection and response
    - Why having insight into user behavior is so critical for businesses today
    - The value of an integrated detection and investigation solution, and how it uses UBA to detect attacks early on

    Speakers:
    - Tod Beardsley, Director of Research at Rapid7
    - Carraig Stanwyck, Director of Information Security at Wave HQ
    - Nicholas Ashton, President at RFusion
  • Building and Maintaining Trust With Your Security Oct 19 2021 4:00 pm UTC 60 mins
    Tod Beardsley, Director of Research at Rapid7
    A Guide to Operational Security in 2021: Episode 9

    When it comes to operational security, a holistic risk-based approach allows you to break down every level of your business to provide first-class security for your organization.

    But what are the essential, core pillars of an effective approach to security? From availability to transparency, this session will discuss best practices, use cases, and how to adopt a security program that puts the client and their data at the center.

    This session will give a comprehensive, one-stop shop approach to security, and discuss the essential pillars of cybersecurity that every company should have.

    Join as we discuss:
    - What is meant by “trust,” and how to achieve it
    - The value of transparency, privacy, and availability
    - The state of cybersecurity in 2021
    - Trends and patterns we expect to see in 2022
  • [APAC] How to Protect Against Phishing Attacks at All Business Levels Oct 13 2021 3:00 am UTC 34 mins
    Tod Beardsley, Rapid7 | Carl Stern, Experity | Michael Palazzolo, Herman Miller | Ryan Manni, Hologic
    A Guide to Operational Security in 2021: Episode 5

    In a recent SANS survey, it was found that phishing was observed in 78% of organisations. With this amount of phishing occurring, it is crucial that organisations prepare themselves with effective and impactful phishing protection strategies.

    Though technology alone can’t stop phishing, it can help to reduce the harmful impact of phishing attacks on your business. For example, phishing protection allows employees to report suspected phishing attacks, while also providing your organisation with the collaborative tools needed to tackle phishing when it occurs.

    So, given the business benefits of phishing protection, what solution is right for your business?

    In this session, we will discuss:
    - Why phishing protection solutions are a must-have for your business
    - How to help employees more easily report suspected phishing
    - How to provide security teams with the necessary tools to investigate phishing reports

    Speakers:
    - Tod Beardsley, Director of Research at Rapid7
    - Carl Stern, CISSP, Director, Information Security at Experity
    - Michael Palazzolo, IT Analyst Technical Architect at Herman Miller
    - Ryan Manni, Senior Manager, Information Security at Hologic
  • How to Secure Critical Oil & Gas Pipelines in the era of Targeted Ransomware Oct 7 2021 5:00 pm UTC 58 mins
    Ben Garber, Rapid7 & Carl Eshelman, SCADAfence
    Cyber security in the oil & gas industry has escalated the headlines as new advanced cyber threats are targeting operational technology (OT) networks. Over the past five years, different attacks on the industry have shown there is a major gap when it comes to having proper cyber security. A recent example is the Colonial Pipeline ransomware attack, where one of the largest fuel pipelines in the US, was forced to stop all operations due to falling victim to a ransomware attack.

    To truly understand what is happening in the OT network, oil & gas producers need a complete picture of their OT network to detect and mitigate any security risks or vulnerabilities. As more oil and gas organizations increase their digital transformation with the convergence of IT and OT networks, improved threat protection and remote connections management, they need to immediately improve the visibility and security of their OT networks.

    Join us during this webinar to learn:
    The distinction of IT-OT convergence within the oil & gas sector
    Common security risks and threats across the oil & gas industry
    How organizations can secure oil & gas pipelines
    Show how Rapid7 & SCADAfence can help oil & gas organizations plan ahead and reduce the impact of cyberattacks on their networks
    Showcase different oil & gas customer case studies
  • [APAC] Incident Detection and Response: Getting Into the Mindset of an Attacker Oct 6 2021 3:00 am UTC 36 mins
    Tod Beardsley, Rapid7 | Chad Kliewer, Pioneer | Steve Winterfeld, Akamai
    A Guide to Operational Security in 2021: Episode 4

    Nowadays, it's not a question of if you'll be breached, but when. Therefore, you need the people, processes, and technology in place to respond quickly and efficiently to attacks.

    While breaches have become a certainty, by adopting the mindset of an attacker, you can detect breaches in your network before they’re able to cause damage. This approach to incident detection and response directly informs the software and services needed to equip security professionals to do their best work.

    In this session, we will discuss:
    - Why it is so important to have an incident detection and response program before you are compromised
    - The kinds of technology solutions needed to support your organization
    - The value of incident detection solutions that adopt the mindset of an attacker, and what this can do for your business

    Speakers:
    - Tod Beardsley, Director of Research at Rapid7
    - Chad Kliewer, Information Security Officer at Pioneer
    - Steve Winterfeld, Advisory CISO at Akamai
  • Breaking Down Cloud Security: Securing Your Infrastructure Oct 5 2021 4:00 pm UTC 60 mins
    Tod Beardsley, Rapid7 | Soo Youn Yi, Highmark Health | Sumit Sengupta, Microsoft
    A Guide to Operational Security in 2021: Episode 8

    Organizations are relying more and more on the flexibility and efficiency provided by cloud services. But it’s important to remember that cloud service providers only take responsibility for some security tasks. The customer is responsible for securing end user data, network traffic, and operating systems, as well as ensuring compliance with industry standards and regulations.

    Cloud platforms also introduce some extra complications for security, such as complex cloud-based security tools, security information silos that make identifying attacks difficult, and attacks that focus on cloud platforms. To address risks and navigate cloud security challenges, you need to find a vulnerability management solution that continuously monitors misconfigurations in cloud networks. But what solution is best for your organization, and what does cloud security look like on a day-to-day basis?

    In this session, we will discuss:
    - How to find vulnerabilities in the cloud
    - Cloud security complications and how to address them
    - How to detect threats and ensure compliance across hybrid and multi-cloud environments

    Speakers:
    - Tod Beardsley, Director of Research at Rapid7
    - Soo Youn Yi, Director, Cybersecurity Operations at Highmark Health
    - Sumit Sengupta, Cloud Solution Architect at Microsoft
  • How to Protect Against Phishing Attacks at All Business Levels Oct 5 2021 9:00 am UTC 34 mins
    Tod Beardsley, Rapid7 | Carl Stern, Experity | Michael Palazzolo, Herman Miller | Ryan Manni, Hologic
    A Guide to Operational Security in 2021: Episode 5

    In a recent SANS survey, it was found that phishing was observed in 78% of organizations. With this amount of phishing occurring, it is crucial that organizations prepare themselves with effective and impactful phishing protection strategies.

    Though technology alone can’t stop phishing, it can help to reduce the harmful impact of phishing attacks on your business. For example, phishing protection allows employees to report suspected phishing attacks, while also providing your organization with the collaborative tools needed to tackle phishing when it occurs.

    So, given the business benefits of phishing protection, what solution is right for your business?

    In this session, we will discuss:
    - Why phishing protection solutions are a must-have for your business
    - How to help employees more easily report suspected phishing
    - How to provide security teams with the necessary tools to investigate phishing reports

    Speakers:
    - Tod Beardsley, Director of Research at Rapid7
    - Carl Stern, CISSP, Director, Information Security at Experity
    - Michael Palazzolo, IT Analyst Technical Architect at Herman Miller
    - Ryan Manni, Senior Manager, Information Security at Hologic
  • Incident Detection and Response: Getting Into the Mindset of an Attacker Sep 30 2021 9:00 am UTC 36 mins
    Tod Beardsley, Rapid7 | Chad Kliewer, Pioneer | Steve Winterfeld, Akamai
    A Guide to Operational Security in 2021: Episode 4

    Nowadays, it's not a question of if you'll be breached, but when. Therefore, you need the people, processes, and technology in place to respond quickly and efficiently to attacks.

    While breaches have become a certainty, by adopting the mindset of an attacker, you can detect breaches in your network before they’re able to cause damage. This approach to incident detection and response directly informs the software and services needed to equip security professionals to do their best work.

    In this session, we will discuss:
    - Why it is so important to have an incident detection and response program before you are compromised
    - The kinds of technology solutions needed to support your organization
    - The value of incident detection solutions that adopt the mindset of an attacker, and what this can do for your business

    Speakers:
    - Tod Beardsley, Director of Research at Rapid7
    - Chad Kliewer, Information Security Officer at Pioneer
    - Steve Winterfeld, Advisory CISO at Akamai
  • [APAC] Understanding Ransomware: Prepare and Prevent Sep 29 2021 4:00 am UTC 43 mins
    Tod Beardsley, Rapid7 | Jen Ellis, Rapid7 | Megan Stifel, Global Cyber Alliance
    A Guide to Operational Security in 2021: Episode 3

    In 2020 ransomware surged by 150%, according to a new Group-IB report. With this level of risk, leaders and security professionals must double down on their vulnerability management while also looking internally to increase operational security.

    A ransomware attack is more than a mere annoyance. It can bring your organization to a crashing halt, while also exposing your sensitive data and negatively impacting your brand reputation. As the risk of a ransomware attack on your organization increases, it’s important to take a look at the prevention and response methods you have in place.

    Join us in this session as we discuss:
    - Why user education is vital to protecting against ransomware attacks
    - Why a disaster recovery plan is a must for your organization
    - Why ransomware attacks are on the rise and methods to secure your organization

    Speakers:
    - Tod Beardsley, Director of Research at Rapid7
    - Jen Ellis, Vice President, Community and Public Affairs at Rapid7
    - Megan Stifel, Global Policy Officer and Capacity & Resilience Program Director at Global Cyber Alliance
  • Understanding Ransomware: Prepare and Prevent Recorded: Sep 23 2021 43 mins
    Tod Beardsley, Rapid7 | Jen Ellis, Rapid7 | Megan Stifel, Global Cyber Alliance
    A Guide to Operational Security in 2021: Episode 3

    In 2020 ransomware surged by 150%, according to a new Group-IB report. With this level of risk, leaders and security professionals must double down on their vulnerability management while also looking internally to increase operational security.

    A ransomware attack is more than a mere annoyance. It can bring your organization to a crashing halt, while also exposing your sensitive data and negatively impacting your brand reputation. As the risk of a ransomware attack on your organization increases, it’s important to take a look at the prevention and response methods you have in place.

    Join us in this session as we discuss:
    - Why user education is vital to protecting against ransomware attacks
    - Why a disaster recovery plan is a must for your organization
    - Why ransomware attacks are on the rise and methods to secure your organization

    Speakers:
    - Tod Beardsley, Director of Research at Rapid7
    - Jen Ellis, Vice President, Community and Public Affairs at Rapid7
    - Megan Stifel, Global Policy Officer and Capacity & Resilience Program Director at Global Cyber Alliance
  • [APAC] Securing Every Layer, From Infrastructure to Applications Recorded: Sep 22 2021 36 mins
    Tod Beardsley, Rapid7 | Kristy Westphal, HealthEquity | Anthony Johnson, Delve Risk
    A Guide to Operational Security in 2021: Episode 2

    Securing every layer of your attack surface is crucial when it comes to staying ahead of threats and vulnerabilities. Though you may have already put solutions in place to secure your infrastructure, if you have not secured your applications, your whole network is at risk. Applications are often used as vectors by attackers—allowing those attackers to jeopardise entire IT ecosystems.

    Evidently, it is not enough to simply secure your infrastructure. But what are the best ways to secure your applications, how can you scan for vulnerabilities in your applications, and how important is monitoring and protection?

    In this session, we will discuss:
    - Why the number of attacks on web applications has doubled since 2019, and what your security teams can do to navigate these risks
    - How monitoring and protection provides critical insight and safeguards for your application security
    - How to achieve success in your web application security testing program
    - Why a holistic approach to application security is 100% necessary today

    Speakers:
    - Tod Beardsley, Director of Research at Rapid7
    - Kristy Westphal, VP Security Operations at HealthEquity
    - Anthony Johnson, Managing Partner & CISO at Delve Risk
  • How to Stay Ahead of Threats With Deception Technology Recorded: Sep 21 2021 42 mins
    Tod Beardsley, Rapid7 | Chris Dodt, Freedom Financial Network | Jorge Orchilles, SCYTHE | Bryan Seely, Cyemptive
    A Guide to Operational Security in 2021: Episode 7

    Deception technology deceives attackers by distributing traps and decoys across your system infrastructure. As breaches and attacks become more sophisticated, it is vital that security teams can detect suspicious activity as soon as possible in order to neutralize the threat. Deception technology is also beneficial because it decreases attacker time within the network, reduces alert fatigue, and produces useful metrics that demonstrate indicators of compromise, helping to prevent future breaches.

    When it comes to incident detection, time and context are crucial, and the quicker threats are neutralized the better. Choosing deception technology that recognizes malicious activity early on in the attack chain buys your security team the time needed to respond quickly, and is the difference between a business just keeping up with new threats, and a business that is always one step ahead of attackers.

    In this session, we will discuss:
    - How deception technology provides a 360-degree approach to security
    - Why it’s important to have a deep understanding of attacker behavior
    - How deception technology improves visibility

    Speakers:
    - Tod Beardsley, Director of Research at Rapid7
    - Chris Dodt, Information Security Specialist at Freedom Financial Network
    - Jorge Orchilles, Chief Technology Officer at SCYTHE
    - Bryan Seely, Senior Security Architect & Evangelist at Cyemptive Technologies Inc
  • Securing Every Layer, From Infrastructure to Applications Recorded: Sep 16 2021 36 mins
    Tod Beardsley, Rapid7 | Kristy Westphal, HealthEquity | Anthony Johnson, Delve Risk
    A Guide to Operational Security in 2021: Episode 2

    Securing every layer of your attack surface is crucial when it comes to staying ahead of threats and vulnerabilities. Though you may have already put solutions in place to secure your infrastructure, if you have not secured your applications, your whole network is at risk. Applications are often used as vectors by attackers—allowing those attackers to jeopardize entire IT ecosystems.

    Evidently, it is not enough to simply secure your infrastructure. But what are the best ways to secure your applications, how can you scan for vulnerabilities in your applications, and how important is monitoring and protection?

    In this session, we will discuss:
    - Why the number of attacks on web applications has doubled since 2019, and what your security teams can do to navigate these risks
    - How monitoring and protection provides critical insight and safeguards for your application security
    - How to achieve success in your web application security testing program
    - Why a holistic approach to application security is 100% necessary today

    Speakers:
    - Tod Beardsley, Director of Research at Rapid7
    - Kristy Westphal, VP Security Operations at HealthEquity
    - Anthony Johnson, Managing Partner & CISO at Delve Risk
  • [APAC] CISO Security Strategies for a Hybrid Workforce Recorded: Sep 16 2021 62 mins
    Dan Lohrmann | Earl Duby | Endré Jarraux Walls | Devin Krugly
    According to the 2021 Gartner CIO Survey, 64% of employees are now able to work from home, and two-fifths are working from home. As more companies adopt a permanent hybrid workforce, it’s a constant challenge for CISOs to keep remote workers secure and ensure secure remote access.

    So what are the main problems faced by CISOs today, and what tools are needed to navigate these risks? Hear from industry leaders on how they’re adapting their security strategies and learn more about how the CISO role has evolved over the last few years.

    Join security experts across the industry as they discuss:

    - What are the key security strategies and solutions to focus on
    - Why connected devices are a popular target for attackers
    - Steps for easy cyber hygiene at home and at work
    - CISO recommendations & best practices
    - What the next year has in store for security professionals

    Speakers:
    - Dan Lohrmann, Chief Strategist & CSO at Security Mentor
    - Earl Duby, Vice President and CISO at Lear Corporation
    - Endré Jarraux Walls, EVP, Chief Information Security Officer at Customers Bank
    - Devin Krugly, Practice Advisor of Vulnerability Risk Management at Rapid7
  • CISO Security Strategies for a Hybrid Workforce Recorded: Sep 14 2021 62 mins
    Dan Lohrmann | Earl Duby | Endré Jarraux Walls | Devin Krugly
    According to the 2021 Gartner CIO Survey, 64% of employees are now able to work from home, and two-fifths are working from home. As more companies adopt a permanent hybrid workforce, it’s a constant challenge for CISOs to keep remote workers secure and ensure secure remote access.

    So what are the main problems faced by CISOs today, and what tools are needed to navigate these risks? Hear from industry leaders on how they’re adapting their security strategies and learn more about how the CISO role has evolved over the last few years.

    Join security experts across the industry as they discuss:

    - What are the key security strategies and solutions to focus on
    - Why connected devices are a popular target for attackers
    - Steps for easy cyber hygiene at home and at work
    - CISO recommendations & best practices
    - What the next year has in store for security professionals

    Speakers:
    - Dan Lohrmann, Chief Strategist & CSO at Security Mentor
    - Earl Duby, Vice President and CISO at Lear Corporation
    - Endré Jarraux Walls, EVP, Chief Information Security Officer at Customers Bank
    - Devin Krugly, Practice Advisor of Vulnerability Risk Management at Rapid7
  • A Guide to Vulnerability Risk Management Recorded: Sep 9 2021 38 mins
    Tod Beardsley, Rapid7 | Rod Aday, Verizon
    A Guide to Operational Security in 2021: Episode 1

    The evolution of how we work, from hybrid and distributed employees to the rise of virtualization and the growing adoption of infrastructure-as-a-service (IaaS), has made it increasingly difficult for security teams to monitor and track who is on their network. This increases your overall attack surface.

    Effective vulnerability management begins with complete visibility into your IT environment. This includes your local, remote, cloud, containerized, and virtual infrastructure. But what does visibility look like at all business levels, and how can you achieve a comprehensive risk-based approach to your vulnerability management?

    In this session, we will discuss:
    - The best practices of vulnerability risk management
    - How automation helps to develop vulnerability management
    - Why efficient vulnerability and risk management is so important for today’s enterprise
    - Why it is important to take a risk-based approach to your vulnerability management

    Speakers:
    - Tod Beardsley, Director of Research at Rapid7
    - Rod Aday, Director, Information Risk Management at Verizon
  • [APAC] A Guide to Vulnerability Risk Management Recorded: Sep 8 2021 38 mins
    Tod Beardsley, Rapid7 | Rod Aday, Verizon
    A Guide to Operational Security in 2021: Episode 1

    The evolution of how we work, from hybrid and distributed employees to the rise of virtualisation and the growing adoption of infrastructure-as-a-service (IaaS), has made it increasingly difficult for security teams to monitor and track who is on their network. This increases your overall attack surface.

    Effective vulnerability management begins with complete visibility into your IT environment. This includes your local, remote, cloud, containerised, and virtual infrastructure. But what does visibility look like at all business levels, and how can you achieve a comprehensive risk-based approach to your vulnerability management?

    In this session, we will discuss:
    - The best practices of vulnerability risk management
    - How automation helps to develop vulnerability management
    - Why efficient vulnerability and risk management is so important for today’s enterprise
    - Why it is important to take a risk-based approach to your vulnerability management

    Speakers:
    - Tod Beardsley, Director of Research at Rapid7
    - Rod Aday, Director, Information Risk Management at Verizon
  • A Comprehensive Guide to User Behavior Analytics Recorded: Sep 7 2021 32 mins
    Tod Beardsley, Rapid7 | Carraig Stanwyck, Wave HQ | Nicholas Ashton, RFusion
    A Guide to Operational Security in 2021: Episode 6

    User behavior analytics (UBA) uncover patterns and insights, and are able to identify intruder compromise, insider threats, and suspicious activity within your network. As UBA is based on behavior, it can detect attacks that bypass threat intelligence, providing alerts earlier on in the attack chain and giving security teams more time to respond.

    Join us in this episode as we uncover the inherent value that UBA can provide, and why it is so useful for unveiling and neutralizing threats.

    In this session, we will discuss:
    - How user behavior analytics can accelerate your incident detection and response
    - Why having insight into user behavior is so critical for businesses today
    - The value of an integrated detection and investigation solution, and how it uses UBA to detect attacks early on

    Speakers:
    - Tod Beardsley, Director of Research at Rapid7
    - Carraig Stanwyck, Director of Information Security at Wave HQ
    - Nicholas Ashton, President at RFusion
  • Examining DFIR Techniques to Optimize Incident Response Recorded: Sep 2 2021 88 mins
    Nick Cavalancia, Zach Paul, Eric Van Tyne
    It’s one thing to realize you have become the victim of a vulnerability-based attack. It’s entirely another thing to know this in a timely manner where you have insightful context empowering you to do something about it to both remediate the current threat actions and mitigate any further actions from taking place. Being able to quickly piece together digital artifacts left on file systems, within the Registry, in memory, or within system logs is an imperative part of any digital forensics and incident response (DFIR) effort.
    Attacks like the recent PrintNightmare vulnerability – which included both remote code execution and elevation of privileges – involved not one, but three CVEs and related patches and affected millions of Windows desktop and server operating systems worldwide. Attacks using this vulnerability had the potential to provide threat actors with unfettered access to compromised systems, with tools like Cobalt Strike used for remote access and engaging in further threat actions.So, how can you use DFIR techniques to use digital artifacts to identify attacks early and stop them from continuing?
    In this real-training-for-free session, Microsoft MVP and cybersecurity expert Nick Cavalancia will cover: 1) common digital forensics capabilities, artifacts, and processes, 2) How DFIR fits into your security strategy, 3) A brief primer on PrintNightmare and Cobalt Strike.
    IR Consultants from Rapid7, who will showcase the free open source DFIR solution, Velociraptor, demonstrating common DFIR techniques that will improve the efficiency and effectiveness of your forensics and response efforts.
    Zach will first cover Velociraptor and walk through a PrintNightmare use case, identifying impacted systems using collected digital artifacts. Then Eric will use Velociraptor and walk through an attack involving Cobalt Strike. The goal is to demonstrate how you can use open source tools to successfully investigate and address attacks.
Supercharge Your Security Impact
Rapid7 is advancing security with visibility, analytics, and automation delivered through our Insight platform. Our solutions simplify the complex, allowing security teams to work more effectively with IT and development to reduce vulnerabilities, monitor for malicious behavior, investigate and shut down attacks, and automate routine tasks. Over 9,300 customers rely on Rapid7 technology, services, and research to improve security outcomes and securely advance their organizations. For more information, visit our website rapid7.com.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: 10 Minute Take: How to Accelerate Risk Identification & Threat Remediation
  • Live at: Jul 28 2021 2:00 pm
  • Presented by: Meaghan Donlon and Jane Man
  • From:
Your email has been sent.
or close