Hi [[ session.user.profile.firstName ]]

EMEA Series: Security - a transformation enabler

Go back just a few years and the phrase ‘transformation enabler’ wouldn’t be seen for love nor money with ‘security’. In some quarters it’s still viewed as a cost centre, a handbrake on innovation and a reluctant spend, rather than a way to help the business progress. That was until progressive organisations began to realise its value in the transformation process. As well as how the somewhat ‘forced’ drive (resulting from the global pandemic), to adopt cloud to offer greater experiences and enable distributed workforces, has pushed security firmly into corporate strategy.

In our third and final webinar, we discuss how you can change the conversation within your organisation. Instead of running from one fire to the next, we outline the tools and practices vital in allowing you to take the time to examine your posture, consolidate and enable the business to transform.
Recorded Aug 5 2021 50 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Marcus Eaton, Senior Security Solutions Engineer, Rapid7, International & Ash Dunn, Head Of Information Security, OVO Energy
Presentation preview: EMEA Series: Security - a transformation enabler

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The Boulevard of Broken Buckets Nov 10 2021 10:00 am UTC 41 mins
    Tod Beardsley, Director of Research at Rapid7 and Bob Rudis, Senior Director, Chief Security Data Scientist at Rapid7
    Are you moving your business processes and mission-critical data to the cloud? If so, you will want to hear what our research team found when they looked at 121 publicly reported data exposure incidents that were disclosed throughout 2020.

    Join Rapid7's research team, Tod Beardsley and Bob Rudis, in our latest conversation as we discuss the 2021 Cloud Misconfigurations Report. Expect to hear first hand about the research that documents the commonalities and patterns associated with the leaks and breaches and discover what you can do to avoid making the same missteps as you move to the cloud.
  • [APAC] The Road to Successful Industrial Compliance Nov 10 2021 3:00 am UTC 35 mins
    Ben Garber, Senior Security Solutions Engineer, Rapid7 | Elad Ben Meir, CEO, SCADAfence | Tom Thirer VP Product, SCADAfence
    In recent years, there has been a growing demand for standards and guidelines to manage the risk exposure of OT infrastructures.
    This includes industrial plants, distribution centers, automated warehouses, building management systems, data center infrastructures, and other similar networks.

    Tune into this webcast to learn about:

    - How Rapid7 helps organizations to achieve compliance in industrial environments
    - How to measure compliance over time for standards such as NIST, NERC-CIP, IEC-62443 & others
    - Customer case studies on industrial compliance

    Having this visibility into compliance enables IT and OT departments to centrally define and monitor their organization’s adherence to OT-related regulations and security policies. The SCADAfence Governance Portal, allows users the ability to define compliance enforcement policies and continuously monitor compliance enforcement status for various ICS standards, frameworks and regulations. It measures the compliance progress made over time across all sites and identifies all of the gaps and bottlenecks providing continuous governance oversight.
  • How to Secure Critical Oil & Gas Pipelines in the Era of Targeted Ransomware Nov 9 2021 10:00 am UTC 58 mins
    Ben Garber, Rapid7 & Carl Eshelman, SCADAfence
    Cyber security in the oil & gas industry has escalated the headlines as new advanced cyber threats are targeting operational technology (OT) networks. Over the past five years, different attacks on the industry have shown there is a major gap when it comes to having proper cyber security. A recent example is the Colonial Pipeline ransomware attack, where one of the largest fuel pipelines in the US, was forced to stop all operations due to falling victim to a ransomware attack.

    To truly understand what is happening in the OT network, oil & gas producers need a complete picture of their OT network to detect and mitigate any security risks or vulnerabilities. As more oil and gas organizations increase their digital transformation with the convergence of IT and OT networks, improved threat protection and remote connections management, they need to immediately improve the visibility and security of their OT networks.

    Join us during this webinar to learn:
    The distinction of IT-OT convergence within the oil & gas sector
    Common security risks and threats across the oil & gas industry
    How organizations can secure oil & gas pipelines
    Show how Rapid7 & SCADAfence can help oil & gas organizations plan ahead and reduce the impact of cyberattacks on their networks
    Showcase different oil & gas customer case studies
  • Leaks and Breaches, Oh My! Nov 4 2021 5:00 pm UTC 43 mins
    Tod Beardsley, Director of Research at Rapid7 and Bob Rudis, Senior Director, Chief Security Data Scientist at Rapid7
    Are you moving your business processes and mission-critical data to the cloud? If so, you will want to hear what our research team found when they looked at 121 publicly reported data exposure incidents that were disclosed throughout 2020.

    Join Rapid7's research team, Tod Beardsley and Bob Rudis, in our latest conversation as we discuss the soon-to-be released 2021 Cloud Misconfigurations Report. Expect to hear first hand about the research that documents the commonalities and patterns associated with the leaks and breaches and discover what you can do to avoid making the same missteps as you move to the cloud.
  • Containers Layer by Layer Nov 4 2021 2:00 pm UTC 35 mins
    Dane Grace, Technical Product Manager - VRM at Rapid7
    Many organizations have adopted or are currently adopting containerization as a strategy for deploying their applications. This provides numerous benefits but also presents challenges when security is taken into consideration, the least of which is tool sprawl.

    This is exemplified by the fact that a single Docker container could be run on the serverless container services on any of the big cloud providers, as well as on a Docker host installed on a PC running under a developer’s desk. Moreover, vulnerabilities present on the operating system host, the container host, or the container workload itself all present attack surfaces for bad actors to leverage against organizations.

    This begs the question: how do security teams gain confidence that they are addressing vulnerabilities across these tools in a holistic manner. They need to be sure that they are addressing vulnerabilities across the host operating system (where available), the container host and the container workload itself. Moreover, they need to be aware of the phases at which vulnerabilities are introduced, which include pre-deployment, within the CI/CD pipeline, and finally at runtime.

    Dane Grace presents the 9-box model of container VRM, which is a conceptual framework that helps security teams identify the layers of technology and phases of deployment that they need to address.
  • [APAC] Breaking Down Cloud Security: Securing Your Infrastructure Nov 3 2021 3:00 am UTC 38 mins
    Tod Beardsley, Rapid7 | Soo Youn Yi, Highmark Health | Sumit Sengupta, Microsoft
    A Guide to Operational Security in 2021: Episode 8

    Organizations are relying more and more on the flexibility and efficiency provided by cloud services. But it’s important to remember that cloud service providers only take responsibility for some security tasks. The customer is responsible for securing end user data, network traffic, and operating systems, as well as ensuring compliance with industry standards and regulations.

    Cloud platforms also introduce some extra complications for security, such as complex cloud-based security tools, security information silos that make identifying attacks difficult, and attacks that focus on cloud platforms. To address risks and navigate cloud security challenges, you need to find a vulnerability management solution that continuously monitors misconfigurations in cloud networks. But what solution is best for your organization, and what does cloud security look like on a day-to-day basis?

    In this session, we will discuss:
    - How to find vulnerabilities in the cloud
    - Cloud security complications and how to address them
    - How to detect threats and ensure compliance across hybrid and multi-cloud environments

    Speakers:
    - Tod Beardsley, Director of Research at Rapid7
    - Soo Youn Yi, Director, Cybersecurity Operations at Highmark Health
    - Sumit Sengupta, Cloud Solution Architect at Microsoft
  • The Road to Successful Industrial Compliance Nov 2 2021 10:00 am UTC 35 mins
    Ben Garber, Senior Security Solutions Engineer, Rapid7 | Elad Ben Meir, CEO, SCADAfence | Tom Thirer VP Product, SCADAfence
    In recent years, there has been a growing demand for standards and guidelines to manage the risk exposure of OT infrastructures.
    This includes industrial plants, distribution centers, automated warehouses, building management systems, data center infrastructures, and other similar networks.

    Tune into this webcast to learn about:

    - How Rapid7 helps organizations to achieve compliance in industrial environments
    - How to measure compliance over time for standards such as NIST, NERC-CIP, IEC-62443 & others
    - Customer case studies on industrial compliance

    Having this visibility into compliance enables IT and OT departments to centrally define and monitor their organization’s adherence to OT-related regulations and security policies. The SCADAfence Governance Portal, allows users the ability to define compliance enforcement policies and continuously monitor compliance enforcement status for various ICS standards, frameworks and regulations. It measures the compliance progress made over time across all sites and identifies all of the gaps and bottlenecks providing continuous governance oversight.
  • [APAC] How to Stay Ahead of Threats With Deception Technology Oct 27 2021 3:00 am UTC 42 mins
    Tod Beardsley, Rapid7 | Chris Dodt, Freedom Financial Network | Jorge Orchilles, SCYTHE | Bryan Seely, Cyemptive
    A Guide to Operational Security in 2021: Episode 7

    Deception technology deceives attackers by distributing traps and decoys across your system infrastructure. As breaches and attacks become more sophisticated, it is vital that security teams can detect suspicious activity as soon as possible in order to neutralize the threat. Deception technology is also beneficial because it decreases attacker time within the network, reduces alert fatigue, and produces useful metrics that demonstrate indicators of compromise, helping to prevent future breaches.

    When it comes to incident detection, time and context are crucial, and the quicker threats are neutralized the better. Choosing deception technology that recognises malicious activity early on in the attack chain buys your security team the time needed to respond quickly, and is the difference between a business just keeping up with new threats, and a business that is always one step ahead of attackers.

    In this session, we will discuss:
    - How deception technology provides a 360-degree approach to security
    - Why it’s important to have a deep understanding of attacker behavior
    - How deception technology improves visibility

    Speakers:
    - Tod Beardsley, Director of Research at Rapid7
    - Chris Dodt, Information Security Specialist at Freedom Financial Network
    - Jorge Orchilles, Chief Technology Officer at SCYTHE
    - Bryan Seely, Senior Security Architect & Evangelist at Cyemptive Technologies Inc
  • Schwachstellenmanagement in heterogenen IT/OT Umgebungen Oct 26 2021 8:00 am UTC 21 mins
    Christian Giebner, Senior Security Solutions Engineer von Rapid7 & Christoph Bechtel, Sales Director EMEA SCADAfence.
    Was sind die Herausforderungen vom Schwachstellenmanagement in heterogenen IT/OT Umgebungen?
    Erfahren Sie, wie SCADAfence und Rapid7 bei der Bewältigung unterstützen und welche Vorteile die Integration von SCADAfence und InsightVM bietet.
  • How to Stay Ahead of Threats With Deception Technology Oct 21 2021 9:00 am UTC 42 mins
    Tod Beardsley, Rapid7 | Chris Dodt, Freedom Financial Network | Jorge Orchilles, SCYTHE | Bryan Seely, Cyemptive
    A Guide to Operational Security in 2021: Episode 7

    Deception technology deceives attackers by distributing traps and decoys across your system infrastructure. As breaches and attacks become more sophisticated, it is vital that security teams can detect suspicious activity as soon as possible in order to neutralize the threat. Deception technology is also beneficial because it decreases attacker time within the network, reduces alert fatigue, and produces useful metrics that demonstrate indicators of compromise, helping to prevent future breaches.

    When it comes to incident detection, time and context are crucial, and the quicker threats are neutralized the better. Choosing deception technology that recognizes malicious activity early on in the attack chain buys your security team the time needed to respond quickly, and is the difference between a business just keeping up with new threats, and a business that is always one step ahead of attackers.

    In this session, we will discuss:
    - How deception technology provides a 360-degree approach to security
    - Why it’s important to have a deep understanding of attacker behavior
    - How deception technology improves visibility

    Speakers:
    - Tod Beardsley, Director of Research at Rapid7
    - Chris Dodt, Information Security Specialist at Freedom Financial Network
    - Jorge Orchilles, Chief Technology Officer at SCYTHE
    - Bryan Seely, Senior Security Architect & Evangelist at Cyemptive Technologies Inc
  • [APAC] A Comprehensive Guide to User Behaviour Analytics Oct 20 2021 3:00 am UTC 32 mins
    Tod Beardsley, Rapid7 | Carraig Stanwyck, Wave HQ | Nicholas Ashton, RFusion
    A Guide to Operational Security in 2021: Episode 6

    User behavior analytics (UBA) uncover patterns and insights, and are able to identify intruder compromise, insider threats, and suspicious activity within your network. As UBA is based on behavior, it can detect attacks that bypass threat intelligence, providing alerts earlier on in the attack chain and giving security teams more time to respond.

    Join us in this episode as we uncover the inherent value that UBA can provide, and why it is so useful for unveiling and neutralising threats.

    In this session, we will discuss:
    - How user behavior analytics can accelerate your incident detection and response
    - Why having insight into user behavior is so critical for businesses today
    - The value of an integrated detection and investigation solution, and how it uses UBA to detect attacks early on

    Speakers:
    - Tod Beardsley, Director of Research at Rapid7
    - Carraig Stanwyck, Director of Information Security at Wave HQ
    - Nicholas Ashton, President at RFusion
  • Building and Maintaining Trust With Your Security Oct 19 2021 4:00 pm UTC 60 mins
    Tod Beardsley, Rapid7 | Avinash Jain, Microsoft | Nitin Raina, ThoughtWorks
    A Guide to Operational Security in 2021: Episode 9

    When it comes to operational security, a holistic risk-based approach allows you to break down every level of your business to provide first-class security for your organization.

    But what are the essential, core pillars of an effective approach to security? From availability to transparency, this session will discuss best practices, use cases, and how to adopt a security program that puts the client and their data at the center.

    This session will give a comprehensive, one-stop shop approach to security, and discuss the essential pillars of cybersecurity that every company should have.

    Join as we discuss:
    - What is meant by “trust,” and how to achieve it
    - The value of transparency, privacy, and availability
    - The state of cybersecurity in 2021
    - Trends and patterns we expect to see in 2022

    Speakers:
    - Tod Beardsley, Director of Research at Rapid7
    - Avinash Jain, Security at Microsoft (Identity Platform), PM Manager at Microsoft
    - Nitin Raina, Vice President - Cyber and Information Security at ThoughtWorks
  • A Comprehensive Guide to User Behavior Analytics Recorded: Oct 14 2021 32 mins
    Tod Beardsley, Rapid7 | Carraig Stanwyck, Wave HQ | Nicholas Ashton, RFusion
    A Guide to Operational Security in 2021: Episode 6

    User behavior analytics (UBA) uncover patterns and insights, and are able to identify intruder compromise, insider threats, and suspicious activity within your network. As UBA is based on behavior, it can detect attacks that bypass threat intelligence, providing alerts earlier on in the attack chain and giving security teams more time to respond.

    Join us in this episode as we uncover the inherent value that UBA can provide, and why it is so useful for unveiling and neutralizing threats.

    In this session, we will discuss:
    - How user behavior analytics can accelerate your incident detection and response
    - Why having insight into user behavior is so critical for businesses today
    - The value of an integrated detection and investigation solution, and how it uses UBA to detect attacks early on

    Speakers:
    - Tod Beardsley, Director of Research at Rapid7
    - Carraig Stanwyck, Director of Information Security at Wave HQ
    - Nicholas Ashton, President at RFusion
  • [APAC] How to Protect Against Phishing Attacks at All Business Levels Recorded: Oct 13 2021 34 mins
    Tod Beardsley, Rapid7 | Carl Stern, Experity | Michael Palazzolo, Herman Miller | Ryan Manni, Hologic
    A Guide to Operational Security in 2021: Episode 5

    In a recent SANS survey, it was found that phishing was observed in 78% of organisations. With this amount of phishing occurring, it is crucial that organisations prepare themselves with effective and impactful phishing protection strategies.

    Though technology alone can’t stop phishing, it can help to reduce the harmful impact of phishing attacks on your business. For example, phishing protection allows employees to report suspected phishing attacks, while also providing your organisation with the collaborative tools needed to tackle phishing when it occurs.

    So, given the business benefits of phishing protection, what solution is right for your business?

    In this session, we will discuss:
    - Why phishing protection solutions are a must-have for your business
    - How to help employees more easily report suspected phishing
    - How to provide security teams with the necessary tools to investigate phishing reports

    Speakers:
    - Tod Beardsley, Director of Research at Rapid7
    - Carl Stern, CISSP, Director, Information Security at Experity
    - Michael Palazzolo, IT Analyst Technical Architect at Herman Miller
    - Ryan Manni, Senior Manager, Information Security at Hologic
  • Using Automation to Proactively Reduce & Manage Vulnerability Risk Recorded: Oct 12 2021 32 mins
    Jane Man - Director, Product Management - VRM at Rapid7 and Aniket Menon - Director, Product Management - SOAR at Rapid7
    The number and types of cyberattacks have been increasing dramatically while infosec personnel has been challenged to keep pace with all the vulnerabilities and incidents they now face. Since 76 percent of security leaders face a skills shortage, they are looking to vulnerability management automation to fill the gap. Automation is not just for the largest enterprises - we'll discuss how small to mid-size organizations can get started on the automation journey and benefit from a more effective vulnerability management program. Join us to hear about how automation can help security teams:
    - Address vulnerabilities and potential threats more quickly and efficiently
    - Improve collaboration and lessen the friction between IT and infosec teams
    - Reduce manual repetitive tasks so they can focus on more critical activities
  • How to Secure Critical Oil & Gas Pipelines in the era of Targeted Ransomware Recorded: Oct 7 2021 58 mins
    Ben Garber, Rapid7 & Carl Eshelman, SCADAfence
    Cyber security in the oil & gas industry has escalated the headlines as new advanced cyber threats are targeting operational technology (OT) networks. Over the past five years, different attacks on the industry have shown there is a major gap when it comes to having proper cyber security. A recent example is the Colonial Pipeline ransomware attack, where one of the largest fuel pipelines in the US, was forced to stop all operations due to falling victim to a ransomware attack.

    To truly understand what is happening in the OT network, oil & gas producers need a complete picture of their OT network to detect and mitigate any security risks or vulnerabilities. As more oil and gas organizations increase their digital transformation with the convergence of IT and OT networks, improved threat protection and remote connections management, they need to immediately improve the visibility and security of their OT networks.

    Join us during this webinar to learn:
    The distinction of IT-OT convergence within the oil & gas sector
    Common security risks and threats across the oil & gas industry
    How organizations can secure oil & gas pipelines
    Show how Rapid7 & SCADAfence can help oil & gas organizations plan ahead and reduce the impact of cyberattacks on their networks
    Showcase different oil & gas customer case studies
  • [APAC] Incident Detection and Response: Getting Into the Mindset of an Attacker Recorded: Oct 6 2021 36 mins
    Tod Beardsley, Rapid7 | Chad Kliewer, Pioneer | Steve Winterfeld, Akamai
    A Guide to Operational Security in 2021: Episode 4

    Nowadays, it's not a question of if you'll be breached, but when. Therefore, you need the people, processes, and technology in place to respond quickly and efficiently to attacks.

    While breaches have become a certainty, by adopting the mindset of an attacker, you can detect breaches in your network before they’re able to cause damage. This approach to incident detection and response directly informs the software and services needed to equip security professionals to do their best work.

    In this session, we will discuss:
    - Why it is so important to have an incident detection and response program before you are compromised
    - The kinds of technology solutions needed to support your organization
    - The value of incident detection solutions that adopt the mindset of an attacker, and what this can do for your business

    Speakers:
    - Tod Beardsley, Director of Research at Rapid7
    - Chad Kliewer, Information Security Officer at Pioneer
    - Steve Winterfeld, Advisory CISO at Akamai
  • Breaking Down Cloud Security: Securing Your Infrastructure Recorded: Oct 5 2021 38 mins
    Tod Beardsley, Rapid7 | Soo Youn Yi, Highmark Health | Sumit Sengupta, Microsoft
    A Guide to Operational Security in 2021: Episode 8

    Organizations are relying more and more on the flexibility and efficiency provided by cloud services. But it’s important to remember that cloud service providers only take responsibility for some security tasks. The customer is responsible for securing end user data, network traffic, and operating systems, as well as ensuring compliance with industry standards and regulations.

    Cloud platforms also introduce some extra complications for security, such as complex cloud-based security tools, security information silos that make identifying attacks difficult, and attacks that focus on cloud platforms. To address risks and navigate cloud security challenges, you need to find a vulnerability management solution that continuously monitors misconfigurations in cloud networks. But what solution is best for your organization, and what does cloud security look like on a day-to-day basis?

    In this session, we will discuss:
    - How to find vulnerabilities in the cloud
    - Cloud security complications and how to address them
    - How to detect threats and ensure compliance across hybrid and multi-cloud environments

    Speakers:
    - Tod Beardsley, Director of Research at Rapid7
    - Soo Youn Yi, Director, Cybersecurity Operations at Highmark Health
    - Sumit Sengupta, Cloud Solution Architect at Microsoft
  • The Hybrid Workspace Revisited: Trends, Insights and Best Practices Recorded: Oct 5 2021 49 mins
    Alex Hilton, Cloud Industry Forum | Sascha Giese, SolarWinds | John Ellis, Fujitsu | Dan Kelly, Rapid7
    Six months ago, Digital Transformation in Action looked at what emerging hybrid workspaces may look like and explored the cloud's role in powering them.

    In this month’s episode we’re taking another look, asking if our predictions came true and discussing how businesses are navigating the challenges and opportunities that the next generation of the office delivers.

    Join Alex Hilton and guests as they revisit their predictions and share:
    - Which companies are addressing the challenge of the hybrid workspace well
    - What cloud technologies are driving successful hybrid workspaces
    - Hybrid workspace challenges that cloud applications can help overcome
    - Investment considerations for IT leaders who are building the new generation of workspaces
    - And more
  • How to Protect Against Phishing Attacks at All Business Levels Recorded: Oct 5 2021 34 mins
    Tod Beardsley, Rapid7 | Carl Stern, Experity | Michael Palazzolo, Herman Miller | Ryan Manni, Hologic
    A Guide to Operational Security in 2021: Episode 5

    In a recent SANS survey, it was found that phishing was observed in 78% of organizations. With this amount of phishing occurring, it is crucial that organizations prepare themselves with effective and impactful phishing protection strategies.

    Though technology alone can’t stop phishing, it can help to reduce the harmful impact of phishing attacks on your business. For example, phishing protection allows employees to report suspected phishing attacks, while also providing your organization with the collaborative tools needed to tackle phishing when it occurs.

    So, given the business benefits of phishing protection, what solution is right for your business?

    In this session, we will discuss:
    - Why phishing protection solutions are a must-have for your business
    - How to help employees more easily report suspected phishing
    - How to provide security teams with the necessary tools to investigate phishing reports

    Speakers:
    - Tod Beardsley, Director of Research at Rapid7
    - Carl Stern, CISSP, Director, Information Security at Experity
    - Michael Palazzolo, IT Analyst Technical Architect at Herman Miller
    - Ryan Manni, Senior Manager, Information Security at Hologic
Supercharge Your Security Impact
Rapid7 is advancing security with visibility, analytics, and automation delivered through our Insight platform. Our solutions simplify the complex, allowing security teams to work more effectively with IT and development to reduce vulnerabilities, monitor for malicious behavior, investigate and shut down attacks, and automate routine tasks. Over 9,300 customers rely on Rapid7 technology, services, and research to improve security outcomes and securely advance their organizations. For more information, visit our website rapid7.com.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: EMEA Series: Security - a transformation enabler
  • Live at: Aug 5 2021 9:00 am
  • Presented by: Marcus Eaton, Senior Security Solutions Engineer, Rapid7, International & Ash Dunn, Head Of Information Security, OVO Energy
  • From:
Your email has been sent.
or close