Hi [[ session.user.profile.firstName ]]

Modernizing SecOps With Software-Driven Detection and Investigation

The security landscape is more complex than ever. Cybersecurity professionals are challenged by threat detection and response. As organizations confront resource constraints, how can they stay ahead of unknown and emerging cyber threats?

What you will learn:
-How cloud-native software is transforming security
-Understand how data science and machine learning principles best apply to security
-See a demo of how Red Cloak TDR can be used to detect and investigate a real-world attack scenario
Recorded Aug 4 2020 72 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Matt DeMatteo, Sr. Principal Engineer, Secureworks
Presentation preview: Modernizing SecOps With Software-Driven Detection and Investigation

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Top 8 Cybersecurity Incident Response Plan Failures Recorded: Oct 22 2020 56 mins
    Rob Lelewski, Senior Incident Response Consultant – Secureworks
    Each year, Secureworks performs hundreds of proactive incident response exercises and emergency response engagements for a variety of industries, globally. During these engagements, consistent Cybersecurity Incident Response Plan failures are observed, regardless of their maturity level or industry vertical.

    Listen to this webcast where Rob Lelewski, Senior Incident Response Consultant, will highlight and discuss the common organizational shortcomings observed by Secureworks, which hinder organizations’ abilities to respond to security incidents.

    What You Will Learn:

    -- Top organizational deficiencies in responding to incidents.
    -- Impact of organizational deficiencies on the incident response process.
    -- Recommendations on fixing deficiencies.
  • What Buyers Need to Know Before Investing in Managed Detection & Response (MDR) Recorded: Oct 15 2020 31 mins
    Joakim Lialias, Secureworks and Craig Robinson, IDC
    Managed Detection and Response is a rapidly emerging security solution seeing increased demand in the marketplace. But what are the trends driving MDR services and what do buyers need to know when evaluating a security vendor? This webcast helps to make sense of the noisy market and shares IDC’s unbiased views and data points.

    Explore and learn more about the trends shaping the dynamic MDR market. Discussion topics include:

    •7 overarching trends in cybersecurity
    •How digital transformation is causing an exponential jump in complexity
    •What is driving the need for MDR Services?
    •What are CISOs looking for in managed security service providers (MSSP)?
    •What is the market definition of MDR?
    •What 5 things should an organization look for when choosing an MDR provider?
    •Which advanced detection and analytic techniques are most important to security leaders – machine learning, AI, big data, behavioral analytics, threat hunting, or others?
    •Where is the market headed and where are we today?
  • Creating the SOC of the Future Recorded: Oct 8 2020 43 mins
    Wendy Thomas, Chief Product Officer, Secureworks and Jon R. Ramsey, Chief Technical Officer, Secureworks
    The Security Operation Center or SOC has historically played the important role as the ‘command and control’ hub for an organization’s cybersecurity efforts. However, the reactive SOC of yester-year cannot keep up with today’s advanced adversaries and is failing to keep organizations safe from unknown cyber threats. This must change.

    What you will learn:

    -How the global security community is coming together to define the SOC of the Future requirements.

    -How Human-Machine intelligence, Artificial Intelligence and Advance Analytic Software give organizations an enduring advantage over the adversary.

    -Emerging analytics tools, real world use cases and software-driven solutions that are transforming the way security teams detect, investigate, and respond to unknown threats across endpoints, networks, and the cloud.
  • How Data Science is Changing Cybersecurity Recorded: Sep 30 2020 61 mins
    Matt DeMatteo - Sr. Principal Engineer, Secureworks
    Data science has become a buzzword in the industry, but what does it really mean for cybersecurity teams? Listen to a Secureworks® expert cut through the hype of data science and explain how it can help you address today’s cybersecurity challenges.

    You'll learn:
    -The fundamentals of solving problems with data science
    -How data science solutions will affect security operations teams
    -What challenges lie ahead for adoption of data science solutions
    -Once organizations have a better understanding of how data science can help them, analyzing alerts will start looking less like whack-a-mole and more like CSI.
  • Is MDR a Revolution in Managed Security Services? Recorded: Sep 29 2020 63 mins
    Matt DeMatteo - Sr. Principal Engineer, Secureworks
    Managed Detection and Response (MDR) solutions are an attractive option for companies who want to optimize threat detection and response times. But is MDR much different from traditional managed security services? And how effective is it at increasing security productivity?

    Matt DeMatteo, Sr. Principal Engineer at Secureworks, has the answer to these questions. Join him for this webcast as he explains the differences between MDR and MSS services and shows you what differentiates good MDR from bad MDR.

    In this webcast, you'll learn:
    -The differences between MDR and MSS to help you choose the right security partner
    -How to identify the most effective MDR features and options in a rapidly growing marketplace
    -How you should determine which areas of your program will need realignment to help you realize value faster
  • Modernizing SecOps With Software-Driven Detection and Investigation Recorded: Aug 4 2020 72 mins
    Matt DeMatteo, Sr. Principal Engineer, Secureworks
    The security landscape is more complex than ever. Cybersecurity professionals are challenged by threat detection and response. As organizations confront resource constraints, how can they stay ahead of unknown and emerging cyber threats?

    What you will learn:
    -How cloud-native software is transforming security
    -Understand how data science and machine learning principles best apply to security
    -See a demo of how Red Cloak TDR can be used to detect and investigate a real-world attack scenario
  • Top 8 Cybersecurity Incident Response Plan Failures Recorded: Jul 7 2020 56 mins
    Rob Lelewski, Senior Incident Response Consultant – Secureworks
    Each year, Secureworks performs hundreds of proactive incident response exercises and emergency response engagements for a variety of industries, globally. During these engagements, consistent Cybersecurity Incident Response Plan failures are observed, regardless of their maturity level or industry vertical.

    Listen to this webcast where Rob Lelewski, Senior Incident Response Consultant, will highlight and discuss the common organizational shortcomings observed by Secureworks, which hinder organizations’ abilities to respond to security incidents.

    What You Will Learn:

    -- Top organizational deficiencies in responding to incidents.
    -- Impact of organizational deficiencies on the incident response process.
    -- Recommendations on fixing deficiencies.
  • Making Sense of MITRE ATT&CK Evaluations to Address Your Cybersecurity Needs Recorded: Jun 30 2020 56 mins
    Paul DiOrio, Lee Lawson, Patrick Donegan
    The MITRE ATT&CK Framework is a common industry language of threat actor tactics and techniques based on real-world observations. MITRE regularly conducts product evaluations to provide independent transparency on the capabilities of security products to defend against known cyber adversary attacks.

    This webcast explains how MITRE evaluations use their ATT&CK Framework to simulate attack scenarios that security vendors must then detect as quickly as possible. You’ll also hear about our results and perspective as a recent participant. Security teams can leverage the results of these evaluations to assess the array of vendor options against a common standard, think about key visibility points within their environment, and review their own detection coverage and security strategies.

    Watch this presentation to learn:

    •The detection categories the MITRE evaluation uses – and what an endpoint product needs to do
    •How our cloud-based Red Cloak™ Threat Detection and Response application delivered accurate, early detections of attacks
    •How to use MITRE ATT&CK evaluation results to inform your security decisions
  • Lessons from the Field: How Are Skilled Testers Infiltrating? Recorded: Jun 23 2020 59 mins
    Nate Drier, Senior Consultant, Secureworks and Jared McLaren, Senior Consultant, Secureworks
    Many organizations perform regular annual or bi-annual testing to identify network vulnerabilities, gaps in their controls and satisfy industry compliance requirements. Examining results and lessons learned can be limited. However, wouldn’t it be nice to see what tactics and techniques some of the most skilled testers out there are utilizing across all industries, all levels of maturity and to serve a variety of different objectives?

    Join this webcast for an opportunity to see how good guys simulate the bad guys and gain valuable insights. In this webcast you will hear from some of Secureworks’ most skilled testers, Nate Drier and Jared McLaren, as they talk about lessons learned from some of their most challenging engagements and the trends they are seeing with clients and their defense practices.

    Key topics covered include:

    •Examples of real-world engagements
    •Tactics and techniques commonly used to achieve their objectives
    •Trends and weaknesses seen in defenses
    •Insights and lessons learned
  • What Buyers Need to Know Before Investing in Managed Detection & Response (MDR) Recorded: Jun 16 2020 31 mins
    Joakim Lialias, Secureworks and Craig Robinson, IDC
    Managed Detection and Response is a rapidly emerging security solution seeing increased demand in the marketplace. But what are the trends driving MDR services and what do buyers need to know when evaluating a security vendor? This webcast helps to make sense of the noisy market and shares IDC’s unbiased views and data points.

    Explore and learn more about the trends shaping the dynamic MDR market. Discussion topics include:

    •7 overarching trends in cybersecurity
    •How digital transformation is causing an exponential jump in complexity
    •What is driving the need for MDR Services?
    •What are CISOs looking for in managed security service providers (MSSP)?
    •What is the market definition of MDR?
    •What 5 things should an organization look for when choosing an MDR provider?
    •Which advanced detection and analytic techniques are most important to security leaders – machine learning, AI, big data, behavioral analytics, threat hunting, or others?
    •Where is the market headed and where are we today?
  • Creating the SOC of the Future Recorded: Jun 11 2020 43 mins
    Wendy Thomas, Chief Product Officer, Secureworks and Jon R. Ramsey, Chief Technical Officer, Secureworks
    The Security Operation Center or SOC has historically played the important role as the ‘command and control’ hub for an organization’s cybersecurity efforts. However, the reactive SOC of yester-year cannot keep up with today’s advanced adversaries and is failing to keep organizations safe from unknown cyber threats. This must change.

    What you will learn:

    -How the global security community is coming together to define the SOC of the Future requirements.

    -How Human-Machine intelligence, Artificial Intelligence and Advance Analytic Software give organizations an enduring advantage over the adversary.

    -Emerging analytics tools, real world use cases and software-driven solutions that are transforming the way security teams detect, investigate, and respond to unknown threats across endpoints, networks, and the cloud.
  • Creating the SOC of the Future Recorded: Jun 9 2020 43 mins
    Wendy Thomas, Chief Product Officer, Secureworks and Jon R. Ramsey, Chief Technical Officer, Secureworks
    The Security Operation Center or SOC has historically played the important role as the ‘command and control’ hub for an organization’s cybersecurity efforts. However, the reactive SOC of yester-year cannot keep up with today’s advanced adversaries and is failing to keep organizations safe from unknown cyber threats. This must change.

    What you will learn:

    -How the global security community is coming together to define the SOC of the Future requirements.

    -How Human-Machine intelligence, Artificial Intelligence and Advance Analytic Software give organizations an enduring advantage over the adversary.

    -Emerging analytics tools, real world use cases and software-driven solutions that are transforming the way security teams detect, investigate, and respond to unknown threats across endpoints, networks, and the cloud.
  • How to Breach Security 101: Lessons from the Field Recorded: Oct 15 2019 59 mins
    Nate Drier, Senior Consultant, and Jared McLaren, Senior Consultant
    Gain insights from the good guys simulating the bad guys.

    Many organizations perform regular annual or bi-annual testing to identify network vulnerabilities, gaps in their controls and satisfy industry compliance requirements. Examining results and lessons learned can be limited. However, wouldn’t it be nice to see what tactics and techniques some of the most skilled testers out there are utilizing across all industries, all levels of maturity and to serve a variety of different objectives?

    Join this webcast for an opportunity to see how good guys simulate the bad guys and gain valuable insights. In this webcast you will hear from some of Secureworks’ most skilled testers, Nate Drier and Jared McLaren, as they talk about lessons learned from some of their most challenging engagements and the trends they are seeing with clients and their defense practices.
  • Introducing Red Cloak™ Threat Detection & Response Recorded: Aug 6 2019 58 mins
    John H. Collins, CISSP - Director, Solution Engineering SaaS Security Applications
    For more than 20 years, you’ve known the world-leading threat intelligence and industry-recognized services from Secureworks. Now, it’s time you know Red Cloak Threat Detection and Response, and hear directly from our experts.

    Red Cloak Threat Detection and Response is a cloud-based security analytics application that transforms the way your security team detects, investigates and responds to threats across your endpoints, network and cloud. Built by a team of data scientists and engineers with experience solving big data cybersecurity challenges for intelligence agencies, Red Cloak TDR enables you to detect advanced threats, trust your alerts, streamline and collaborate on investigations and automate the right action.
  • The Transformative Effect of Data Science and Machine Learning Recorded: Jun 26 2019 60 mins
    Tim Vidas - Senior Distinguished Engineer, Nash Borges PhD, Sr Director of Engineering and Data Science
    The combination of big data and machine learning is making it possible for defenders with limited resources and expertise to detect and respond to unknown threats faster than ever before. In an industry forever locked in an adversarial battle with increasingly sophisticated actors, Tim Vidas, Distinguished Senior Engineer, and Nash Borges PhD, Sr Director of Engineering and Data Science at Secureworks explain how the power of machine learning combined with human intelligence have become fundamental to defending the digital economy.
  • Improving Incident Response Outcomes Recorded: Feb 21 2019 61 mins
    Matthew Webster, Senior Security Researcher, Secureworks Counter Threat Unit
    All too often companies are learning the hard way — during an incident — how they could have been better prepared to stop the threat or reduce the damage. Join us for a one hour webcast, hosted by SC Magazine, featuring the key findings of Secureworks newly-released Incident Response Insights Report 2018: Risks, Remedies, and Best Practices for Defending Against Cyber Threats.

    Webcast takeaways will include:
    - Threat and attack trends identified by responders in 2017.
    - Lessons learned by organizations in a wide variety of incident response (IR) scenarios.
    - Key recommendations for IR planning, practices and capabilities that improve security defenses and mitigate business risk.
    - Live Q&A with experts from our Counter Threat Unit™ (CTU) and Incident Response team.

    In 2017, Secureworks’ team of incident responders helped hundreds of organizations navigate through complex and high-risk security incidents. Now the top insights from those collective engagements will be shared by speakers from the Secureworks Counter Threat Unit and Incident Response practice.

    This program offers the support you need to prepare better for emerging threats, understand how you might be vulnerable, and respond more effectively when an incident does occur. Program content is appropriate for cybersecurity leaders, incident responders, CIOs, CTOs, and executives with responsibility for enterprise risk management.
  • Cyber Global Warming: Real Life Malscape Insights Recorded: Feb 14 2019 49 mins
    Andy Norton, Director, Threat Intelligence, Lastline and Michael Rico, Senior Intrusion Analyst, Secureworks
    Layered security has been the mantra for many years, but this methodology leaves gaps the adversary can leverage to compromise your organization. Applying high fidelity cyber acumen with innovative Behavioral Intelligence technology can help increase your cybersecurity resilience. With this combination of advanced technology and human expertise you can better identify and remediate malicious web and email activity to improve your security program and close gaps.

    What You Will Learn:

    - The factors leading to Cyber Global Warming and how you can avoid the pitfalls
    - Global threat trends identified via Lastline’s behavioral intelligence
    - How to measure your cyber resilience
    - Why structured investigations help you get more value from your security tools
    - How a managed network sandbox with Secureworks expertise helped an organization identify a real life attack
  • State of Cybercrime Report 2018: Key Findings Recorded: Jan 15 2019 57 mins
    Alex Tilley, Secureworks Senior Security Researcher
    From July 2017 through June 2018, Secureworks Counter Threat Unit® (CTU®) researchers analyzed incident response outcomes and conducted original research to gain insight into threat activity and behavior across 4,400 companies. Their findings, which include new data about who is conducting what types of attacks and why, will be shared in person by CTU experts on this webcast.

    We’ll examine a small subset of professional criminal actors responsible for the bulk of cybercrime-related damage worldwide and explain: how they’re leveraging the underground hacker economy, why they can’t be seen by researchers and law enforcement who monitor the dark web, and how we know their tools and techniques are as sophisticated, targeted and insidious as most nation-state actors.

    You’ll also learn how constant “background noise” from low-level criminality is impacting businesses around the world and see latest cost of stolen goods, hacking tools, and hacking services on the underground marketplace.

    Additionally, get insight on these key findings from the report:

    - Ransomware is now more sophisticated than ever. Secureworks’ CTU researchers observed no less than 257 new and distinct ransomware families in 12 months
    - Cryptocurrency mining remains an extremely popular way for criminals to monetize access to infected computers. In 2017, at least one in three organizations experienced cryptocurrency mining activity on their network.
    - Criminal gangs have combined advanced social engineering and network intrusion techniques with POS malware to generate millions of dollars of revenue through stolen payment card data. According to the FBI, business email compromise and business email spoofing alone have now generated $12B in financial losses since October 2013.
  • How the Counter Threat Unit™ Sets Secureworks Consulting Services Apart Recorded: Jan 25 2018 57 mins
    Panel of Secureworks Information Security Strategic and Technical Consultants
    As the scope for security skill and expertise demanded of organizations extends, CISOs are increasingly turning to security consulting partners for strategic guidance and technical and advisory expertise.

    There are a broad range of organizations in today’s market offering security consultancy services based on best practices and standard frameworks. Partnering with one of these firms can provide your organization with the technical expertise to improve network visibility and gain a clearer understanding of your vulnerabilities, provide the strategic and practical guidance that helps you prioritize and build out programs that enable business objectives, as well as advise on how to effectively engage with the C-suite.

    What truly sets Secureworks’ information security consulting services apart is how we utilize our Counter Threat Unit™ and knowledge garnered from thousands of client engagements to ensure you are being consulted on the latest industry trends and threats. This way, the outcome is based on real-world scenarios that matter to your organization.

    Join consultants across our technical and strategic practices as they share lessons learned from their most challenging engagements and the value that real-time threat intelligence has brought to those engagements.

    Key topics discussed include:

    • Examples of real-world engagements where the CTU™ and Consulting Practice improved the outcomes for clients
    • Tools consultants use to ensure that your outcome is based on real-world scenarios and threats that matter to your organization
    • Lessons learned from our most strategic and complex engagements
  • 4 Reasons Next-Generation Antivirus Should Be Your Next Managed Service Recorded: Sep 26 2017 53 mins
    John Collins, SecureWorks Counter Threat Unit Principal Architect | Mike Viscuso, Carbon Black CTO
    There seems to be no shortage of threats these days with attackers constantly innovating and combining different techniques with classic malware. New ransomware variants, targeted espionage campaigns, and attacks that don’t use malware at all are just a few threats that put your organization at risk. As each new attack generates global headlines, it can feel a bit overwhelming.

    It’s increasingly clear that the signature-based approach of traditional antivirus (AV) can no longer provide the protection needed to keep attackers off your endpoints. Join John Collins, SecureWorks Counter Threat Unit Principal Architect and Mike Viscuso, Carbon Black CTO, as they discuss how managed Next-Generation Antivirus (NGAV) goes beyond malware prevention to ensure that organizations of all sizes stay out of the security headlines and one step ahead of emerging cyber threats.

    You will learn:
    • What are the indicators that I need NGAV?
    • How do I know when it is time to make the move from traditional AV to NGAV?
    • Why is managed NGAV better able to address Ransomware, PowerShell and WMI threats?
    • What managed NGAV can do for you
Information Security Thought Leadership
Secureworks® (NASDAQ: SCWX) a global cybersecurity leader, enables our customers and partners to outpace and outmaneuver adversaries with more precision, so they can rapidly adapt and respond to market forces to meet their business needs. With a unique combination of cloud-native, SaaS security platform and intelligence-driven security solutions, informed by 20+ years of threat intelligence and research, no other security platform is grounded and informed with this much real-world experience.
www.secureworks.com

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Modernizing SecOps With Software-Driven Detection and Investigation
  • Live at: Aug 4 2020 7:30 pm
  • Presented by: Matt DeMatteo, Sr. Principal Engineer, Secureworks
  • From:
Your email has been sent.
or close