Hi [[ session.user.profile.firstName ]]

Preventing/Detecting Cyberattacks with the SecureWorks Counter Threat Platform™

Learn all about the exciting new capabilities of the Secureworks Counter Threat Platform and how these enhancements can better
protect your organization from attacks while improving productivity within your security teams.

This year, SecureWorks has been focusing on increasing efficiency and working to improve our clients’ experience.
Our goal is to free up our analysts to have more time to focus on true-positive events and channel their expertise where it best serves you.

Join Kevin Schmidt, Senior Manager from our Engineering team to learn about the major enhancements to the CTP:

• Automated Asset Management (“V2”)
• iSensor Shun/Trust Self-service
• Multi-purpose Logic Engine (MPLE) Review Capability
• Live Q&A
Recorded Nov 8 2017 19 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Kevin Schmidt, Senior Engineer Manager
Presentation preview: Preventing/Detecting Cyberattacks with the SecureWorks Counter Threat Platform™

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • 2017: Solutions Release Year in Review Recorded: Dec 19 2017 50 mins
    Matt Eberhart, VP, Global Product Management
    Throughout the year, Secureworks adds new solutions and enhances existing solutions that help clients fight cyberattacks.

    It’s important to us that you know about all the ways Secureworks can bring value to our partnership with you—from security services and products to Cloud and Counter Threat Platform™ capabilities, not just today, but how we have evolved during this past year. We will also cover how the changing threat landscape is shaping the innovations we are bringing forth in the next year to continue to help you unleash the value of your security investment.

    If you are interested in seeing what has happened in the last year and understand new opportunities that will help your companies thrive securely in this digitally connected world, then join us. You will learn about:

    • Overview of all releases
    • Deep dive on a few key releases including: Counter Threat Platform Enhancements, NextGen AV, iSensor Enhancements, and Advanced Remediation Management
    • A preview to a few 2018 Solution Innovations
    • Live Q&A
  • ClientSelect Exclusive: Client Portal Updates Recorded: Nov 30 2017 31 mins
    Eric Hemmendinger, Senior Product Manager
    Learn all about the capabilities of the Secureworks Client Portal and how it can assist your organization to stay informed and aware.

    The Secureworks Client Portal provides you with a complete view into your security and compliance posture with advanced reporting functionality integrated across all of our Managed Security and Threat Intelligence services. With 4,400 clients in more than 61 countries, the Secureworks Client Portal is an extension of your security operations and a connection to our Security Operation Center (SOC).

    Join Eric Hemmendinger, Senior Product Manager for the Client Portal, to learn about the some major enhancements, listed below, before we move onto a live Q&A session.

    Client Portal
    • Threat Intellligence from our Counter Unit is now available in all ticket summary to provide more context behind each incident.
    • Health Charts – Enhanced Visibility with Health Tickets
    • Bulk ticket Resolution – Improves speed and efficiency with your ticket management process

    We are excited about the changes to the Client Portal we are bringing and the positive impact the new improvements will have on your ability to prevent, detect, rapidly respond to and predict cyberattacks.

    We sincerely hope you can join us for this live webcast and take part in the discussion.
  • ClientSelect Exclusive: Client Portal Updates Recorded: Nov 29 2017 38 mins
    Eric Hemmendinger, Senior Product Manager
    Learn all about the capabilities of the Secureworks Client Portal and how it can assist your organization to stay informed and aware.

    The Secureworks Client Portal provides you with a complete view into your security and compliance posture with advanced reporting functionality integrated across all of our Managed Security and Threat Intelligence services. With 4,400 clients in more than 61 countries, the Secureworks Client Portal is an extension of your security operations and a connection to our Security Operation Center (SOC).

    Join Eric Hemmendinger, Senior Product Manager for the Client Portal, to learn about the some major enhancements, listed below, before we move onto a live Q&A session.

    Client Portal
    • Threat Intellligence from our Counter Unit is now available in all ticket summary to provide more context behind each incident.
    • Health Charts – Enhanced Visibility with Health Tickets
    • Bulk ticket Resolution – Improves speed and efficiency with your ticket management process

    We are excited about the changes to the Client Portal we are bringing and the positive impact the new improvements will have on your ability to prevent, detect, rapidly respond to and predict cyberattacks.

    We sincerely hope you can join us for this live webcast and take part in the discussion.
  • Preventing/Detecting Cyberattacks with the SecureWorks Counter Threat Platform™ Recorded: Nov 8 2017 19 mins
    Kevin Schmidt, Senior Engineer Manager
    Learn all about the exciting new capabilities of the Secureworks Counter Threat Platform and how these enhancements can better
    protect your organization from attacks while improving productivity within your security teams.

    This year, SecureWorks has been focusing on increasing efficiency and working to improve our clients’ experience.
    Our goal is to free up our analysts to have more time to focus on true-positive events and channel their expertise where it best serves you.

    Join Kevin Schmidt, Senior Manager from our Engineering team to learn about the major enhancements to the CTP:

    • Automated Asset Management (“V2”)
    • iSensor Shun/Trust Self-service
    • Multi-purpose Logic Engine (MPLE) Review Capability
    • Live Q&A
  • Preventing/Detecting Cyberattacks with the SecureWorks Counter Threat Platform™ Recorded: Nov 7 2017 27 mins
    Kevin Schmidt, Senior Engineer Manager
    Learn all about the exciting new capabilities of the Secureworks Counter Threat Platform and how these enhancements can better
    protect your organization from attacks while improving productivity within your security teams.

    This year, SecureWorks has been focusing on increasing efficiency and working to improve our clients’ experience.
    Our goal is to free up our analysts to have more time to focus on true-positive events and channel their expertise where it best serves you.

    Join Kevin Schmidt, Senior Manager from our Engineering team to learn about the major enhancements to the CTP:

    • Automated Asset Management (“V2”)
    • iSensor Shun/Trust Self-service
    • Multi-purpose Logic Engine (MPLE) Review Capability
    • Live Q&A
  • “NotPetya” Ransomware Webcast – from SecureWorks® Threat Intelligence Recorded: Jun 30 2017 44 mins
    Aaron Shelmire and Mike McLellan, Security Researchers, Counter Threat Unit
    SecureWorks Counter Threat Unit™ (CTU) researchers will discuss details of the “NotPetya” Ransomware attack. Our experts will discuss this and similar attacks, help organizations explain the importance of avoiding malicious attempts and discuss the value of recommended mitigation tactics.

    In this webcast we will discuss:
    • History and timeline of this attack and how it began
    • What is this ransomware, how is it different from others and how it operates
    • Why this is not Petya or Goldeneye
    • How to be vigilant of misinformation
    • SecureWorks recommended actions to protect yourself
    • Interactive Q&A session
  • How Trust in Third Parties Can Open the Door Recorded: Jun 7 2017 56 mins
    Ryan Cobb, Incident Response Consultant, SecureWorks and Jason Epstein, Director of Procurement, SecureWorks
    When a targeted threat group runs into an obstacle trying to enter a victim’s network, they will often switch gears and try a new tactic. If they cannot enter through the front door, they will try the side door. That means they will compromise third parties (vendors, suppliers) as a means to gain access to well-defended networks.

    In a recent Ponemon study, 73 percent of respondents see the number of cybersecurity incidents involving vendors increasing¹. Securing your organization’s borders alone is no longer sufficient; your vulnerabilities now extend to the ends of your vendors’ networks.

    You are invited to join two experts from SecureWorks in a dialogue of precautionary tactics that should be taken to identify and defend against prospective vulnerabilities within the supply chain. Our discussion will include the importance of setting a vendor management strategy, identifying potential vulnerabilities and securing the endpoints.

    ¹Ponemon Institute, Data Risk in the Third-Party Ecosystem, April 2016
    https://www.ponemon.org/local/upload/file/Data%20Risk%20in%20the%20Third%20Party%20Ecosystem_BuckleySandler%20LLP%20and%20Treliant%20Risk%20Advisors%20LLC%20Ponemon%20Research%202016%20-%20FINAL2.pdf
  • How Trust in Third Parties Can Open the Door Recorded: Jun 6 2017 54 mins
    Ryan Cobb, Incident Response Consultant, SecureWorks and Jason Epstein, Director of Procurement, SecureWorks
    When a targeted threat group runs into an obstacle trying to enter a victim’s network, they will often switch gears and try a new tactic. If they cannot enter through the front door, they will try the side door. That means they will compromise third parties (vendors, suppliers) as a means to gain access to well-defended networks.

    In a recent Ponemon study, 73 percent of respondents see the number of cybersecurity incidents involving vendors increasing¹. Securing your organization’s borders alone is no longer sufficient; your vulnerabilities now extend to the ends of your vendors’ networks.

    You are invited to join two experts from SecureWorks in a dialogue of precautionary tactics that should be taken to identify and defend against prospective vulnerabilities within the supply chain. Our discussion will include the importance of setting a vendor management strategy, identifying potential vulnerabilities and securing the endpoints.

    ¹Ponemon Institute, Data Risk in the Third-Party Ecosystem, April 2016
    https://www.ponemon.org/local/upload/file/Data%20Risk%20in%20the%20Third%20Party%20Ecosystem_BuckleySandler%20LLP%20and%20Treliant%20Risk%20Advisors%20LLC%20Ponemon%20Research%202016%20-%20FINAL2.pdf
  • The SecureWorks™ Perspective: WannaCry (WCry) Ransomware Attack Recorded: May 17 2017 60 mins
    Keith Jarvis and Aaron Shelmire, Counter Threat Unit Research Team
    On May 12th, a large cyberattack using WannaCry was launched infecting hundreds of thousands of computers in 150 countries. This ransomware attack has hit multiple continents and continues to spread and propagate – meaning the worst might not be over.

    Join SecureWorks Counter Threat Unit™ (CTU™) researchers, Keith Jarvis and Aaron Shelmire in this exclusive client webcast, where they discuss details of the WannaCry (WCry) Ransomware attack. Our experts will discuss this, and similar attacks, and help your organization explain the importance of avoiding malicious attempts and the value of keeping up to date with patches and software versions.

    In this webcast we will discuss:

    - History and timeline of how it began
    - What is this ransomware and how does it operate
    - How to avoid becoming a victim
    - How to be vigilant of misinformation
    - SecureWorks recommended actions to protect yourself
    - Interactive Q&A session
  • The SecureWorks™ Perspective: WannaCry (WCry) Ransomware Attack Recorded: May 17 2017 61 mins
    Keith Jarvis and Aaron Shelmire, Counter Threat Unit Research Team
    On May 12th, a large cyberattack using WannaCry was launched infecting hundreds of thousands of computers in 150 countries. This ransomware attack has hit multiple continents and continues to spread and propagate – meaning the worst might not be over.

    Join SecureWorks Counter Threat Unit™ (CTU™) researchers, Keith Jarvis and Aaron Shelmire in this exclusive client webcast, where they discuss details of the WannaCry (WCry) Ransomware attack. Our experts will discuss this and similar attacks and help your organization explain the importance of avoiding malicious attempts and the value of keeping up to date with patches and software versions.

    In this webcast we will discuss:

    - History and timeline of how it began
    - What is this ransomware and how does it operate
    - How to avoid becoming a target
    - How to be vigilant of misinformation
    - SecureWorks recommended actions to protect yourself
    - Interactive Q&A session
  • 2017 Cybersecurity Threat Insights Report for Leaders Recorded: Feb 23 2017 63 mins
    Chris Yule, David Puzas
    In our "2017 Cybersecurity Threat Insights Report for Leaders" report, we shared several key findings and observations from our client engagements and about the security industry. This webcast covers our findings and observations but will also provide you with clear direction on where you need to focus your resources to evoke positive action in your security program.

    During this webcast one of our lead Counter Threat Unit™ researchers, Chris Yule, who helped develop the report, gives his perspective, observations and guidance through responses to a series of questions led by our Product Marketing Director, David Puzas.

    You Will Learn About:
    • Our observations from our engagements and findings
    • How you need to rethink core security processes and operations
    • Whether the current nature and behaviors of the threat are evolving or staying constant
    • What the common attack vectors are and how to protect your organization against the fundamentals of cyber-attacks
    • How to focus your resources from a tactical and strategic perspective
  • Exclusive ClientSelect Webcast for North America Recorded: Feb 9 2017 41 mins
    Pat Lee, Senior Security Consultant, CTU-CTAC Future Operations, SecureWorks
    Benefit from Greater Prevention and Detection of Cyberattacks with the Enhanced SecureWorks Counter Threat Platform™ (CTP)

    Learn all about exciting new capabilities of the SecureWorks Counter Threat Platform and how these enhancements can better protect your organization from attacks while bringing productivity benefits to your security teams.

    At SecureWorks we are constantly striving to improve not only the level of service that we provide to you, our clients, but also the technology behind our Managed Security Services. Over the past 12 months, SecureWorks engineers have been burning the midnight oil to design, implement and deliver enhanced capabilities within the Counter Threat Platform. We want to provide our clients in North America with an overview of the improvements we have made, as well as the opportunity to ask questions.

    Join Pat Lee, Senior Security Consultant, to learn about the four major enhancements to the CTP, listed below, before we move onto a live Q&A session.

    - Gain rapid insight and accuracy of your security incidents with Dynamic Incident Severity Correlation (DISC)
    - Minimize false escalations with Asset Data Correlation
    - Benefit from deeper business driven context and intelligence with Long Term Correlation
    - Improve productivity and efficiency through continuous response with ForeSee

    We are excited about the changes to the CTP we are bringing and the positive impact the new improvements will have on your ability to prevent, detect, rapidly respond to and predict cyberattacks.

    We sincerely hope you can join us for this live webcast and take part in the discussion.
  • Exclusive ClientSelect Webcast for EMEA Recorded: Feb 2 2017 36 mins
    Ross Bowerman, Senior Manager, CTAC, SecureWorks
    Benefit from Greater Prevention and Detection of Cyberattacks with the Enhanced SecureWorks Counter Threat Platform™ (CTP)

    Learn all about exciting new capabilities of the SecureWorks Counter Threat Platform and how these enhancements can better protect your organisation from attacks while bringing productivity benefits to your security teams.

    At SecureWorks we are constantly striving to improve not only the level of service that we provide to you, our clients, but also the technology behind our Managed Security Services. Over the past 12 months, SecureWorks engineers have been burning the midnight oil to design, implement and deliver enhanced capabilities within the Counter Threat Platform. We want to provide our clients in EMEA with an overview of the improvements we have made, as well as the opportunity to ask questions.

    Join, Ross Bowerman, Senior Network Security Manager to learn about the four major enhancements to the CTP, listed below, before we move onto a live Q&A session.

    - Gain rapid insight and accuracy of your security incidents with Dynamic Incident Severity Correlation (DISC)
    - Minimise false escalations with Asset Data Correlation
    - Benefit from deeper business driven context and intelligence with Long Term Correlation
    - Improve productivity and efficiency through continuous response with ForeSee

    We are excited about the changes to the CTP we are bringing and the positive impact the new improvements will have on your ability to prevent, detect, rapidly respond to and predict cyberattacks.
    We sincerely hope you can join us for this live webcast and take part in the discussion.
  • Lessons from the field: How are skilled technical testers infiltrating networks? Recorded: Nov 10 2016 58 mins
    Nate Drier and Trenton Ivey, Security Analysis Consultants, SecureWorks
    While many organizations have technical testing performed a couple of times a year for a number of reasons: such as identifying network vulnerabilities or satisfying industry compliance requirements, the results and lessons learned are typically limited. However, wouldn’t it be nice to see what tactics and techniques some of the most skilled testers out there are utilizing across all industries in all different levels of scope? Think of it as opportunity to learn from the good guys simulating the bad guys without having to have it done to your organization.

    Join this webcast and hear from some of SecureWorks most skilled technical testers, Nate Drier and Trenton Ivey, who will talk about lessons learned from some of their most challenging engagements and the trends they are seeing with clients and their defense practices.

    Key topics covered include:

    - Examples of real-world engagements
    - Tactics and techniques commonly used to achieve their objectives
    - Trends and weaknesses they are seeing in defenses
    - Lessons learned
  • Cloud Security and Cloud Solutions from SecureWorks Recorded: Aug 16 2016 20 mins
    Cameron Smith, SecureWorks Cloud Product Management and Paula Rhea, SecureWorks Cloud Marketing
    View this on-demand webcast to learn how Cloud Computing is transforming organizations to make them more agile, flexible, customer centric and optimized. Watch the webcast with Cameron Smith/Cloud Product Management and Paula Rhea/Cloud Marketing to hear:

    - About the cloud adoption model and various stages of progress with pros and cons
    - How your peers are adopting various cloud models such as IaaS
    - The shared cloud responsibility model between you and the cloud provider
    - What cloud security solutions are available at SecureWorks to evaluate, architect, assess, monitor the public cloud and prepare for potential cyber incidents in the cloud
    - Additional resources and tools available to firms embracing the cloud

    SecureWorks has a broad portfolio of cloud security solutions and we’ve been helping organizations of all sizes and verticals take full advantage of the cloud and hybrid IT while maintaining visibility and control.
  • Introducing AETD Red Cloak - Advanced Tradecraft Designed for the Good Guys Recorded: Mar 31 2016 34 mins
    Carolyn Reuss, Dell SecureWorks Director of Product Management & Jeff Danielson, Dell SecureWorks Security Architect
    Too often, threat actors go totally undiscovered within your environment for months and sometimes even years– more than enough time for adversaries to make off with your valuable data. In the past year at SecureWorks, we've seen an alarming trend where adversaries are using little to no malware to gain access to your environment by leveraging compromised credentials and your own virtual private network (VPN). This difficult to detect tactic is called “living off the land” and it was used to gain entry in more than half of the cyber-espionage incidents we responded to last year. How can you monitor your endpoints to ensure you are detecting threats early whether malware is used or not and that you have the forensic data to investigate and remediate quickly?

    We’re excited to invite you to a webcast to introduce Advanced Endpoint Threat Detection (AETD) - Red Cloak, our managed endpoint threat detection service built in-house by SecureWorks. Developed for and proven in hundreds of hunting engagements and deployments on over 3.5 million endpoints, Red Cloak is an always-on incident response and forensic tool that looks for signs of threat actor presence on your endpoints. AETD Red Cloak provides you with the following:

    - Monitors the state of your endpoints (Windows servers, laptops, desktops) for threat indicators
    - Investigates events to determine severity, accuracy and context
    - Quickly escalates critical events that suggest endpoint compromise

    Please join Carolyn Reuss, Director of Product Management, and Jeff Danielson, Security Architect & advanced threat subject matter expert, as they tell you the story of how Red Cloak came to be and why we created it to help give you the earliest possible warning of a threat on your endpoints.
  • Incident Response and Forensics Lessons from 2015 Recorded: Dec 15 2015 61 mins
    Jonathon Poling and Kevin Strickland, Dell SecureWorks Incident Response & Forensics Team
    An insight into new and advanced threats that emerged this year and recommendations on responding to these threats.

    As 2015 comes to a close, we will review a variety of Dell SecureWorks engagements that brought both new and continued threats across many industry verticals. These case studies will provide insight into the advanced and commodity threats seen across the Dell SecureWorks customer base in 2015 as well as the most common targeted applications, exploited vulnerabilities, and attacker methodology for compromising and propagating within a network. In addition, we will review CounterThreatUnit (CTU) analysis of newly identified Threat Groups (TG’s) and threats that continued to evolve and plague companies across the globe, concluding with the most effective mechanisms for identifying, mitigating, and responding to these threats to better defend your network in 2016.

    In this webcast you’ll learn:

    - New and “advanced” threats that emerged in 2015
    - The rise of POS, MS Office, and Linux malware
    - CTU Threat Analysis of newly identified Threat Groups and evolution of known threats
    - Effective response and mitigation mechanisms to the latest threats
  • European Client Sneak Peek – Advanced Endpoint Threat Detection - Red Cloak Recorded: Sep 8 2015 56 mins
    Aaron Hackworth, Senior Distinguished Engineer
    Phishing, social engineering, and endpoint vulnerabilities make endpoints fertile ground for advanced threat actor land-and-expand penetration campaigns. How can you monitor your endpoints to ensure you are detecting threats early and that you have the forensic data to investigate and remediate quickly?

    Dell SecureWorks is excited to invite you to an exclusive preview webcast to introduce Advanced Endpoint Threat Detection (AETD) - Red Cloak, our proprietary managed endpoint threat detection service. Developed for and proven in hundreds of hunting engagements and deployments on hundreds of thousands of endpoints, Red Cloak is an always-on incident response and forensic tool that looks for signs of threat actor presence on your endpoints. Red Cloak will soon be offered as a fully-managed service that:

    - Monitors the state of your endpoints (Windows servers, laptops, desktops) for threat indicators
    - Investigates events to determine severity, accuracy and context
    - Quickly escalates critical events that suggest endpoint compromise

    Please join Aaron Hackworth, Dell SecureWorks Senior Distinguished Engineer, as he provides you with a special client sneak peek of Red Cloak before the global launch.
  • North America Client Sneak Peek – Advanced Endpoint Threat Detection - Red Cloak Recorded: Aug 26 2015 58 mins
    Aaron Hackworth, Senior Distinguished Engineer
    Phishing, social engineering, and endpoint vulnerabilities make endpoints fertile ground for advanced threat actor land-and-expand penetration campaigns. How can you monitor your endpoints to ensure you are detecting threats early and that you have the forensic data to investigate and remediate quickly?

    Dell SecureWorks is excited to invite you to an exclusive preview webcast to introduce Advanced Endpoint Threat Detection (AETD) - Red Cloak, our proprietary managed endpoint threat detection service. Developed for and proven in hundreds of hunting engagements and deployments on hundreds of thousands of endpoints, Red Cloak is an always-on incident response and forensic tool that looks for signs of threat actor presence on your endpoints. Red Cloak will soon be offered as a fully-managed service that:

    - Monitors the state of your endpoints (Windows servers, laptops, desktops) for threat indicators
    - Investigates events to determine severity, accuracy and context
    - Quickly escalates critical events that suggest endpoint compromise

    Please join Aaron Hackworth, Dell SecureWorks Senior Distinguished Engineer, as he provides you with a special client sneak peek of Red Cloak before the global launch.
  • Eliminating the Blind Spot Recorded: May 20 2015 53 mins
    Aaron Hackworth, Executive Director of the Counter Threat Unit Special Ops team at Dell SecureWorks
    Rapidly Detecting and Responding to the Advanced and Evasive Threat

    Combining Advanced Malware Protection and Detection and Advanced Endpoint Threat Detection amplifies protection against advanced and evasive threats. Supported by elite intelligence from the Counter Threat Unit and the expertise of a specialized Advanced Analyst team, AMPD and AETD give you end-to-end detection and visibility to identify advanced and evasive threats, investigate their origin, trace their movement, and provide clear guidance to help you rapidly respond.
Client-only Channel for SecureWorks
This channel is reserved for SecureWorks client-only webcasts.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Preventing/Detecting Cyberattacks with the SecureWorks Counter Threat Platform™
  • Live at: Nov 8 2017 2:00 pm
  • Presented by: Kevin Schmidt, Senior Engineer Manager
  • From:
Your email has been sent.
or close