Hi [[ session.user.profile.firstName ]]

The Holy Grail of Incident Response: A Single, Correlated Source of Intelligence

Time is of the essence when you’re investigating security incidents. While it’s critical to find out as much as you can about the incident from internal sources (logs, network activity, endpoint data, etc.), you also need context about what type of threat you’re facing.

When you come across an domain, IP, or file hash during investigations, you need to answer dozens of questions ASAP.

-Is this malicious? What’s known about it?
-What other domains, IPs, or file hashes are related?
-Is this a widespread threat or more targeted?

And to answer these questions today, you probably need to go to multiple sources and manually piece the puzzle together. What if you had a single, correlated source of intelligence instead?

OpenDNS Investigate now includes malware file data from Cisco AMP Threat Grid. Join our webcast to learn how Investigate provides the most complete view of the infrastructure used in attacks. With Investigate, you can:

-Instantly validate malicious domains, IPs, and file hashes
-Identify the Internet infrastructure and malware files related to attacks
-Uncover infrastructure being staged for future attacks
-Speed up investigations and stay ahead of threats
Recorded Oct 18 2016 27 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Atheana Fulgencio & Jeremy Linden
Presentation preview: The Holy Grail of Incident Response: A Single, Correlated Source of Intelligence

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Hackers Don’t Take Holidays Recorded: Nov 28 2018 59 mins
    Duncan McAlynn, an industry expert, cybersecurity consultant, and a member of the FBI InfraGard
    With the holidays among us, one can’t help but to think about taking some much needed time off to spend with friends and family. However, hackers don’t really do holidays. In fact, according to the FBI, the holidays bring more intense activity from hacking groups, cyber terrorists and nation states because they know we’re more vulnerable during these times.

    Watch industry expert and cybersecurity consultant, Duncan McAlynn, discusses the top attack vectors being used by malicious actors today and what we can expect in the coming year. Mr. McAlynn, a member of the FBI InfraGard, will also briefly discuss the social and economic impact these attacks can have on our nation’s citizens, organizations and economy along with 5 key things that you can do right now to help protect and defend your company.
  • Hello Direct Internet Access; Hello Risk Recorded: Nov 15 2018 41 mins
    Kevin Rollinson, Product Marketing Manager, Cisco Umbrella
    Business today happens at the branch. But where does IT work? Typically, not at the branch. So enterprises struggle to manage nontraditional users and even more connected devices across disparate branch locations.

    As direct internet access increases, the risk of exposure to critical business resources rises. At the same time, application usage via multiple clouds (Office 365, G-suite, etc.) challenges the existing network architecture.

    What does this add up to? Pressure for IT staff as they struggle to reduce costs, improve security measures, and application performance. Join us to learn how to gain better performance and more security effectiveness for your branch offices.
  • Bye Bye Backhauling: Better Branch Office Protection Recorded: Nov 1 2018 31 mins
    Kevin Rollinson, Product Manager, Cisco
    Today, IT departments are under pressure to do more with less. With limited budgets and smaller teams, the race is on to deliver more effective security without any reduction in reliability or performance. The high cost of enterprise WAN connectivity and support, combined with the growth of cloud-based services and bandwidth-hungry streaming applications, is forcing many network admins and security professionals to search for alternative solutions. With more branch offices connecting directly to the internet, how can you quickly and easily protect users on any device, anywhere they roam?

    Find out how Cisco Umbrella is making it easier than ever to provide effective cloud security with centralized visibility and control. Watch to see how you can say bye bye to backhauling and hello to better branch security.
  • Off-Network: The New Security Normal Recorded: Oct 22 2018 51 mins
    Christina Ayiotis, Cyber Strategy Consultant
    Long gone are the days when Security Professionals could protect their actual network and not have to worry about organization, employee, student or customer information being at risk. In today's always-connected world, much happens beyond the network (especially in the cloud) and the concept of perimeter security has all but evaporated.

    Wherever Users are - the office, the classroom, traveling, or working from home - organizations need to enable security so Users can easily and safely to do their jobs. Users want to be able to just "connect" and work-- oblivious to the dangers out there. Moving security "behind the scenes" means needing to be more predictive about how attacks will happen and engaging early in the attack cycle. DNS-layer security is an important component piece of an overall security strategy that aims to stop attacks before they cause irreparable harm. Watch this webcast to learn more.
  • Cryptomining: The Next Malware Attack Recorded: Oct 15 2018 57 mins
    Younsey Nunez, Group Information Security @ Wells Fargo & Richard Fairhurst, Regional Information Security @ Wells Faro
    Mining for cryptocurrencies is no small task; it takes a lot of CPU and GPU cycles to process the data necessary to generate the currencies. Not everyone has the technical wherewithal, financial resources and the massive amount of hardware to build their own cryptomine, so what options do they have? The answer is simple and as old as time: If you don’t have the resources, you “borrow” (steal?) from someone who does.

    This webcast looks at how cryptomining works and how to determine if your computing resources are being used without your knowledge for cryptomining.
  • Ransomware and Other Emerging Threats Within Healthcare Organizations Recorded: Oct 11 2018 61 mins
    Lee Kim, JD, CISSP, CIPP/US Director, Privacy & Security HIMSS North America
    The healthcare sector has been significantly impacted by ransomware in the last five years. Ransomware locks down computers, encrypts files, locks users out of their systems, and may disrupt patient care and business operations. A ransom is demanded for the safe return of the data by malicious actors. But, there is no guarantee that the data will be successfully recovered.

    Lee Kim, director of privacy and security for HIMSS North America shares how the ransomware threat has evolved over time, the current ransomware threat, and information on mitigating the threat. Lee will also share her predictions on what the healthcare and public health sector can expect in the future and the emergence of cryptojacking as a future threat.
  • Back to School Cybersecurity Checklist Recorded: Sep 21 2018 27 mins
    Casey Ulaky, Product Marketing Manager, Cisco Umbrella
    As summer vacations draw to an end, and kids return to school, we’re hoping you have more time to focus on how to improve your organization’s security posture. Cisco cloud security product expert Casey Ulaky will walk you through our Back to School Cybersecurity Checklist, where you will learn how to:

    - Know if you are experiencing a targeted attack.
    - View unsanctioned cloud services and gain a better understanding of your internet activity across all devices, on and off the network.
    - Highlight some of our new features, like iOS protection, cryptomining security category, app discovery and more!
  • Cybersecurity Made Simple Recorded: Sep 7 2018 2 mins
    Cisco Security
    Simple. Open. Automated. Effective: Cisco Security.

    Cisco built the network and now they’re building the most effective cybersecurity architecture in the world. Learn more via the links in the attachments tab.
  • Cisco Cloud Security Live Demo: Cisco Umbrella and Cloudlock Recorded: Aug 8 2018 49 mins
    Meg Diaz, Product at Cisco Umbrella
    As the industry’s first secure internet gateway, Cisco Umbrella provides the first line of defense against threats on the internet anywhere users go. Because Umbrella is delivered from the cloud, it is the easiest way to protect all of your users in minutes.

    Cisco Cloudlock is a cloud-native CASB and cloud cybersecurity platform that helps accelerate use of the cloud, including the apps you buy and build. Cloudlock helps you to secure your identities, data, and applications in the cloud.

    Join us to see how Cisco cloud security complements existing network security by providing an additional layer of protection when users connect directly to the internet and cloud services. Through a live demonstration, you'll see first-hand how our innovative approach sees threats other security solutions miss. If you or someone from your team would like to join us at an upcoming webinar session, please be sure to reserve your spot.

    Speaker bio:

    Meg Diaz is a member of the Cisco Umbrella (formerly OpenDNS) products team at Cisco, where she is responsible for the go-to-market strategy and execution across multiple products. Diaz has been in the security industry for more than seven years, with experience in network, endpoint, cloud, and data security. Prior to Cisco Umbrella, she worked at RSA, the Security Division of EMC in various roles. Diaz graduated with honors from Cornell University, where she majored in Applied Economics and Management and minored in Communication.
  • An Analysis of Cryptomining and Cryptojacking Recorded: Jul 25 2018 60 mins
    Josh Pyorre, Security Researcher, Cisco
    SANS Principal Instructor, Ted Demopoulos, sets the stage for Cisco Security Research Analyst, Josh Pyorre, to walk you through a brief history of cryptomining and cryptojacking, how it all works and the various steps you or your organization can take to detect and stop it.

    Josh Pyorre is a security researcher with Cisco. Previously, he worked as a threat analyst with NASA, where he was part of the team that initially built out the Security Operations Center. He has also done some time at Mandiant. His professional interests involve network, computer, and data security with a goal of maintaining and improving the security of as many systems and networks as possible
  • Once Upon a Network Recorded: Jul 18 2018 24 mins
    Kate MacLean Sr. Product Marketing Manager Cisco Cloud Security
    We don’t think having the best security for your users, data and apps should have to be a fairy tale. If you’re looking for speed, reliability and the best threat intelligence to see and stop attacks before they happen, look no further. Cisco Umbrella provides the first line of defense against threats on the internet, anywhere your users go. And we can prove it.
  • The Latest Threat to your Endpoint Security: Cryptojacking Recorded: Jul 12 2018 53 mins
    Kevin Beaver Author, Hacking for Dummies, Andrew Baker Virtual CIO, Brainwave Consulting Company, Karen Bannan Moderator
    Cryptojacking, the latest form of malware spreading across the globe, is a credible threat with a growing impact on enterprise security. Left ignored, the costs associated with not addressing this threat and its associated vulnerabilities can be much higher than the actual cure.

    In this webinar, independent information security consultant and author of Hacking For Dummies, Kevin Beaver and consultant and Virtual CIO Andrew Baker will discuss cryptojacking and its tangible business risks. Join this discussion to learn not only what cryptojacking is about but how you can detect it, prevent it, and address it in the context of your endpoint security controls.

    Cisco® Security solutions help you adopt the cloud, endpoint and network with confidence and better manage security for the way the world works today. Cisco’s cloud security is a cohesive and complementary solution that includes both Cisco Umbrella and Cisco Cloudlock. Cisco Umbrella secures access to the cloud while Cloudlock secures usage of the cloud. This combines both breadth and depth to provide you with the security you need, where you need it; to protect users against threats anywhere they access the Internet and secure your data and applications in the cloud. With Cisco’s cloud security, you gain visibility into Internet activity across cloud applications, all office locations, and roaming devices. You can also detect and respond to threats faster. Cisco Security provides an effective security platform that is open, automated, and simple to use.
  • Threats: The good, The Bad and The Ugly – Cryptocurrency Miners Making Headlines Recorded: Jun 29 2018 50 mins
    Steven McLean, Sr. Manager, Global Information Security at Ortho-Clinical Diagnostics, Artsiom Holub, Cisco Security Research
    Join us for a discussion with Steven McLean, Sr. Manager, Global Information Security at Ortho-Clinical Diagnostics, Artsiom Holub, Cisco Security Researcher and Meg Diaz, Sr. Product Marketing Manager, Cisco Cloud Security, as they discuss and debate how they use threat intelligence to transform the incident response process, reduce dwell time, and cut response time for better security.

    In this webinar you will:

    - Learn how Ortho-Clinical Diagnostics benefits from using Cisco Umbrella Investigate for threat hunting
    - Gain a perspective on emerging developments in the threats landscape, including how malicious hackers are infecting unsuspecting users’ computer with code that commandeers devices for cryptocurrency mining
    - Understand how Cisco Umbrella uses statistical models to automatically score and classify data to detect anomalies, and uncover known and emergent threats
  • Bye Bye Backhauling: Better Branch Office Protection Recorded: May 16 2018 31 mins
    Kevin Rollinson, Product Manager, Cisco
    Today, IT departments are under pressure to do more with less. With limited budgets and smaller teams, the race is on to deliver more effective security without any reduction in reliability or performance. The high cost of enterprise WAN connectivity and support, combined with the growth of cloud-based services and bandwidth-hungry streaming applications, is forcing many network admins and security professionals to search for alternative solutions. With more branch offices connecting directly to the internet, how can you quickly and easily protect users on any device, anywhere they roam?

    Find out how Cisco Umbrella is making it easier than ever to provide effective cloud security with centralized visibility and control. Watch to see how you can say bye bye to backhauling and hello to better branch security.
  • Is Your Security Stack Ready in 2018? Recorded: May 3 2018 45 mins
    Kevin Rollinson, Product Manager, Cisco
    2017 brought forth an increase in breaches, attacks, and ransomware instances. Trends around mobility, the growing number of IoT devices, SaaS app usage and the amount of sensitive data stored in the cloud will continue to increase. While increased mobility and flexibility in the workplace has led to reduced costs and booming productivity and independence, it comes at a price. Attackers are getting bolder and employees are no longer safely protected behind their firewall or secure web gateway. Is your security stack ready for 2018? Watch to learn about the shift towards secure internet gateway and why a new approach to security is needed. Kevin, Ayse, and Austin will explain why existing network security solutions need to adapt. We’ll look at the shifts in the market and the safe bets for protecting your data, users and apps in 2018.
  • University of Oklahoma Shares Experience with Cisco Umbrella Recorded: May 2 2018 44 mins
    Aaron Baillio, University of Oklahoma; Dave Gormley, Cisco Cloud Security
    Customer Story: University of Oklahoma

    Are your users accessing the Internet from many locations and devices? Are you relying on SaaS apps like Office 365, G-Suite, Box and Salesforce to improve collaboration and productivity? The University of Oklahoma is embracing the cloud to empower users while reducing costs and they have embraced advanced cloud security to protect their users and data. Hear how Cisco Umbrella is securing their internet access and Cisco Cloudlock is protecting their SaaS users, data and applications.

    Join us to learn:

    - How to reduce the risk of ransomware and other malware in your environment
    - How a CASB (Cloud Access Security Broker) can reduce the risk from compromised accounts
    - How you can easily secure access to and usage of the cloud
  • Attackers Enter Here → Endpoint Devices Recorded: Apr 25 2018 62 mins
    Cisco Security Product Experts, Meg Diaz, Joe Malenfant, and Neil Patel,
    70% of breaches start on endpoint devices. Unfortunately, gaps in protection exist when users and endpoints are off-network, often leaving AV as the only form of protection. And reacting to malicious communications and code after attacks launch is simply too late. It’s time to prevent, detect and respond to attacks targeting endpoints, both on and off your network before damage occurs.

    Join Cisco security product experts, Meg Diaz, Joe Malenfant, and Neil Patel, to learn how you can not only stop attacks before they occur, but contain and remediate threats that evade front-line defenses, anywhere your users travel.
  • Blazing the Trail: Changes Facing the Cybersecurity Industry Recorded: Apr 11 2018 59 mins
    Julie Tsai, Sr. Director, Security Operations at Box and Michelle Dennedy, Chief Privacy Officer at Cisco
    A roundtable discussion hosted by women leading in cybersecurity. Join women leading in cybersecurity, Julie Tsai, Sr. Director, Security Operations at Box and Michelle Dennedy, Chief Privacy Officer at Cisco, for a lively roundtable discussion on security and data privacy. They will offer us their perspective on their success, lessons learned in their careers and how women are making their mark on the security industry, in addition to debating key changes and trends facing the cybersecurity industry and how we approach data privacy.
  • How to Prevent, Detect and Respond to Attacks Targeting Endpoints Off-network Recorded: Nov 29 2017 62 mins
    Meg Diaz, Joe Malenfant, and Neil Patel, Cisco
    How to stop the primary point of entry.

    70% of breaches start on endpoint devices. Unfortunately, gaps in protection exist when users and endpoints are off-network, often leaving AV as the only form of protection.

    And reacting to malicious communications and code after attacks launch is simply too late.

    It’s time to prevent, detect and respond to attacks targeting endpoints, both on and off your network before damage occurs.

    Join Cisco security product experts, Meg Diaz, Joe Malenfant, and Neil Patel to learn how you can not only stop attacks before they occur, but contain and remediate threats that evade front-line defenses, anywhere your users travel.

    Register today and reduce your risk of breaches on the endpoint.
  • How Threat Intelligence Helps You Combat Targeted Malware Recorded: Sep 7 2017 38 mins
    Jeremy Linden of Cisco Umbrella, Jessica Bair of Cisco Threat Grid and Mike Clark of ThreatQuotient
    As malware becomes more complicated and harder to detect, cyber analysts are increasingly inundated with more work. The more menial tasks a security team performs, the less likely they are to have the time to properly analyze or defend against malware. There are steps you can take to defend against malware and protect your organization.

    Join this webinar with experts Jeremy Linden of Cisco Umbrella, Jessica Bair of Cisco Threat Grid and Mike Clark of ThreatQuotient as they discuss how to utilize a Threat Intelligence Platform to enhance malware analysis capabilities and prevent access to malicious domains. Visit the Cisco Marketplace to learn more.

    In the webinar, you will learn to:
    - Streamline malware analysis workflow
    - Add context to malware analysis results using validated threat intelligence
    - Make informed decisions efficiently and effectively
    - Take action from a centralized workbench to minimize your risk window
Webcasts and videos for security professionals.
Cisco Umbrella provides a cloud-delivered network security service that blocks advanced attacks, as well as malware, botnets and phishing threats regardless of port, protocol or application. Our predictive intelligence uses machine learning to automate protection against emergent threats before your organization is attacked. Umbrella protects all your devices globally without hardware to install or software to maintain.

Learn more: https://umbrella.cisco.com/

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Holy Grail of Incident Response: A Single, Correlated Source of Intelligence
  • Live at: Oct 18 2016 5:00 pm
  • Presented by: Atheana Fulgencio & Jeremy Linden
  • From:
Your email has been sent.
or close