Hi [[ session.user.profile.firstName ]]

Office Shutdown: Securing an Increased Remote Workforce

The COVID-19 virus outbreak has put immense pressure on IT organizations who now need to scale remote access quickly to thousands of users working from home. Many organizations did not have a plan in place for this and are doing the best they can. Many remote workers haven’t been issued laptops or are using unmanaged devices that may not have adequate protections. Some companies are running into licensing issues for things like their VPN connections. Join ExtraHop and (ISC)2 on April 16, 2020 at 1:00PM Eastern for a timely discussion on how you can deal with performance and security implications of this shift and receive tips and best practices on how to deal with the situation we find ourselves in.
Recorded Apr 16 2020 64 mins
Your place is confirmed,
we'll send you email reminders
Presented by
John Smith, ExtraHop; Glenn Leifheit, Microsoft; Tim Campo, (ISC)2; Diane Brown, Ulta; Brandon Dunlap (Moderator)
Presentation preview: Office Shutdown: Securing an Increased Remote Workforce

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • 3 Ways SecOps and NetOps Collaboration Saves Money & Stops Attackers Faster Jun 3 2021 5:00 pm UTC 60 mins
    Brandon Dunlap, Moderator
    Call It NetSecOps, IT/Security Operations, SOC/NOC or SNOC. Whatever the name, better collaboration between security operations and network operations teams has enormous benefits for teams that follow through. Join Extrahop and (ISC)2 on June 3, 2021 at 1:00 p.m. Eastern for a discuss on how this union can help with tool consolidation, improve incident response time and effectiveness and adapt to the cloud, remote work, and beyond.
  • Stealing the Silver Lining from your Cloud Recorded: May 7 2021 61 mins
    Anant Shrivastava (Notsosecure Global Services) // Don Shin (ExtraHop)
    The last couple of years have seen a tremendous growth in cloud adoption. Every organization has some cloud usage, using either a mixture of in-house and public cloud or they are fully cloud based. This unprecedented adoption of technologies has opened gaping holes in an organization's security landscape. Whilst moving to the cloud is a sensible move because vendors are taking an increasingly larger responsibility in being more proactive towards security, it also opens organizations up to be more severely punished for their mistakes.

    In this demo filled webinar, we will discuss various scenarios where cloud based technologies have given opportunities to attackers that have resulted in catastrophic repercussions for the company involved.

    We will look at ways to exploit these cloud environments from an attackers point of view, covering various phases of attack from enumeration to exploitation, through the escalation of privileges and ending with a complete ownage of the cloud network.
  • It's Time to Think More Broadly about Cloud Workload Security Recorded: May 5 2021 55 mins
    Fernando Montenegro, Principal Research Analyst, 451 Research; Ryan Davis, Sr. Cloud Security Manager, ExtraHop
    There are at least as many ways to monitor and protect cloud workloads as there are types of cloud workloads that need protection. Since all security technologies have inherent advantages and drawbacks, organizations typically deploy a variety of cloud workload security solutions depending on their regulatory environment, desired security profile, and tolerance for risk. What’s important is ensuring that any security gaps are filled.

    Join 451 Research and ExtraHop on this webcast and learn:
    - How agentless network detection and response can play a crucial role in protecting your cloud workloads against today’s advanced threats
    - How your organization can close gaps left by other cloud workload security technologies
  • Defining an XDR strategy: What does it mean for your organization? Recorded: May 4 2021 61 mins
    Michael Sanders, ExtraHop // Dave Shackleford, SANS
    XDR (extended detection and response) is the hot new buzzword in the security industry but so far there isn't a lot of agreement on what defines XDR. The goal makes sense. Extend your detection capabilities across your hybrid network to catch advanced threats like zero days, supply chain attacks, and insider threats, and respond quickly before damage can be done. Join us as we explore the pros and cons of XDR such as, is it realistic that one vendor can offer you all the tools you need for detection and response or will you need to create a strategy to achieve your own extended detection and response ecosystem.

    Attendees will walk away with a better understanding of:
    - How to define what XDR means for your organization
    - How to create your own XDR strategy
    - Why network data is an essential building block for any XDR ecosystem
  • ExtraHop #1: How To Stop Breaches Faster with Integrated NDR & EDR Recorded: Apr 26 2021 66 mins
    Chase Snyder, Sr. Security Product Marketing Manager, ExtraHop; Dixon Styres, Solutions Architect, Crowdstrike; Sharon Smith
    Defending against advanced threats requires advanced insights from the three foundational data sources for security operations: endpoint data, log data, and the network. In the first part of a three-part series, we'll discuss:

    ·advanced threat behaviors, how they gain access to the network through both commonplace and sophisticated means, how they act once they're inside.

    ·how to leverage the three foundational data sources, integrated into a best-of-breed XDR approach to detect and investigate advanced threats like supply chain attacks, insider threats, and more

    ·how to rapidly respond to minimize the blast radius and reduce business impact when an advanced threat gets inside.
  • SANS 2021 Cloud Security Survey Panel Discussion Recorded: Apr 23 2021 64 mins
    Dave Shackleford, SANS // Ryan Davis, ExtraHop // Patrick Pushor, Orca Security // Arun Raman, Blue Hexagon
    This SANS survey explored the types of services organizations are using, what types of controls and tools provide the most value, and how effective cloud security brokering is for a range of use cases. in this webcast, SANS analyst Dave Shackleford will join sponsor speakers to explore how survey results can inform and improve your cloud security posture.
  • ExtraHop #2: Stopping Advanced Threats Doesn't Require a Big Budget Recorded: Apr 21 2021 61 mins
    Aaron Davidson, Sr. Sales Engineer, ExtraHop; Don Shin, Sr. Security PMM, ExtraHop; Sharon Smith, Moderator
    Security and compliance frameworks from CIS, NIST, and PCI SSC point to long lists of must-have technology to build secure and compliant defenses. But they don’t tell us which ones to do first or how to allocate our limited budgets. Advanced Threats follows a land and pivots toward your valuables workflow. This knowledge gives you a roadmap to prioritize investments while leaving others as “good enough” that fit your budget and time constraints.

    Join ExtraHop experts to get insights into building effective layered defenses that prioritize your budget:

    - How the “Defender’s Dilemma” should guide your investments at the edge

    - How “Intruder’s Dilemma” sets the network trap for intruders and advanced threats

    - Why your IDS needs a next-gen upgrade against advanced threats

    - See how NG-IDS stops advanced threats (demonstration)
  • ExtraHop #3: How NG-IDS Stops Advanced Threats Legacy IDS Misses Recorded: Apr 9 2021 58 mins
    Jon Oltsik, ESG; Don Shin, ExtraHop; Jesse Munos, ExtraHop; Sharon Smith (Moderator)
    Supply Chain attacks, Zero-Days, and Advanced Persistent Threats (APTs) are effective because they target the trust models traditional security products were built on. The result is a post-compromise world where traditional IDS technology is looking in the wrong direction based on outdated assumptions to detect and stop modern attacks. Join John Oltsik from ESG and ExtraHop experts to learn how machine learning NG-IDS gives you back the edge against Advanced Threats :

    · Why Advanced Threats require a post-compromise posture

    · How time has been unkind to that noisy 90s IDS

    · How to fill IDS compliance gaps and increase security efficacy

    · How NG-IDS stops Advanced Threats before they do real damage
  • Hybrid Security: Protecting Your Supply Chain Recorded: Apr 5 2021 60 mins
    Matt Bromiley, Incident Response Instructor at SANS; Guy Raz, Systems Engineer at ExtraHop
    Recent supply chain attacks have proven that third parties are an unexpected, yet trusted, entry vector into an organization. By utilizing legitimate methods to breach an organization, threat actors can hide under the radar with escalated privileges. Furthermore, attackers have shown that they are security-savvy, knowledgeable of enterprise defenses and their workarounds. Enterprise defense should be structured around BOTH system and network data; without, you will never see the full picture.

    With this webcast, we will outline NDR capabilities and how bringing endpoint and network together will prove to be a one-two punch to bring down even advanced attackers. We will specifically outline how to mitigate common third-party attack surfaces, what could have been done differently in the wake of the attack, and have the recent attacks provided enough reason to consider changes in implementation.
  • Secure Your Cloud Against Advanced Attacks with Network Detection and Response Recorded: Mar 29 2021 40 mins
    Michael Sanders, Cloud Security Engineer at ExtraHop Networks; Corey Quinn, Chief Cloud Economist at Duckbill Group
    How do you ensure that Advanced Threats like supply chain attacks, APTs, and zero-day exploits aren’t inside your cloud environment today?

    Most advanced threat actors are the ones likely to already be inside of your environment, but getting in is only the first step. Once they beat perimeter defenses, attackers start moving laterally and covering their tracks so they can accomplish their real objective—executing ransomware or exfiltrating valuable customer data and intellectual property. Advanced attackers should be fought where they are—on the inside—and that requires a strong post-compromise defense posture.

    Network detection and response (NDR) products provide the internal visibility, real-time detection, and intelligent response capabilities you need to stop attackers before they accomplish their goals. Best-of-breed NDR tools are completely covert and tamper-proof, meaning attackers will have no idea you're on to them until it's too late. As they move laterally within your network, NDR shows you not just where intruders are going, but where they've been.

    In this webinar, you’ll learn how NDR enables you to adopt a detect-and-respond posture for securing against advanced attacks in the cloud. An ExtraHop engineer will also show you how ExtraHop Reveal(x) 360 helps you find and stop attackers in product demos that highlight specific advanced threat use cases.
  • ExtraHop Reveal(x) Presents Hands-On Network Detection & Response Recorded: Mar 26 2021 59 mins
    Jesse Munos, Technical Marketing Manager at ExtraHop and Josh Snow, Sales Engineer at ExtraHop
    In a post compromise world, SecOps personnel cannot afford to be blind to any potential threat vector. The positioning of EDR and firewalls severely limit the breadth of visibility that SecOps can provide, while the inherent limitations of older technologies like IDS fail to provide the necessary details to adequately detect and investigate modern threats. These limitations have created the need for a network detection and response platform that can scale to meet the demands of modern enterprise, provide accurate, high-fidelity detections with actionable forensic-level details and robust deployment options for enterprise, multi-cloud, and hybrid environments.

    This session will provide a hands-on demonstration of the detection capabilities and the depth of forensic data provided by the ExtraHop Reveal(x) platform. It will also offer a high-level overview of the various deployment architectures available.
  • Incident Response Against Advanced Threats: What Changes After SUNBURST? Recorded: Mar 18 2021 46 mins
    Speakers: Chase Snyder, Sr. Product Marketing Manager & Greg Copeland, Director, Business Development
    When the SolarWinds SUNBURST attack, with its broad impact and dwell time of nearly a year, hit the news, many security teams realized they needed a faster, lower friction way to investigate past exposure. Collaboration between the NetOps and SecOps teams can provide a better approach to responding to advanced threats in the future. This webcast will outline the benefits of sharing data and tools between security, network, and other teams for accelerated incident response, reduced risk, and greater effectiveness.

    How NetOps and SecOps can work together to accelerate incident response and troubleshooting.

    Why network data forms a foundation for security and operational activities

    How to ensure complete collection of all network data, and efficient tool sharing

    How to investigate and respond to SolarWinds SUNBURST and potential future supply chain attacks that give attackers access inside your environment

    If you cannot attend the live event, please register to receive the recording when it becomes available.
  • CrowdStrike & ExtraHop Partner to Stop Breaches with Cloud-Native EDR and NDR Recorded: Mar 17 2021 61 mins
    John Titmus, EMEA Director, ExtraHop and John Lester, Security Engineering Manager, CrowdStrike
    The integration between ExtraHop Reveal(x) and CrowdStrike Falcon Platform merges complete network visibility, machine learning behavioural threat detection and real-time decryption with powerful endpoint security and instant remediation.

    Attendees of this webinar will learn directly from ExtraHop and CrowdStrike about how our Fortune 100 customers are already using this recently launched solution, and how the integration can provide enterprise security operations teams with capabilities and immediate value like:

    - Instant and automated detection, validation, and containment of network threats like ransomware, privilege escalation, and data exfiltration, as well as endpoint threats, for complete attack surface coverage.

    - Automatic discovery and device identification of everything communicating on the network, including IoT-connected devices, remote connections, devices incompatible with agent installation, and devices impacted by threats where no CrowdStrike agent was yet installed.

    - Broad MITRE ATT&CK Framework coverage of both network-focused and endpoint-focused tactics, techniques, and procedures.
  • How the Network Is Used to Unmask the Adversary Recorded: Mar 12 2021 55 mins
    Chris Kissel, Security Research Director at IDC; Sri Sundaralingam, VP of Product Mktg. at ExtraHop
    The network plays a key role in unmasking the adversary post-compromise. Featuring Chris Kissel from IDC, this webcast will highlight the first edition of the recent research released on Network Intelligence and Threat Analytics (NITA). Along with ExtraHop’s Sri Sundaralingam, we cover the current state of the threat landscape, the visibility challenges inside the network, and how supply chain attacks like SUNBURST have served as a wake-up call for many organizations.

    The key takeaways from the IDC report are addressed and include the current state of NGFW, IDS, endpoints and SIEM and the need to use network data as the source of truth to stop attacks post-compromise.
  • Time for an Upgrade? What Next Generation IDS Can Bring to the Enterprise Recorded: Mar 11 2021 60 mins
    Don Shin, Sr. PMM, ExtraHop; Matthew Waddell, Dir of DFIR, CBI; Brandon Dunlap, Moderator
    Traditional Intrusion Detection Systems rely on brittle signatures, and can be a major resource drain. As the internet continues to evolve, so do the methods and tactics of the adversary. Attackers are now more focused on your users rather than system vulnerability exploits. A new approach is needed….one that encompasses machine learning anomaly detection, cross platform visibility and cloud ready. Join ExtraHop and (ISC)2 on March 11, 2021 at 1:00pm for a discussion on Next Generation IDS and how it can provide more than just a compliance check off and provide context to the alerts you receive.
  • Ten Keys to Better Security Data Analysis Recorded: Mar 3 2021 60 mins
    Louis DiValentin, Cyber R&D Principal, Accenture Labs // Jesse Munos, Technical Marketing Manager, ExtraHop
    If you’re swimming in security incident data, alerts, and log files, you’re not alone. How can you aggregate that data and analyze it quickly, to identify sophisticated or obfuscated attacks? In this webinar, experts discuss ways to effectively collect and analyze large amounts of security data, enabling you to surface the threat and exploit information that you need to defend your enterprise. Speakers will also offer recommendations on how to automate some of that data analysis, so that you can identify threats more easily, and stop attackers more quickly.
  • Cloud Security: Are You Doing It Wrong? Recorded: Feb 18 2021 53 mins
    Dan Frey, Senior Cloud Product Marketing Manager, ExtraHop & Guy Raz, Sales Engineer at ExtraHop
    Your attack surface is expanding from the on-prem data center to the cloud to remote deployments and the device edge. But your tools only secure the perimeter or rely on logs and agents, you’re leaving visibility gaps that adversaries can use to attack critical workloads and data.

    In this webinar, you’ll learn how network detection and response (NDR) eliminates visibility gaps across your attack surface by unlocking data from network traffic packets, the ultimate source of truth in cloud and hybrid security. There’s no need to deploy agents, so you can secure your cloud workloads without slowing down or impeding your dev teams. We’ll also walk through a live demo of how to stop advanced threats like supply chain attacks, zero-day exploits, and more.
  • Black Hat Webcasts: Healthscare – An Insider's Biopsy of Healthcare Application Recorded: Feb 11 2021 61 mins
    Seth Fogie, Security Director, Penn Medicine // Guy Raz, Sr. Systems Engineer, ExtraHop
    Healthcare security teams are in a tough spot. While the provider industry is taking security seriously, they are at the mercy of the software vendors who provide the healthcare organizations with the data delivery, processing and storage solutions that are critical to delivering patient care and keeping patient data secure. Given the reliance on these systems, it begs the question – how secure are these solutions?

    Seth Fogie has spent the last 10+ years in the trenches of the healthcare industry and has seen the good, bad and ugly of what is being provided to your providers. As an insider, Seth has experienced the unique tension healthcare security teams face as they work to securely implement these solutions and will share some of what has been found.

    The core of this presentation will focus on vulnerabilities and design issues within healthcare solutions. As we will illustrate through the dissection of numerous clinical focused systems, including radiology reading, EMR downtime, patient entertainment, pharmacy distribution, nurse communication, M&A EMR, clinical documentation and temperature monitoring systems, the prognosis doesn’t look good. Unfortunately, it is our experience that there are few solutions within the hospital enterprise that do not have issues.

    The goal for this public 'biopsy'? The healthcare security community needs help increasing the pressure to ensure all of our data is safe from poorly designed and developed vendor solutions. While we can't play the name and shame game for a number of reasons, we want to increase awareness through numerous technical illustrations and ask for your help in increasing scrutiny on all healthcare solutions. This isn't just an application security problem – it is all our healthcare data at risk and this audience is positioned in a unique spot to help.
  • Post Mortem: The First 72 Hours of SUNBURST Threat Intelligence Research Recorded: Feb 9 2021 37 mins
    Tanner Payne, Sr. Sales Engineer at ExtraHop
    On December 13, 2020 when the SolarWinds Orion SUNBURST backdoor vulnerability was disclosed, the entire security community sprung into action. The attack had potential to do immense damage, and everyone worked tirelessly to respond fast. FireEye and ExtraHop were among the first to release SUNBURST associated domains and IP addresses to be used for threat intel, forensic investigation, and response.

    This session will cover:

    - Background on the SUNBURST attack and how it was so stealthy and hard to detect
    - How ExtraHop uncovered new threat intelligence for use in investigating and responding to SUNBURST
    - Why internal network traffic is such a strong data source for detecting and responding to supply chain attacks like SUNBURST.
  • Confiez La Sécurité de Vos Appareils Non Gérés et de Vos IoT Recorded: Feb 4 2021 33 mins
    Speakers Gustavo Amador-Nieto, EMEA Enterprise SE Lead at KeySight; Youssef Agharmine, Security Sales Engineer at ExtraHop
    Le manque de visibilité sur votre écosystème IoT et l'impossibilité de surveiller les appareils non gérés élargissent votre surface d’attaque, mettant ainsi en danger la sécurité de vos réseaux hybrides. Le problème des objets connectés, c'est qu'ils génèrent des masses de données et qu'il est impossible d'y installer des agents. D'où l'impuissance des approches de sécurité traditionnelles. Avec Keysight et ExtraHop, vous découvrez et surveillez tous les appareils connectés à votre réseau pour détecter et répondre aux attaques avant qu’elles ne compromettent votre environnement. Au programme de ce webinaire :

    • Méthodes des attaquants pour obtenir des accès non autorisés via des appareils non gérés ou des IoT

    • Rôle crucial du machine learning et des fonctionnalités de détection et de réponse sur le réseau (NDR) pour investiguer les incidents

    • Capacité d’ExtraHop et Keysight à fournir une visibilité complète sur tous les appareils et stopper les attaques avant qu’elles ne frappent
Helping you gain the perspective to secure the hybrid enterprise
The prevention and protection model of cybersecurity isn’t working: between the cloud, IoT, and the sheer pace of change, the enterprise is no longer built to be walled in. This channel provides educational webinars to help SecOps (SOC) and NetOps (NOC) teams, from CIOs and CISOs to analysts and practitioners, change their perspective in order to identify, investigate, and respond to threats across the modern attack surface. We explore how cloud-native network detection and response (NDR) provides the complete visibility, real-time threat detection, and intelligent response you need to secure your hybrid environment. You’ll also find product information about ExtraHop Reveal(x) which enables you to: Eliminate blind spots: Cover 100% of your hybrid environment, Detect what matters: Find threats 95% faster, and Act quickly: Respond to breaches 70% faster.

Learn more at www.extrahop.com

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Office Shutdown: Securing an Increased Remote Workforce
  • Live at: Apr 16 2020 5:00 pm
  • Presented by: John Smith, ExtraHop; Glenn Leifheit, Microsoft; Tim Campo, (ISC)2; Diane Brown, Ulta; Brandon Dunlap (Moderator)
  • From:
Your email has been sent.
or close