Hi [[ session.user.profile.firstName ]]

Safeguarding Confidential Data from the Most Common Cyber Attacks Law Firms Face

Legal Threat Intelligence: Safeguarding Confidential Data from the Most Common Cyber Attacks Law Firms Face in a Virtual World

Law firms have continuously faced challenges with cybersecurity which have worsened during the COVID pandemic and work from home restrictions. The confusion and unfamiliarity created a smokescreen for cybercriminals and offered new opportunities for exploitation. Earlier in 2021, the ABA published Formal Opinion 498 to address Virtual Practice and to remind lawyers of their obligations, even when conducting business in a distributed model.

Join experts from eSentire's Threat Response Unit (TRU) in this webinar as they review the findings from the Legal Industry Spotlight Report. Learn about common cyber-attacks and threat trends that our TRU team is witnessing, along with recommendations you can use to harden your defenses.

Speakers:
Mark Sangster, Vice President and Industry Security Strategist, eSentire
Rob McLeod, Senior Director Threat Response Unit, eSentire
Keegan Keplinger, Research and Reporting Lead, eSentire
Recorded Jun 7 2021 55 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Mark Sangster, Rob McLeod, Keegan Keplinger
Presentation preview: Safeguarding Confidential Data from the Most Common Cyber Attacks Law Firms Face

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Quantifying Cyber Risk In The Cloud Oct 12 2021 5:00 pm UTC 60 mins
    Tia Hopkins, Vice President, Cyber Risk Advisory and Solutions Architecture, eSentire
    Whether it’s cloud, multi-cloud, or hybrid cloud, there is no end to cyber risk. So, organizations must be confident in their ability to protect their cloud environments and prepare for emergency scenarios. In most cases, this preparation comes in the form of hardening your security defenses and becoming cyber resilient by adopting the technologies, processes, and expert-level support. While many business leaders verbally declare the importance of reducing cyber risk, only a few understand that there are varying approaches to managing cyber risk – some far more successful than others. Key takeaways:

    - Evolution of security management - Actively manage your cloud security posture
    - Risk management vs risk reduction - Stop attackers and mitigate risk
    - Challenges with assessing risk - Detect emerging threat tactics

    In this presentation, Tia Hopkins will explore the challenges of maturity-based security programming and outline how leveraging security operations and incident response can help your organization transition to a risk-based approach that enables true quantification of cyber risk in the cloud.
  • Hughes Hubbard & Reed MDR Case Study Video Recorded: Sep 14 2021 4 mins
    Leon Goldstein, Chief Information Officer, Hughes Hubbard & Reed (HHR)
    In this video, Leon Goldstein, Chief Information Officer at Hughes Hubbard & Reed (HHR) explains how eSentire is a true partner for HHR, that drives more value, that detects and responds to cyber threats immediately 24/7, and acts as extension of his team so that he can rest at night knowing HHR is protected.

    Company Description: HHR is a 500-person international law firm specializing in litigation and corporate law.

    Industry: Legal

    Security Challenges:

    Assessment of posture and improving maturity as new CIO
    - 24/7 threat detection
    - Cybersecurity expertise for threat response
    - Up to date industry intel and research
    - Scaling security in line with digital transformation and firm growth
    - Demonstrating continuous improvement and ROI to leadership

    Service Overview: 24/7 Multi-Signal Managed Detection and Response, Managed Vulnerability Service

    The eSentire Difference:
    eSentire monitors and disrupts threats 24/7 across Hughes Hubbard & Reed’s network and digital infrastructure. We deliver 24/7 Threat Hunting within our SOC-as-a-Service model and deliver a regular cadence of vulnerability scanning to support the continuous improvement of the firm’s security roadmap and overall security posture. Leon Goldstein, HHR’s CIO, had partnered with eSentire at a previous firm and chose to leverage our services again because he trusted our team to deliver true partnership and security expertise.

    The service benefits outlined by Leon include:
    - Rapid time to value and trust built in onboarding
    - 24/7 Visibility, Threat Detection and Response
    - Value and cost savings from leveraging eSentire’s 24/7 SOC vs building in-house
    - Cyber expertise supporting incident handling, complete response and remediation efforts
    - Security posture improvement through Vulnerability Scanning and remediation roadmap
    - Intel driven through research and security advisory communications
    - Continuous service improvement & scale
  • Building Cyber Resilience with Managed Phishing and Security Awareness Training Recorded: Sep 14 2021 59 mins
    Mark Sangster, V.P. and Industry Security Strategist, eSentire; Brandon Dunlap, Moderator
    The majority of crippling cyberattacks begin with a simple phishing email. And while most companies provide some form of annual training, they focus on overly simplistic lures taken from public events that fail to represent the real danger of targeted criminal campaigns. Join eSentire and (ISC)2 on September 14, 2021 at 1:00 p.m. Eastern/10:00 a.m. Pacific as they explore how to build a comprehensive training and testing program that leverages realistic threat scenarios to foster context-relevant security awareness that drives behavioral change:

    · Use risk management data and accurate phishing lures to build comprehensive awareness training

    · Maximize your resources and programs to increase return on investment

    · Conduct testing that improves resilience

    · Meet regulatory requirements and demonstrate program success to your leadership
  • The Latest Threats, Techniques, Risks & Vulnerabilities in Cloud Environments Recorded: Sep 7 2021 60 mins
    Rob McLeod VP, Threat Response Unit (TRU), eSentire and George Gerchow, Chief Security Officer, Sumo Logic
    Join us for this webinar where eSentire and Sumo Logic threat intelligence experts will brief CSA members on cutting edge threat intelligence developed from threat reports and first-hand detections our threat hunting teams have encountered in cloud environments.

    This briefing will bring CSA members up to date on the latest threats, risks, and vulnerabilities in cloud environments.

    - We will share the top cloud threats and vulnerabilities eSentire is seeing as we respond to threats in customer environments and from the latest cloud threat reports.
    - We will review examples of critical cloud-specific event data, relevant types of indicators of compromise (IoCs), and adversarial tactics, techniques, and procedures (TTPs).
    - Our threat response unit will lead 2 real cloud threat detections we’ve responded to in the wild to demonstrate how our threat hunters search for compromised assets based on indicators, events generated on workloads and within the cloud environments, or communications with known malicious IP addresses and domains.
    - We will look at how the Sumo Logic research team tracks the threat landscape and enhances the detection of advanced threats and give better context to threat investigations in cloud and multi-cloud environments.

    Register today to be among the first to receive the latest eSentire Threat Intelligence Report Dissecting Today's Ransomware Ecosystem: Ransomware-As-A-Service, Targeted Intrusions and Opportunistic Attacks
  • Texas United Management MDR Case Study Recorded: Sep 2 2021 4 mins
    Ray Texter, Chief of Information Security, Texas United Management
    In this video, Ray Texter, Chief of Information Security at Texas United Management explains why he trusts eSentire MDR to augment their internal security team’s capabilities and protect their business assets.

    Company Description: Texas United Management is a privately held, US-based manufacturer of food-grade and pull salt.

    Industry: Manufacturing of Minerals

    Security Challenges:
    - Staff augmentation and skills gap
    - 24/7 capabilities in threat detection
    - Cyber expertise for threat response
    - Single pane of glass for security services
    - IoT environment requiring supply chain expertise
    - Adherence to industry specific compliance requirements
    - Demonstrating security maturity enhancements and ROI to leadership
    - Service Overview: 24/7 Multi-Signal Managed Detection and Response, Managed Risk Services, Managed Vulnerability Service, - - Security Incident Response Planning

    The eSentire Difference:
    eSentire augments the cybersecurity team at Texas United Management (TUM) with 24/7 Managed Detection and Response services delivering security event monitoring, threat detection, complete response and technology expertise. TUM CIO Ray Texter outlines how eSentire has helped him assess and mature the overall security program during his tenure at TUM. We partner on a wide range of services to complement the organization’s efforts in security awareness, testing, threat response, and incident response planning.

    The service benefits outlined by Ray include:
    - Confidence in 24/7 threat detection and response capabilities
    - Time to value with Mean Time to Contain of 15 mins
    - Partnership and expertise through incident response handling
    - Quality and responsiveness of SOC and customer success teams
    - Industry best practices on policies and procedures
    - Adherence to compliance requirements
    - Improvement of overall organizational security maturity
  • The Best Kept Secret for Effective Managed Detection and Response (MDR) Recorded: Aug 31 2021 57 mins
    Rob McLeod, Kurtis Armour, Gary Miliefsky
    Not All MDR is Created Equal

    At eSentire, we believe a multi-signal approach is paramount to protecting your complete attack surface. Whether your environment is in the cloud, on-premises or somewhere in between, we have the visibility to see what other MDR providers may miss.

    MDR has exploded in popularity answering the challenge to rapidly identify advanced threats and contain them before disruption and damage occurs. Learn more about:
    - Understanding why not all MDR platforms are created equal
    - Why traditional MSSPS are no match for the growing speed and sophistication of modern threats
    - The importance of multi-signal for MDR and complete perimeter protection
    - Ensuring the right mix of operational technologies and personnel so you can stop attackers before they accomplish their objectives

    Join eSentire’s Kurtis Armour and Rob McLeod for a live webinar with Gary Miliefsky, CISSP, Publisher of Cyber Defense Magazine. We will discuss the secret and most efficient multi-signal approach to MDR and much more.
  • The Story Behind MDR with Microsoft Defender Recorded: Aug 24 2021 41 mins
    Kurtis Armour, Jason Westhaver
    Join eSentire’s Kurtis Armour, Director of Product Management and Jason Westhaver, Technical Lead, Enterprise Security as they speak with MISA (Microsoft Intelligent Security Association) about how organizations can use their existing investment in the Microsoft ecosystem and accelerate their security program with eSentire’s around-the-clock Managed Detection and Response (MDR) that shrinks threat actor dwell time and reduces the risk of business disruption.

    Key solution benefits and outcomes:
    - Simple: eSentire MDR is Zero Install and leverages your existing investment in Microsoft 365
    - Fast: We deploy within an hour and you see results immediately.  Time-to-value is measured in minutes and hours, not days and weeks.
    - Precise: eSentire MDR provides coverage mapped to the MITRE ATT&CK Framework and our security experts operationalize it, hardening your endpoint and email security posture.
    - Rapid Response: Our 24/7 SOC experts and Elite Threat Hunters investigate and contain threats on your behalf.
  • Cyber Defense TV: Mark Sangster Hot Seat Interview Recorded: Aug 18 2021 15 mins
    Mark Sangster, Gary Miliefsky
    Cyber Defense TV CEO and publisher, Gary Miliefsky, put eSentire VP Mark Sangster in the Hot Seat to find out how eSentire is an innovator in Managed Detection and Response (MDR). Mark explains how eSentire doesn’t just provide alerts but goes farther by remediation and result.
  • Cybercriminals Pick Targets Based On Their Insurance Coverage Recorded: Aug 13 2021 29 mins
    Mark Sangster
    Insurance firms, agencies and brokers are now a lucrative target for cybercriminals to steal critical coverage and policy information to select targets based on their ability to pay. In an era where state-sponsored and criminal ransomware groups leverage sophisticated technology and methods, it becomes harder and harder to stop criminals from stealing your client’s information and your critical business intelligence.

    Join us as we discuss cyber threat trends and events to reverse engineer attacker methods to build a resilient cyber program to protect your business.

    Speaker:
    Mark Sangster, VP and Industry Security Strategist, eSentire
  • August 2021 Threat Intelligence Observations On-demand Recorded: Aug 13 2021 40 mins
    Jacob Gajek, JR DePre, Keegan Keplinger, Paul Aitken
    Join eSentire’s Threat Intelligence (TI) team as they discuss the latest cyber attacks observed by our Security Operations Center (SOC) in August 2021. Watch this on-demand webinar today to learn more about:
    - PetitPotam, a new method for initiating NTLM relay cyber attacks
    - The growing incidence of malicious actors using offensive security tools and tactics, and how eSentire is leveraging Red Team Modeling to perform attack research to deal with these cyber threats
    - Understand how eSentire operationalizes customer-provided Red Team reports to create novel detection and runbooks through the Pentester’s Perspective
    - Actionable takeaways to protect your business
    This webinar also includes a Q&A session.
  • Protect Your Business Against Evolving Cybercrime Recorded: Aug 5 2021 45 mins
    Matt Ellison, James Alliband
    Achieve Greater Cyber Resilience

    UK businesses are experiencing over 2,000 new cyberattacks a day, costing the economy billions of pounds each year. A shadow ‘cybercrime as a service’ industry has emerged where hackers and criminal groups now leverage readily available tools and stolen credentials.

    Join experts from eSentire and VMware Carbon Black as they shed light on how cybercrime has evolved into an organised, sophisticated and collaborative industry, and uncover the tactics and techniques behind modern phishing and ransomware campaigns.

    Key Takeaways:
    - Understand and identify your cyber risk
    - How cybercrime organisations are operationalising and their preferred methods of choice
    - Dive into recent incidents to explore threat scenarios that combine multiple tools and techniques
    - Obtain best practice guidance on protecting your business

    Speakers:
    Matt Ellison, Principal Solutions Engineer, eSentire
    James Alliband, Security Strategist, VMWare Carbon Black
  • July 2021 Threat Intelligence Observations Recorded: Jul 26 2021 39 mins
    Spence Hutchinson, Paul Aitken
    Join eSentire's Threat Intelligence (TI) team as they discuss the latest attacks observed by our Security Operations Center (SOC). Download this webinar today to learn more about:

    - REvil ransomware campaign against Kaseya VSA Servers
    - PrintNightmare Windows principal vulnerability
    - The ongoing FIN7 campaign and recent incidents

    This webinar will also include a Q&A session

    Speakers:
    Spence Hutchinson, Manager of Threat Intelligence Team, eSentire
    Paul Aitken, Cyber Threat Intelligence Analyst, eSentire
  • Fireside Chat: Cybersecurity Trends in Manufacturing Recorded: Jul 22 2021 48 mins
    Mark Sangster, Todd Boppell
    Watch this fireside chat with the National Association of Manufacturers COO, Todd Boppell, and eSentire’s Vice President and Industry Security Strategist, Mark Sangster at their 2021 COSMA Leadership Conference. Learn more about:
    - The common misconceptions top executives have when it comes to cyber risk
    - How sophisticated cyber attacks have become over the last few years
    - Why ransomware has become the biggest concern
    - Some of the basics organizations should be doing to protect their business
  • The Best Kept Secret for Effective Managed Detection and Response (MDR) Recorded: Jul 19 2021 57 mins
    Rob McLeod, Kurtis Armour, Gary Miliefsky
    Not All MDR is Created Equal

    At eSentire, we believe a multi-signal approach is paramount to protecting your complete attack surface. Whether your environment is in the cloud, on-premises or somewhere in between, we have the visibility to see what other MDR providers may miss.

    MDR has exploded in popularity answering the challenge to rapidly identify advanced threats and contain them before disruption and damage occurs. Learn more about:
    - Understanding why not all MDR platforms are created equal
    - Why traditional MSSPS are no match for the growing speed and sophistication of modern threats
    - The importance of multi-signal for MDR and complete perimeter protection
    - Ensuring the right mix of operational technologies and personnel so you can stop attackers before they accomplish their objectives

    Join eSentire’s Kurtis Armour and Rob McLeod for a live webinar with Gary Miliefsky, CISSP, Publisher of Cyber Defense Magazine. We will discuss the secret and most efficient multi-signal approach to MDR and much more.
  • The Story Behind MDR with Microsoft Defender Recorded: Jul 14 2021 41 mins
    Kurtis Armour, Jason Westhaver
    Join eSentire’s Kurtis Armour, Director of Product Management and Jason Westhaver, Technical Lead, Enterprise Security as they speak with MISA (Microsoft Intelligent Security Association) about how organizations can use their existing investment in the Microsoft ecosystem and accelerate their security program with eSentire’s around-the-clock Managed Detection and Response (MDR) that shrinks threat actor dwell time and reduces the risk of business disruption.

    Key solution benefits and outcomes:
    - Simple: eSentire MDR is Zero Install and leverages your existing investment in Microsoft 365
    - Fast: We deploy within an hour and you see results immediately.  Time-to-value is measured in minutes and hours, not days and weeks.
    - Precise: eSentire MDR provides coverage mapped to the MITRE ATT&CK Framework and our security experts operationalize it, hardening your endpoint and email security posture.
    - Rapid Response: Our 24/7 SOC experts and Elite Threat Hunters investigate and contain threats on your behalf.
  • June 2021 Threat Intelligence Observations Recorded: Jul 2 2021 48 mins
    Spence Hutchinson, Keegan Keplinger, Paul Aitken
    Join eSentire's Threat Intelligence (TI) team as they discuss the latest attacks observed by our Security Operations Center (SOC). Download this webinar today to learn more about:
    - Various commodity malware threats that are known precursors to ransomware. This discussion will focus on two primary delivery methods: email and drive-by attacks, and what you can do to reduce your risk.
    - Deep dive into Qakbot malware and demonstrate how quickly this threat can escalate from an opportunistic to targeted attack.
    The webinar will also include a Q&A session.

    Speakers:
    Spence Hutchinson, Manager of Threat Intelligence Team, eSentire
    Keegan Keplinger, Research and Reporting Lead, eSentire
    Paul Aitken, Cyber Threat Intelligence Analyst, eSentire
  • Leading Through a Cyber Crisis: Lessons from 9/11 to Presidential Inaugurations Recorded: Jun 29 2021 61 mins
    Mark Sangster, Robert Darling, Bob Quinn
    When time is critical to containing cost and protecting your firm's reputation, many business executives learn too late that your ability to lead through a crisis begins long before the cyber incident itself. Retired U.S. Marine Corps Lt. Col. Robert Darling, who played a critical communications role on 9/11 and Bob Quinn, FBI retired crisis management specialist and senior operations planner, join Mark Sangster, eSentire’s VP and Industry Security Strategist, to share their experiences responding to the attacks on 9/11, planning for potential cyber incidents during presidential inaugurations, the Super Bowl and Papal visits.

    They share hard-won valuable lessons preparing senior executives on how to manage through a crisis, leading teams through stressful situations, and knowing when to lead and when to follow.
    - Participating and team building during incident planning
    - Understanding relationships, building trust and brokering cross-functional communications with security operations teams
    - Understanding your role: directing the WHAT and not the HOW

    Speakers:
    Mark Sangster, VP Industry Security Strategist, eSentire
    Lt. Col. Robert J Darling USMC (Ret), President, Quantitative Analytics
    Bob Quinn, Training and Operations Lead, Turning Point Crisis Management-USA

    About Robert Darling: Lt. Col. Darling retired from the U.S. Marine Corps with just over 20 years of active duty service. In Oct 2000, he was selected to work for The White House Military Office, Airlift Operations Department and later supported the President, Vice President, and National Security Advisor in the Presidential Emergency Operations Center (PEOC) on 9/11.

    About Bob Quinn: Bob Quinn is the Training and Operations Lead for Turning Point Crisis Management-USA (TPCM-USA). His career includes twenty-three years of service in the U.S. Navy, leadership experiences in coordination and execution of FBI, Homeland Security, military and non-profit organization operations.
  • Threat Intelligence Spotlight: Hunting Elusive Malware Recorded: Jun 29 2021 27 mins
    Mark Sangster, Greg Foss, Rob McLeod, Keegan Keplinger
    Endpoint protection is more important today than ever before. Cybercriminals have leveraged the Covid-19 corporate disruption and continue to exploit user behavior to evade traditional defenses and access critical systems and data.

    Join experts from eSentire and VMware Carbon Black as they examine malware trends and evasion strategies as described in our latest threat intelligence spotlight report.

    Key Insights:
    - Unpacking sophisticated cyberattacks
    - Under the hood examination of malware infection and propagation
    - Deconstructing malware evasion strategies
    - Actionable recommendation to protect your business.

    Speakers:
    Mark Sangster, Vice President and Industry Security Strategist, eSentire
    Rob McLeod, Senior Director Threat Response Unit, eSentire
    Keegan Keplinger, Research and Reporting Lead, eSentire
    Greg Foss, Principal Threat Researcher, VMware Carbon Black
  • The Next Generation of Cyber Investigation and Response Recorded: Jun 25 2021 57 mins
    Bryan Sartin, Erin McLean, Mark Sangster
    Watch our webinar to discover how eSentire is revolutionizing Incident Response with our cutting-edge technology, people-powered approach, and advanced response capabilities. The eSentire Artemis Incident Response team is here to rapidly respond to and remediate cyber-attacks with Incident Commander level expertise and industry-leading technologies, 24x7.

    Key Learnings:
    - How we are redefining industry leading incident response with a 4-hour threat suppression SLA, remotely, anywhere in the world
    - The unique people-powered approach we deliver that leverages eSentire's leading global 24/7 SOC Cyber Analysts and Elite Threat Hunters
    - The advance deployment of elite digital forensics, remote access investigation and response tooling that enables incident response within hours
    - How eSentire Emergency Incident Response provides end-to-end incident lifecycle support for comprehensive recovery
    - Guidance and best practices our team leverages for incident response planning to mitigate impact by substantially reducing the mean time to identify (MTTI) and mean time to contain (MTTC)

    Speakers:
    Bryan Sartin, Chief Services Officer, eSentire
    Mark Sangster, Vice President and Industry Security Strategist, eSentire

    Moderator:
    Erin McLean, Chief Marketing Officer, eSentire
  • Become Cyber Resilient - The Next Generation of Cyber Investigations & IR Recorded: Jun 8 2021 61 mins
    Bryan Sartin, Chief Services Officer, eSentire; Brandon Dunlap, Moderator
    Cyber investigations and Incident Response (IR) stand to benefit more from disruption than any proficiency in security. What should and could be on the leading edge still relies on outdated, people-heavy approaches, and circa 2005 technologies. Shockingly, this is still how some of the biggest players in the industry tackle the most brand damaging cyber events today. This traditional engagement model is tedious; takes too long and costs too much. Smarter, better and faster options are within our grasp. Join eSentire and (ISC)2 on June 8, 2021 at 1:00 p.m. Eastern/ 10:00 a.m. Pacific for an examination of some of the big rock innovations that are accelerating and revolutionizing the IR world. We’ll cover advancements in endpoint and network sensors, and process improvements in evidence acquisition and analysis and will pivot to forward-leaning engagement models converging IR, cyber intelligence and SOC analyst expertise. Other topics to be covered include:

    - How modern day cyber investigations and Incident Response can leap off the starting blocks more quickly, with faster time-to-execution and time-to-value for customers.

    - How the next generation of cyber investigation and Incident Response will change the game for information security executives who are looking for a leg up when going into battle to protect their businesses from cybersecurity incidents.
The Authority in Managed Detection and Response
eSentire, Inc. is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 1000+ organizations in 70+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events. Combining cutting-edge machine learning XDR technology, human expertise, and proven security operations leadership, eSentire mitigates business risk, and enables security at scale. The Team eSentire difference means enterprises are protected by the best in the business with a named Cyber Risk Advisor, 24/7 access to SOC Cyber Analysts and Elite Threat Hunters, and industry-leading threat intelligence research from eSentire’s Threat Response Unit (TRU). eSentire provides Managed Risk, Managed Detection and Response and Digital Forensic and Incident Response services.

For more information, visit www.esentire.com and follow @eSentire.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Safeguarding Confidential Data from the Most Common Cyber Attacks Law Firms Face
  • Live at: Jun 7 2021 11:58 am
  • Presented by: Mark Sangster, Rob McLeod, Keegan Keplinger
  • From:
Your email has been sent.
or close