Security threats are on the rise, and your SOC team may need to adapt quickly to collaborate and communicate across multiple teams. In this webinar, we’ll take you through three attack campaigns from 2020 using real examples of how different teams within CyberProof and our customers worked together - including L1 and L2 analysts, security engineers, incident responders and threat intel analysts - to mitigate these attacks.
In this webinar, Nethaniel Ribco, Sr. Cyber Threat Intelligence Specialist, Mark Vaitzman, Sr. Analyst, and Ben Chant, Product Marketing Manager explore:
- How the techniques used by various teams differed based on the type of attack, such as data leakage, dark web monitoring, and detection on the endpoint.
- How to capture relevant data from both internal and external sources for reinforced learning and tuning of detection and response capabilities
- The most effective methods for communicating across teams, increasing visibility of operations and collaboratively remediating incidents
RecordedFeb 23 202156 mins
Your place is confirmed, we'll send you email reminders
Arik Day - EDR Lead, Nils Haza - Sr Solutions Architect, Benjamin Chant - Product Marketing Manager
You’ve invested in EDR technology – now how do you get the most from it?
EDR is a powerful technology, but it can also be overwhelming to manage given the depth of raw data it collects such as execution processes, operating system activities, registry keys, memory activity, command lines and more. This data needs to be analyzed and put into the context of an incident.
So what can you do to make this easier on your team and start seeing continuous return on investment? In this webinar, we will cover:
• Staying on top of attacker techniques and your own infrastructure changes to customize endpoint security policies
• Why using EDR for ongoing threat hunting is essential and how to do it properly
• The importance of tuning detection rules to keep up with the changing threat landscape
• Utilizing automated responses to maximize EDR capabilities
Security threats are on the rise, and your SOC team may need to adapt quickly to collaborate and communicate across multiple teams. In this webinar, we’ll take you through three attack campaigns from 2020 using real examples of how different teams within CyberProof and our customers worked together - including L1 and L2 analysts, security engineers, incident responders and threat intel analysts - to mitigate these attacks.
In this webinar, Nethaniel Ribco, Sr. Cyber Threat Intelligence Specialist, Mark Vaitzman, Sr. Analyst, and Ben Chant, Product Marketing Manager explore:
- How the techniques used by various teams differed based on the type of attack, such as data leakage, dark web monitoring, and detection on the endpoint.
- How to capture relevant data from both internal and external sources for reinforced learning and tuning of detection and response capabilities
- The most effective methods for communicating across teams, increasing visibility of operations and collaboratively remediating incidents
Doug Saylors, ISG Cyber Security Director, Tony Velleca, CyberProof CEO
Why choose between making the necessary investments in staff and training or handing control to a third-party provider? Adopting a hybrid engagement model that allows you to augment your existing team with those skills that are hard to come by without the capital investment or losing visibility of day-to-day security operations.
Bruce Roton, VP/Global Head of Security Strategy, CyberProof Ben Chant, Product Marketing Manager, CyberProof
This session breaks down how to adapt detection and response processes in line with a changing threat landscape while measurably reducing risk. Learn to define your business’ response window of acceptable loss and identify gaps in your security by leveraging the MITRE ATT&CK framework and using automation to deploy tailored use cases consisting of prevention, detection and response controls.
Sean Keef, Skybox Security North American Technical Director, Sinu Peter, CyberProof Principal Security Architect
With the influx of vulnerability alerts, fatigue sets in and it’s near impossible to weed through what is important and what can be automated. SOCs need the ability to classify asset criticality with threat intelligence.
Join this discussion to learn how utilizing a single pane of glass view with API architecture, automation & orchestration to leverage existing security investments can remediate threats quickly to reduce the workload for the SOC team and prioritize remediation.
Ann Johnson, Corporate VP of Microsoft Security & ComplianceYuval Wollman, CyberProof President
Security teams are struggling to reduce the time to detect and respond due to complexity and volume of alerts being generated from multiple security technologies. Now that workloads are being migrated to the cloud, this brings an additional perimeter which requires constant vigilance for early signs of a cyber attack but is extremely difficult to maintain due to its elastic nature and the constant provisioning of new services.
Yuval Wollman welcomes Ann Johnson, Corporate VP of Microsoft Security & Compliance to provide an overview of how CyberProof’s strategic partnership with Microsoft is helping organizations to modernize their security monitoring, detection and response across their entire IT estate and reduce time and money with a cloud-scalable approach.
Tamir Pardo, XM Cyber President and Former Mossad DirectorTony Velleca, CyberProof CEO
The only certainty in 2020 has been uncertainty; from exploits using COVID as bait, to ransomware, security professionals are doing their best to navigate as we look towards the year ahead.
This session provides an overview on maintaining SOC efficiency when working from home, metrics SOCs should provide, and how taking advantage of cloud and automation are the path to agility in unpredictable times.
Tony Velleca, CEO of CyberProof and Howard Silverman, Head of Marketing at CyberProof
Organizations have been forced – practically overnight – into remote workforce business models, expanding attack surfaces, and the growing complexity of cyber-attack techniques.
As CISOs, we need to turn the dial from investing in point prevention solutions and trying to articulate what the value is afterwards - to identifying the business risks we need to mitigate first and then focusing on the primary attack scenarios that could cause those risks to happen.
For organizations to defend themselves against an ever-changing threat landscape requires leveraging an Agile detection and response framework as a preventative control, while leveraging readily available tools like MITRE ATT&CK, NIST, and others.
While cyber threats are growing, the skills gap is getting worse, yet the average cyber-security budget is staying the same. So, how do organizations do more with less?
What You Will Learn About
· Demonstrating security KPIs instead of SLAs
· Using the MITRE ATT&CK framework to improve cyber defense
· Assessing your security portfolio from a risk perspective
· Developing a use case factory that allows you to optimize detection & response
· Implementing a hybrid model that improves flexibility in resource allocation
· Applying an Agile methodology to stay ahead in a changing threat landscape
In the last decade, it has been a common axiom of cyber security that it is not a question of if an organization’s defenses will be breached, but only of when. And while cyber-attacks and data breaches are always business disrupting, they can also be very costly. Therefore, Time to Detection and Time to Effective Respond have become critical measurements for the success of any organization’s cyber security program.
This is the second webinar in a 2-part series where we'll delve deeper into the issues and processes of intruder detection, from first response through intruder eviction and remediation.
Skybox VP of Channels - Mike Heredia, CyberProof UK - Craig Saunderson, Moderated by Howard Silverman
Multi-layered security tools can be expensive with many struggling to understand how, or if, these investments are properly managing vulnerabilities and improving security posture. A threat-centric approach can help provide an accurate and continuous view of risk exposure to organizations.
In this webinar CyberProof's Director of Cyber Security Sales, Craig Saunderson and Skybox Security's VP of Integrator Channels, Mike Heredia will discuss:
• Common mistakes when trying to understand high risk vulnerabilities
• How to prioritize vulnerabilities and speed up remediation efforts
• What good vulnerability management should look like
• How a threat-centric approach can help you get an accurate and continuous view of your risk exposure
It is a common axiom of cyber security wisdom that it is not a question of if an organization’s defenses will be breached, but only a question of when. Further, while cyber-attacks and data breaches are always business disrupting, they can also be very costly. Therefore, Time to Detection and Time to Effective Respond have become critical measurements for the success of any organization’s cyber security program. An effective and proactive Intruder Hunting Program, combined with a well-planned cyber response, can help stop cyber-attacks before they become business disrupting events, and should be a cornerstone of any Enterprise Cyber Security Program.
Richard Telleria, Anand Trivedi, Halim Santoso, Abbas Kudrati
With cyber threats increasing in quantity and complexity, what strategy should CISOs adopt in order to be prepared and protected from constant and new-age attack tactics?
In this webinar CyberProof and Microsoft Australia security leaders will team up to discuss how the cyber security landscape has been altered due to COVID-19 and how using automation and data analytics can combat increasing cyber threats.
Hear from security experts:
Richard Telleria - Managing Director, UST Global
Anand Trivedi - Head of Cyber Security Business, CyberProof
Halim Santoso - Head of Business Development, Microsoft Australia
Abbas Kudrati - CISO,CISM,CPDSE,CSX-P, Chief Cyber Security Advisor, Microsoft APAC
Gus Evangelakos, XM Cyber Director of Field Engineering, and R. Teall Rist, CyberProof Principal Security Architect
When it comes to cyber attacks the speed in which you are able to respond is of equal importance as time to detect. While SIEM solutions improve visibility into attack paths, security teams also need to be able to continuously refine their cyber defense.
In this webinar CyberProof's Principal Security Architect, R. Teall Rist will be teaming up with XM Cyber's Director of Field Engineering, Gus Evangelakos, to discuss how you can improve SOC efficiency using attack simulations to:
- Identify new attack paths
- Optimize and automate playbooks
- Rapidly contain and eradicate validated threats
- Ensure potential threats are understood within the context of your business
- Continuously validate the exposure of an asset as attacker techniques and patterns change
Join R. Teall Rist and Gus Evangelakos on August 18th to discover how your organization can expand detection coverage and remediate risks as they emerge. Register today!
CyberProof's CEO, Tony Velleca and VP of Security Strategy, Bruce Roton
In this webinar CyberProof CEO, Tony Velleca and VP of Security Strategy, Bruce Roton, will shed light on how and why CyberProof uses this framework for better threat detection mapping, and how companies can benefit from implementing it into their cyber security strategy.
Today’s security professionals are busier than ever. In addition to existing cyber security responsibilities and challenges, their role has expanded to include brand protection, third-party risk management, and privacy protection as companies continue to digitalize.
In this Talk, CyberProof CEO, Tony Velleca and guest speaker, Forrester Senior Analyst, Enza Iannopollo, share how security pros and privacy leaders can tackle ways to support business initiatives, protect their brands, and promote customers' trust.
Listen and discover how your cyber security strategy can contend with:
- Expansion of cloud services
- Rapid development of new applications and products
- Increased IT complexity
- Global privacy laws compliance
Aman Malhotra, CyberProof Security Solutions Architect & Iftekhar Hussain, Cyber Defense Analyst, Microsoft Asia Pacific
CISOs are facing a myriad of challenges as businesses scale down, and cyber threats escalate. While some organizations had already started adapting their SOCs for the digital transformation pre-pandemic, COVID-19 has accelerated the need.
Join this webinar to hear from the following security experts:
Terence Gomes, Enterprise Cyber Security Executive, Microsoft India
Anand Trevedi, Head of Cyber Security Business, CyberProof India
Iftekhar Hussain, Global Black Belt - Cyber Defense and Threat Analytics, Microsoft Asia Pacific
Aman Malhotra, Cyber Security Solutions Architect, CyberProof
Register now for insights on how your organization can adapt to the new normal amid budgetary constraints - without sacrificing security.
Featuring guest speaker, Forrester analyst, Diego Lo Giudice and UST's Head of Testing & Quality Engineering, George Ukkuru
As continuous delivery practices accelerate the volume of releases, test teams must find ways to validate software performance faster without compromising quality. Traditional testing practices can’t keep pace with modern application developments, and scaling testing for efficiency, accuracy and speed is critical. Test Automation has become an essential element of the end to end test lifecycle in every organization. Most tool-based testing approaches fall short of addressing test lifecycle automation needs or make it quite challenging. This has paved the way to platform-centric Quality Engineering.
Join Forrester’s expert on SDLC processes and practices--our guest speaker, Vice President and Principal Analyst Diego Lo Giudice – and UST Global’ s Head of Testing and Quality Engineering Services, George Ukkuru, for a webinar discussing the modern methods and techniques around quality engineering. Learn about how UST’s quality engineering platform, NoSkript™ can improve quality, efficiency, and cost while accelerating cycle time.
What you will learn:
- How to apply Shift Left and Shift Right practices for early defect identification and to minimize business risks
- Why should a quality engineering team focus on an API-led automation approach
- How can automated test design help to optimize test cases and reduce maintenance efforts
- How to use prefabricated test data to improve the accuracy of Artificial Intelligence Solutions
Today’s security professionals are busier than ever. In addition to existing cyber security responsibilities and challenges, their role has expanded to include brand protection, third-party risk management, and privacy protection as companies continue to digitalize.
In this Talk, CyberProof CEO, Tony Velleca and guest speaker, Forrester Senior Analyst, Enza Iannopollo, share how security pros and privacy leaders can tackle ways to support business initiatives, protect their brands, and promote customers' trust.
Listen and discover how your cyber security strategy can contend with:
Expansion of cloud services
Rapid development of new applications and products
Increased IT complexity
Global privacy laws compliance
Anand Trivedi, CyberProof India's Head of Cyber Security Business
The scope of the coronavirus pandemic, and its global and regional impacts are coming to light. The attack surface has expanded in tandem with the spread of the virus, posing higher risks for remote employees and the organizations they work for.
COVID-19 has changed business operations in terms of cyber spend availability, while at the same time work from home security has created increased vulnerabilities.
In this webinar CyberProof India's Head of Cyber Security Business, Anand Trivedi, will shed light on:
- The scope of how the pandemic has affected Indian enterprises
- New cyber security challenges
- How CISO’s can respond and do more with less
CyberProof is a security services company that intelligently manages your incident detection and response. Our solution provides complete transparency and dramatically reduces the cost and time needed to respond to security threats and minimize business impact. SeeMo, our virtual analyst, together with our experts and your team automates and accelerates cyber operations by learning and adapting from endless sources of data and responds to requests by providing context and actionable information. This allows our nation-state cyber experts to prioritize the most urgent incidents and proactively identify and respond to potential threats. We collaborate with our global clients, academia and the technology ecosystem to continuously advance the art of cyber defense.
The Inner Workings of Cyber DefendersNethaniel Ribco, Sr. Cyber Threat Intelligence Specialist, Mark Vaitzman, Sr. Analyst[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]56 mins