Hi [[ session.user.profile.firstName ]]

Threat Hunting and Modern Security: 3 Fundamental Flaws

As threats and attacks evolve, many organizations find that traditional methods and products are limited in their scope and effectiveness. Compounding the problem, the growing cybersecurity skills shortage means many companies don’t have a dedicated team that can view and respond to threats 24/7 or support their growing remote workforce. Join us on May 7th to stay engaged and connected on the 3 fundamental flaws of threat hunting in this new day and age.
Recorded May 7 2020 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Alex Humphrey, Senior Security Consultant, CRITICALSTART
Presentation preview: Threat Hunting and Modern Security: 3 Fundamental Flaws

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Making The Grade: Using MDR To Protect Schools From Cybersecurity Threats Recorded: Aug 2 2021 37 mins
    Stephen Selgrade, Jordan Mauriello, Fran Watkins, Alex Humphrey
    - MDR Overview: Why use Managed Detection and Response services for school districts & universities and how it works
    - Hear from Centennial School District on how they leverage MDR services
    - Quick Demo of the tools that enhance MDR services:
    Zero Trust Analytics Platform (ZTAP) and MOBILESOC app
  • SON OF A BREACH! - #BadgeLife Special Recorded: Jul 26 2021 50 mins
    Randy Watkins, Critical Start CTO and Florida Man (aka Jonathan Singer)
    Conference badges have evolved from paper and plastic to collectable mini-computers of all shapes and sizes, coveted and collected by security professionals and enthusiasts. The rise of #Badgelife signifies one of the most creative offshoots of security conferences, with its underground culture of hardware art and ingenuity.

    In this episode of SON OF A BREACH!, Critical Start CTO Randy Watkins welcomes badge creator Florida Man, a/k/a Jonathan Singer, to celebrate the allure of #Badgelife, reveal how deep the culture runs, and share tips on how to get started in the community.

    Tune in to learn:
    • The colorful, flashy history of #Badgelife
    • How unofficial conference badges have come to symbolize the security culture’s uniqueness and sense of community
    • Steps to start collecting or creating digital badges that people want to take home and talk about
    • What tools and techniques you need to design and produce your own #Badgelife creation

    Both fun and functional, digital badges celebrate computers and the security around them at the hardware level. Many are intentionally hackable so you can take control of the lights, noises, and other built-in features.

    Singer shares some favorites from his extensive badge collection, which you can see by watching the recorded video of this podcast episode.

    Jonathan Singer is SIEM and SOAR Practice Lead at GuidePoint Security, with certifications including GPEN, GWAPT, GCIA, GCFE, and CEH. He is a self-taught badge creator, who launched his first digital badge at Bsides Orlando 2013. Singer also shares his passion for cybersecurity and hardware on his YouTube channel.
  • Critical Start Managed Detection and Response (MDR) services with Microsoft Recorded: Jun 2 2021 59 mins
    Critical Start & Microsoft
    Learn how Critical Start Managed Detection and Response (MDR) services integrate with Microsoft Security tools to protect your organization 24/7/365.
  • Zero-day Targeting Exchange Servers: Steps to Evaluate Your Risk Recorded: Mar 11 2021 46 mins
    Travis Farral and Charlie Smith
    Join Critical Start’s CISO, Travis Farral, and Microsoft Solutions Principal, Charlie Smith, as they walk through the zero-day targeting Microsoft Exchange Servers.

    What will be covered:
    - What happened?
    - What did the attackers do?
    - Who are the attackers?
    - Who is impacted?
    - What should your organization do?

    Need more information? Contact us at, https://www.criticalstart.com/contact/.
  • Threat Briefing: What to Know and Do About the SolarWinds Attack Recorded: Jan 7 2021 52 mins
    Travis Farral
    The SolarWinds cybersecurity breach known as Sunburst has organizations ranging from government agencies to private enterprises wondering if and how they were impacted – and what they should do to protect themselves from this and future attacks.

    Get the facts you need in our on-demand Threat Briefing, presented by Travis Farral, Chief Information Security Officer - Managed Detection and Response at Critical Start.

    This session will provide:
    • Details on the SolarWinds attack, timeline, and impact
    • Recommended actions for SolarWinds customers
    • General guidance for any organization to use to detect and prevent such attacks by reducing their attack surface
    • Other resources from Critical Start including a Compromise Assessment Service that targets specific indicators of compromise involved in the SolarWinds breach
    • Additional external resources available to you
  • Position Your Security Operations for Current and Future Success Recorded: Dec 2 2020 38 mins
    Jordan Mauriello, SVP Managed Security, Critical Start and Richard Diver, Senior Technical Manager, Microsoft
    Managing your organization’s security operations comes down to one question: What if…?

    Consider all the “what if” situations you might face from attackers. Will your security operations teams be prepared for each level of threat that comes at them?

    You can take steps to ensure your information security operations are well positioned for those scenarios amid a shifting threat landscape. Security operations teams that will be successful now and in the future are those that focus on the whole package: having the technology, culture, people, training, integration, automation, and partnerships to call upon when needed.

    Join Jordan Mauriello, Critical Start SVP of Managed Security, and Richard Diver, Microsoft Senior Technical Manager, Security Partner Development, for “Position Your Security Operations for Current and Future Success.”

    Key takeaways from this virtual session include:
    -Whether you’re making the most of the security tools you already have

    -How a maturity assessment of your security operations can determine if you have the detection and response capabilities needed

    -How Microsoft and Critical Start are partnering to help solve security operations challenges
  • Reduce Your Risk: Best Practices for Securing OT and SCADA Networks Recorded: Oct 21 2020 43 mins
    Allyn Lynd, DFIR Senior Advisor, CRITICALSTART and Chase Dardaman, Sr. Adversarial Engineer, CRITICALSTART
    How vulnerable is your operational technology? In sectors ranging from manufacturing and utilities to transportation and healthcare, automation makes work easier and more efficient. However, increased automation brings greater security risks and more opportunities for hackers who are looking to disrupt and exploit OT environments.

    Join CRITICALSTART TEAMARES security experts, Allyn Lynd (Blue team) and Chase Dardaman (Red team.)

    In this one-hour session, you will learn best practices to:

    •Deploy and maintain security for your OT / SCADA devices (spoiler alert: number one is OT/IT segmentation).
    •Design new OT / SCADA systems integrating security from the beginning as opposed to after it has been deployed.
    •Ensure your incident response plan has what it takes to limit damages from breaches.
    •Build your business case to secure approval and funding for new security measures.

    Not enough? How about actual use cases of OT / SCADA attacks; Allyn will share from his experience working as an FBI agent.
  • Team Ares Red and Blue Series:  Exploiting Enterprise Passwords Recorded: Sep 23 2020 56 mins
    Cory Mathews, Offensive Security Manager and Joffrin Alexander, DFIR Analyst
    No matter how much you think you’ve done to safeguard your data and systems against breaches, common vulnerabilities continue to wreak havoc on enterprises. 80% of hacking-related breaches involved compromised and weak credentials.

    Attackers are finding quick access to enterprise domain admins by simply guessing a password and logging in as that domain admin.

    Given these challenges, what can you do to shore up your passwords and protect your organization? Join CRITICALSTART’s TEAMARES security experts, Cory Mathews and Joffrin Alexander, as they present, “Exploiting Enterprise Passwords."

    From phishing pages to password spraying, you’ll learn how attackers gain access to passwords and what they do with those passwords once they’ve cracked them, as well as:

    - Methods to defend against these attacks specifically focusing on using strong passwords, password manager solutions, and probably most importantly multi-factor authentication.

    - External attacks such as logging in to enterprise solutions such as OWA, VPN, and file shares to maliciously changing passwords to lockout user’s access – and what you can do to prevent these attacks.

    - Proactive defense strategies including how to ensure you’re using strong passwords and how multi-factor can prevent breaches.

    - Internal actions you can take such as limiting excessive admin rights and other preventative measures.
  • Why Next Gen SIEM Paired with MDR is a Game-changer Recorded: Sep 9 2020 60 mins
    Jordan Mauriello, Critical Start -SVP of Managed Services and Jason Mical, Devo -Cybersecurity Evangelist
    Next-Gen SIEM is critical for security operations thanks to the comprehensive visibility it gives us into our security environments. However, the data can only take a security operations team so far, without a managed SIEM approach.

    Join security experts Jordan Mauriello, SVP of Managed Services from Critical Start and Jason Mical, Cybersecurity Evangelist from Devo as they discuss why the market needs to care about next-Gen SIEM, and why combining SIEM with MDR is a game changer for security operations.

    In this webinar, you will learn:
    · Why Next Gen SIEM
    · How to increase the value of your MDR with SIEM technology
    · Why Devo (isn't just a Splunk alternative)
    · Why Critical Start and Devo are partnering together
  • Impact of Zero Day Exploits on Breaches Recorded: Aug 26 2020 55 mins
    Cory Mathews, Offensive Security Manager and Rich Mirch, Sr. Adversarial Engineer
    Organizations are losing the endpoint security battle against new or unknown zero-day attacks.

    While there is no way to prevent zero-days, there are steps you can take to reduce the impact and/or severity of security incidents whether or not zero-days are involved.

    To explore these issues and how you can shore up vulnerabilities, join CRITICALSTART’s TEAMARES as they share:

    - What a zero-day is – and what it is not
    - Using a zero-day to breach the perimeter and pivoting into sensitive areas within organizations
    - Challenges and methods in defending against zero-day including patching, defense in depth, and mature network and endpoint monitoring solution
    - TEAMARES’ vulnerability research team’s success stories of discovering zero-days and developing full Proof-of-Concept exploits
    - Examples of infamous zero-day and +1-day events such as WannaCry using NSA tools released by the Shadow Brokers
  • Lessons Learned from Billion Dollar Breaches Recorded: Jul 22 2020 55 mins
    Allyn Lynd, Senior Incident Response Manager, CRITICALSTART
    Globally, breaches cost organizations billions of dollars every year. In the U.S., losses for each breach average just under $10 million.

    However, beyond the cost of remediation, breaches also impact an organization’s brand and reputation. After a breach, a company loses an average of 4% of its customer base, while a government entity loses the trust of the citizens using their services.

    In examining these breaches, we find ourselves asking, “What did these organizations do right? What could the organizations have done better?”

    Join CRITICALSTART's security expert, Allyn Lynd, as he revisits some of the most expensive data breaches in history.

    Key takeaways from this webinar include:
    •How to prepare for a breach
    •What to do once a breach occurs
    •How to recover from a breach in the long term
    •What mistakes to avoid if/when a breach does occur
  • Uncovering Your Security Blind Spots Recorded: Jun 24 2020 38 mins
    Quentin Rhoads-Herrera, Director of Professional Services, CRITICALSTART
    How big is your security risk and how do you identify and contain those risks?
    You may be surprised to learn that there are looming threats you can’t see, and attackers may be enjoying a long dwell time within your system – before you even detect an issue.

    Join CRITICALSTART to explore how big your security risk is throughout your organization, and how to uncover those potential blind spots.

    In this live session you’ll learn:

    - How to identify potential risk – asset management, risk register development

    - How to build an operation around risk mitigation – how to set up cadence for vulnerability scanning, pentesting, incident response tabletops to gauge your response to a breach

    - How to automate and leverage tools for efficiency across your operation
  • Threat Hunting and Modern Security: 3 Fundamental Flaws Recorded: May 7 2020 60 mins
    Alex Humphrey, Senior Security Consultant, CRITICALSTART
    As threats and attacks evolve, many organizations find that traditional methods and products are limited in their scope and effectiveness. Compounding the problem, the growing cybersecurity skills shortage means many companies don’t have a dedicated team that can view and respond to threats 24/7 or support their growing remote workforce. Join us on May 7th to stay engaged and connected on the 3 fundamental flaws of threat hunting in this new day and age.
Resolve every alert. Stop breaches.
Critical Start is the only MDR provider committed to eliminating acceptable risk and leaving nothing to chance. We believe that companies should never have to settle for “good enough.” Our award-winning portfolio includes end-to-end Professional Services and Managed Detection and Response (MDR). Our MDR puts a stop to alert fatigue by leveraging our ZTAP platform plus industry-leading Trusted Behavior Registry, which eliminates false positives at scale by resolving known-good behaviors. Driven by 24x7x365 human-led, end-to-end monitoring, investigation and remediation of alerts, our on-the-go threat detection and response capabilities are enabled via a fully interactive MOBILESOC.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Threat Hunting and Modern Security: 3 Fundamental Flaws
  • Live at: May 7 2020 6:00 pm
  • Presented by: Alex Humphrey, Senior Security Consultant, CRITICALSTART
  • From:
Your email has been sent.
or close