InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Threat Briefing: What to Know and Do About the SolarWinds Attack

Presented by

Travis Farral

About this talk

The SolarWinds cybersecurity breach known as Sunburst has organizations ranging from government agencies to private enterprises wondering if and how they were impacted – and what they should do to protect themselves from this and future attacks. Get the facts you need in our on-demand Threat Briefing, presented by Travis Farral, Chief Information Security Officer - Managed Detection and Response at Critical Start. This session will provide: • Details on the SolarWinds attack, timeline, and impact • Recommended actions for SolarWinds customers • General guidance for any organization to use to detect and prevent such attacks by reducing their attack surface • Other resources from Critical Start including a Compromise Assessment Service that targets specific indicators of compromise involved in the SolarWinds breach • Additional external resources available to you
Critical Start

Critical Start

858 subscribers11 talks
Resolve every alert. Stop breaches.
Critical Start is the only MDR provider committed to eliminating acceptable risk and leaving nothing to chance. We believe that companies should never have to settle for “good enough.” Our award-winning portfolio includes end-to-end Professional Services and Managed Detection and Response (MDR). Our MDR puts a stop to alert fatigue by leveraging our ZTAP platform plus industry-leading Trusted Behavior Registry, which eliminates false positives at scale by resolving known-good behaviors. Driven by 24x7x365 human-led, end-to-end monitoring, investigation and remediation of alerts, our on-the-go threat detection and response capabilities are enabled via a fully interactive MOBILESOC.
Related topics