Hi [[ session.user.profile.firstName ]]

Zero-day Targeting Exchange Servers: Steps to Evaluate Your Risk

Join Critical Start’s CISO, Travis Farral, and Microsoft Solutions Principal, Charlie Smith, as they walk through the zero-day targeting Microsoft Exchange Servers.

What will be covered:
- What happened?
- What did the attackers do?
- Who are the attackers?
- Who is impacted?
- What should your organization do?

Need more information? Contact us at, https://www.criticalstart.com/contact/.
Recorded Mar 11 2021 46 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Travis Farral and Charlie Smith
Presentation preview: Zero-day Targeting Exchange Servers: Steps to Evaluate Your Risk

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Zero-day Targeting Exchange Servers: Steps to Evaluate Your Risk Recorded: Mar 11 2021 46 mins
    Travis Farral and Charlie Smith
    Join Critical Start’s CISO, Travis Farral, and Microsoft Solutions Principal, Charlie Smith, as they walk through the zero-day targeting Microsoft Exchange Servers.

    What will be covered:
    - What happened?
    - What did the attackers do?
    - Who are the attackers?
    - Who is impacted?
    - What should your organization do?

    Need more information? Contact us at, https://www.criticalstart.com/contact/.
  • Threat Briefing: What to Know and Do About the SolarWinds Attack Recorded: Jan 7 2021 52 mins
    Travis Farral
    The SolarWinds cybersecurity breach known as Sunburst has organizations ranging from government agencies to private enterprises wondering if and how they were impacted – and what they should do to protect themselves from this and future attacks.

    Get the facts you need in our on-demand Threat Briefing, presented by Travis Farral, Chief Information Security Officer - Managed Detection and Response at Critical Start.

    This session will provide:
    • Details on the SolarWinds attack, timeline, and impact
    • Recommended actions for SolarWinds customers
    • General guidance for any organization to use to detect and prevent such attacks by reducing their attack surface
    • Other resources from Critical Start including a Compromise Assessment Service that targets specific indicators of compromise involved in the SolarWinds breach
    • Additional external resources available to you
  • Position Your Security Operations for Current and Future Success Recorded: Dec 2 2020 38 mins
    Jordan Mauriello, SVP Managed Security, Critical Start and Richard Diver, Senior Technical Manager, Microsoft
    Managing your organization’s security operations comes down to one question: What if…?

    Consider all the “what if” situations you might face from attackers. Will your security operations teams be prepared for each level of threat that comes at them?

    You can take steps to ensure your information security operations are well positioned for those scenarios amid a shifting threat landscape. Security operations teams that will be successful now and in the future are those that focus on the whole package: having the technology, culture, people, training, integration, automation, and partnerships to call upon when needed.

    Join Jordan Mauriello, Critical Start SVP of Managed Security, and Richard Diver, Microsoft Senior Technical Manager, Security Partner Development, for “Position Your Security Operations for Current and Future Success.”

    Key takeaways from this virtual session include:
    -Whether you’re making the most of the security tools you already have

    -How a maturity assessment of your security operations can determine if you have the detection and response capabilities needed

    -How Microsoft and Critical Start are partnering to help solve security operations challenges
  • Reduce Your Risk: Best Practices for Securing OT and SCADA Networks Recorded: Oct 21 2020 43 mins
    Allyn Lynd, DFIR Senior Advisor, CRITICALSTART and Chase Dardaman, Sr. Adversarial Engineer, CRITICALSTART
    How vulnerable is your operational technology? In sectors ranging from manufacturing and utilities to transportation and healthcare, automation makes work easier and more efficient. However, increased automation brings greater security risks and more opportunities for hackers who are looking to disrupt and exploit OT environments.

    Join CRITICALSTART TEAMARES security experts, Allyn Lynd (Blue team) and Chase Dardaman (Red team.)

    In this one-hour session, you will learn best practices to:

    •Deploy and maintain security for your OT / SCADA devices (spoiler alert: number one is OT/IT segmentation).
    •Design new OT / SCADA systems integrating security from the beginning as opposed to after it has been deployed.
    •Ensure your incident response plan has what it takes to limit damages from breaches.
    •Build your business case to secure approval and funding for new security measures.

    Not enough? How about actual use cases of OT / SCADA attacks; Allyn will share from his experience working as an FBI agent.
  • Team Ares Red and Blue Series:  Exploiting Enterprise Passwords Recorded: Sep 23 2020 56 mins
    Cory Mathews, Offensive Security Manager and Joffrin Alexander, DFIR Analyst
    No matter how much you think you’ve done to safeguard your data and systems against breaches, common vulnerabilities continue to wreak havoc on enterprises. 80% of hacking-related breaches involved compromised and weak credentials.

    Attackers are finding quick access to enterprise domain admins by simply guessing a password and logging in as that domain admin.

    Given these challenges, what can you do to shore up your passwords and protect your organization? Join CRITICALSTART’s TEAMARES security experts, Cory Mathews and Joffrin Alexander, as they present, “Exploiting Enterprise Passwords."

    From phishing pages to password spraying, you’ll learn how attackers gain access to passwords and what they do with those passwords once they’ve cracked them, as well as:

    - Methods to defend against these attacks specifically focusing on using strong passwords, password manager solutions, and probably most importantly multi-factor authentication.

    - External attacks such as logging in to enterprise solutions such as OWA, VPN, and file shares to maliciously changing passwords to lockout user’s access – and what you can do to prevent these attacks.

    - Proactive defense strategies including how to ensure you’re using strong passwords and how multi-factor can prevent breaches.

    - Internal actions you can take such as limiting excessive admin rights and other preventative measures.
  • Why Next Gen SIEM Paired with MDR is a Game-changer Recorded: Sep 9 2020 60 mins
    Jordan Mauriello, Critical Start -SVP of Managed Services and Jason Mical, Devo -Cybersecurity Evangelist
    Next-Gen SIEM is critical for security operations thanks to the comprehensive visibility it gives us into our security environments. However, the data can only take a security operations team so far, without a managed SIEM approach.

    Join security experts Jordan Mauriello, SVP of Managed Services from Critical Start and Jason Mical, Cybersecurity Evangelist from Devo as they discuss why the market needs to care about next-Gen SIEM, and why combining SIEM with MDR is a game changer for security operations.

    In this webinar, you will learn:
    · Why Next Gen SIEM
    · How to increase the value of your MDR with SIEM technology
    · Why Devo (isn't just a Splunk alternative)
    · Why Critical Start and Devo are partnering together
  • Impact of Zero Day Exploits on Breaches Recorded: Aug 26 2020 55 mins
    Cory Mathews, Offensive Security Manager and Rich Mirch, Sr. Adversarial Engineer
    Organizations are losing the endpoint security battle against new or unknown zero-day attacks.

    While there is no way to prevent zero-days, there are steps you can take to reduce the impact and/or severity of security incidents whether or not zero-days are involved.

    To explore these issues and how you can shore up vulnerabilities, join CRITICALSTART’s TEAMARES as they share:

    - What a zero-day is – and what it is not
    - Using a zero-day to breach the perimeter and pivoting into sensitive areas within organizations
    - Challenges and methods in defending against zero-day including patching, defense in depth, and mature network and endpoint monitoring solution
    - TEAMARES’ vulnerability research team’s success stories of discovering zero-days and developing full Proof-of-Concept exploits
    - Examples of infamous zero-day and +1-day events such as WannaCry using NSA tools released by the Shadow Brokers
  • Lessons Learned from Billion Dollar Breaches Recorded: Jul 22 2020 55 mins
    Allyn Lynd, Senior Incident Response Manager, CRITICALSTART
    Globally, breaches cost organizations billions of dollars every year. In the U.S., losses for each breach average just under $10 million.

    However, beyond the cost of remediation, breaches also impact an organization’s brand and reputation. After a breach, a company loses an average of 4% of its customer base, while a government entity loses the trust of the citizens using their services.

    In examining these breaches, we find ourselves asking, “What did these organizations do right? What could the organizations have done better?”

    Join CRITICALSTART's security expert, Allyn Lynd, as he revisits some of the most expensive data breaches in history.

    Key takeaways from this webinar include:
    •How to prepare for a breach
    •What to do once a breach occurs
    •How to recover from a breach in the long term
    •What mistakes to avoid if/when a breach does occur
  • Uncovering Your Security Blind Spots Recorded: Jun 24 2020 38 mins
    Quentin Rhoads-Herrera, Director of Professional Services, CRITICALSTART
    How big is your security risk and how do you identify and contain those risks?
    You may be surprised to learn that there are looming threats you can’t see, and attackers may be enjoying a long dwell time within your system – before you even detect an issue.

    Join CRITICALSTART to explore how big your security risk is throughout your organization, and how to uncover those potential blind spots.

    In this live session you’ll learn:

    - How to identify potential risk – asset management, risk register development

    - How to build an operation around risk mitigation – how to set up cadence for vulnerability scanning, pentesting, incident response tabletops to gauge your response to a breach

    - How to automate and leverage tools for efficiency across your operation
  • Threat Hunting and Modern Security: 3 Fundamental Flaws Recorded: May 7 2020 60 mins
    Alex Humphrey, Senior Security Consultant, CRITICALSTART
    As threats and attacks evolve, many organizations find that traditional methods and products are limited in their scope and effectiveness. Compounding the problem, the growing cybersecurity skills shortage means many companies don’t have a dedicated team that can view and respond to threats 24/7 or support their growing remote workforce. Join us on May 7th to stay engaged and connected on the 3 fundamental flaws of threat hunting in this new day and age.
Resolve every alert. Stop breaches.
CRITICALSTART is leading the way in Managed Detection and Response (MDR) services. Our Trusted Behavior Registry reviews every alert to determine if it was generated by known-good behavior versus unknown behaviors that need to be investigated by our
analysts. This allows us to resolve every alert and stop accepting risk - leveraging our transparent platform and native iOS and Android mobile apps.

Our mission is simple: detect threats and stop breaches by resolving every alert for our customers. We do this for enterprises through our award-winning portfolio of end-to-end security services, including MDR and Professional Services.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Zero-day Targeting Exchange Servers: Steps to Evaluate Your Risk
  • Live at: Mar 11 2021 11:45 pm
  • Presented by: Travis Farral and Charlie Smith
  • From:
Your email has been sent.
or close