Hi [[ session.user.profile.firstName ]]

Beyond Prevention: Boosting Detection to Stop Active Attacks

Organizations have frequently focused their security investments on prevention, but the “shift right” towards detection and response is now well underway. Today’s sophisticated attack campaigns use a combination of automated techniques to get their foot in the door, along with human-led tactics to perpetuate a targeted attack against an organization. The attack path typically follows predictable patterns and stages, offering detectable traces of the attacker’s actions and thus an opportunity to disrupt the campaign.

Watch this webinar to get guidance on how the Security Operations Center (SOC) can improve its threat-detection capabilities. We will examine several use cases to show how cybersecurity professionals have been able to disrupt active attacks by tracking down early indicators of compromise.
Recorded May 19 2021 57 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Maxine Holt, Sr. Research Director, Cybersecurity, Omdia & David Ries, Sr. Product Manager – Endpoint, Fidelis Cybersecurity
Presentation preview: Beyond Prevention: Boosting Detection to Stop Active Attacks

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Cloud Security 201: Securing Lift & Shift Cloud Migrations Oct 13 2021 4:00 pm UTC 61 mins
    Dave Shackleford (Voodoo Security) & Carson Sweet (Fidelis Cybersecurity)
    Dave Shackleford (Voodoo Security) and Carson Sweet (Fidelis Cybersecurity) discuss the challenges of lift-and-shift cloud migrations and how to secure them successfully.
  • A Crash Course in Designing a Cloud Security Architecture for Containerized Apps Sep 29 2021 4:00 pm UTC 40 mins
    VP of Product Management, Amit Gupta
    Join Cybersecurity expert Amit Gupta, for this crash course in designing a security architecture for your containerized applications. He will use real world examples to highlight:
    - How containerized applications are different from traditional virtual-machine based applications
    - New security implications and attack vectors
    - A security design pattern for your containerized applications
  • Top 6 Success Factors Multi & Hybrid Cloud Security Recorded: Sep 15 2021 37 mins
    Holger Schulze, CEO of Cybersecurity Insiders, and Carson Sweet, founder of CloudPassage
    Watch is webinar to learn the top 6 ways to secure diverse and complex multi- and hybrid-cloud environments.
  • The Cyber Strategy No One is Talking About: It’s Time to Get Active…Defense Recorded: Aug 11 2021 25 mins
    Gerald Mancini, COO, Fidelis
    Whose game are you playing? Today’s adversaries are more sophisticated. They get in deeper, hide longer, and wreak more havoc on your IT environment. Your adversaries are playing blindfold chess. Change the game to your advantage. Attend this session to learn how shifting to active defense changes the game on your adversaries by reshaping the attack surface so you can regain control and find, respond and neutralize threats earlier in the attack lifecycle.
  • Cybersecurity CISOs on Preventing the Next Big Attack Recorded: Jul 28 2021 59 mins
    Chris Kubic, CISO at Fidelis, Norman Kromberg, CISO at SouthernCarlson, Morgan Wright, Cyberterrorism Analyst, Fox News
    Over the past year, we’ve seen unprecedented cyber-attacks from sophisticated threat actors. Just in the last 3 months, the security world is still grappling with the after-effects of major breaches like Scripps, Colonial Pipeline, and JBS Meatpacking Plant. With this new level of cyber activity, what can organizations do to better prepare, defend, and respond to these ever-increasing threats?

    In this panel, moderated by Fidelis Cybersecurity’s CCSO Craig Harber, security experts including Chris Kubic, CISO at Fidelis, Norman Kromberg, CISO at SouthernCarlson, Inc., and Morgan Wright, Cyberterrorism and Cybercrime Analyst, Fox News and
    Chief Security Advisor, SentinelOne, will discuss strategies they have or plan to adopt to better defend their enterprise environments from the next big attack.
  • MITRE ATT&CK 2020 Evaluation: Find the Gaps in your Defense Recorded: Jul 7 2021 55 mins
    Chris Kubic, CISO & Craig Harber, CSO
    One of the biggest challenges for organizations is selecting and implementing the right security tools to empower SOC (Security Operations Center) teams.

    To help organizations, MITRE launched a program to assess endpoint solutions based on real-world threat groups Carbanak and Fin7. The MITRE Engenuity 2020 ATT&CK evaluation demonstrated that Fidelis Endpoint EDR was able to successfully detect simulated cyber-attacks early and often across all stages of the attack lifecycle.

    However, the evaluation did not cover any aspects of responding to attacks. Join our webinar to learn:

    *How to determine the right set of detection analytics and response capabilities in your security stack
    *How to use MITRE ATT&CK Evaluation to prioritize enterprise security investments
    *How organizations are leveraging the MITRE ATT&CK and MITRE Shield framework to provide context surrounding alerts.
    *How to change the game in favor of the defender with Active eXtended Detection and Response (XDR)
  • Changing the Game: Attack & Defend in Stealth Mode Recorded: Jun 9 2021 55 mins
    VP of R&D for Deception, Rami Mizrahi
    Enterprises are constantly under siege from advanced threats. With attackers eyeing your defenses, it is critical to understand your network and other security architecture components as your attackers see them. Knowing what attackers are looking for and how they are going to try to move through your network provides you with a key advantage. It will also make it easier to add an extra layer of protection to intercept and foil any potential avenues of attack.   

    To change the outcome, you need to change the game. Deception technologies alter the threat landscape making it more expensive and difficult for attackers to accomplish their mission.

    Join this webinar to understand how Deception technology can be a powerful weapon in your defensive arsenal.   

    Our VP of R&D for Deception, Rami Mizrahi, will demonstrate:   

    - Simulated scenarios showing the attack method,  
    - The type of attackers and what they’re looking for,  
    - And how Deception technology detects and defends against attackers.  

    Join us to learn how to think like an attacker and use deception in your environment to change the game on even the stealthiest of adversaries.
  • Changing the Game: Attack & Defend in Stealth Mode Recorded: May 28 2021 55 mins
    VP of R&D for Deception, Rami Mizrahi
    Enterprises are constantly under siege from advanced threats. With attackers eyeing your defenses, it is critical to understand your network and other security architecture components as your attackers see them. Knowing what attackers are looking for and how they are going to try to move through your network provides you with a key advantage. It will also make it easier to add an extra layer of protection to intercept and foil any potential avenues of attack.   

    To change the outcome, you need to change the game. Deception technologies alter the threat landscape making it more expensive and difficult for attackers to accomplish their mission.

    Join this webinar to understand how Deception technology can be a powerful weapon in your defensive arsenal.   

    Our VP of R&D for Deception, Rami Mizrahi, will demonstrate:   

    - Simulated scenarios showing the attack method,  
    - The type of attackers and what they’re looking for,  
    - And how Deception technology detects and defends against attackers.  

    Join us to learn how to think like an attacker and use deception in your environment to change the game on even the stealthiest of adversaries.
  • Beyond Prevention: Boosting Detection to Stop Active Attacks Recorded: May 19 2021 57 mins
    Maxine Holt, Sr. Research Director, Cybersecurity, Omdia & David Ries, Sr. Product Manager – Endpoint, Fidelis Cybersecurity
    Organizations have frequently focused their security investments on prevention, but the “shift right” towards detection and response is now well underway. Today’s sophisticated attack campaigns use a combination of automated techniques to get their foot in the door, along with human-led tactics to perpetuate a targeted attack against an organization. The attack path typically follows predictable patterns and stages, offering detectable traces of the attacker’s actions and thus an opportunity to disrupt the campaign.

    Watch this webinar to get guidance on how the Security Operations Center (SOC) can improve its threat-detection capabilities. We will examine several use cases to show how cybersecurity professionals have been able to disrupt active attacks by tracking down early indicators of compromise.
  • Beyond Prevention: Boosting Detection to Stop Active Attacks Recorded: Apr 21 2021 57 mins
    Maxine Holt, Sr. Research Director, Cybersecurity, Omdia & David Ries, Sr. Product Manager – Endpoint, Fidelis Cybersecurity
    Organizations have frequently focused their security investments on prevention, but the “shift right” towards detection and response is now well underway. Today’s sophisticated attack campaigns use a combination of automated techniques to get their foot in the door, along with human-led tactics to perpetuate a targeted attack against an organization. The attack path typically follows predictable patterns and stages, offering detectable traces of the attacker’s actions and thus an opportunity to disrupt the campaign.

    Watch this webinar to get guidance on how the Security Operations Center (SOC) can improve its threat-detection capabilities. We will examine several use cases to show how cybersecurity professionals have been able to disrupt active attacks by tracking down early indicators of compromise.
  • Taking Down Nation State Botnets Recorded: Apr 14 2021 59 mins
    Diana Kelley, SecurityCurve | Johna Till Johnson, Nemertes Research | Craig Harber, Fidelis | Derek Manky, Fortinet
    This month's episode of The (Security) Balancing Act will focus on botnets as a growing threat to the enterprise, examples from the real world, and what enterprises can do to better protect against botnet-fueled state sponsored attacks.

    Join this interactive roundtable discussion with security experts and industry leaders to learn more about:
    - How botnets have become a tool for cyber criminals and nation state actors
    - Real-world examples & known botnet attacks
    - Nation state ransomware attacks
    - DDoS attacks
    - Cyber espionage
    - ATPs
    - The trouble with attribution
    - What enterprises and governments can do to address the threat

    Panelists:
    - Johna Till Johnson, CEO and Founder of Nemertes Research
    - Derek Manky, Chief, Security Insights & Global Threat Alliances, Fortinet
    - Craig Harber, Chief Customer Success Officer, Fidelis

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • The Nation’s Great Test: Securing COVID-19 Data Recorded: Mar 31 2021 62 mins
    Jennifer Franks, Director of Cybersecurity at the GAO, & former NSA CISO, Chris Kubic
    As the nation attempts one of the largest logistical feats in its history, max vaccination against COVID-19, federal agencies are at the forefront of collecting, managing, and analyzing critical information about this initiative - from personal information to vaccine efficacy.
    Gain key insights from government experts, Jennifer Franks, Director of Cybersecurity at the GAO, and former NSA CISO, Chris Kubic, on how agencies are protecting this sensitive data from cyber attackers in an environment where data is in disparate sources across the country and at various levels of government?
    Join this webinar to learn the proactive approach to data protection and how all organizations can apply these strategies to the current fight to protect sensitive data from cyber adversaries.
  • Humans and Machines - Where's The Gap? Recorded: Mar 15 2021 60 mins
    Helen Beal - DevOps Institute | Zack Wood - Fidelis | Judy Ryan - Lifework System | Don White - Agility Science
    The Enterprise DevOps Skills Report of 2019 found that the top three attributes needed in the DevOps space are automation, process skills - and most importantly, soft skills. While new technology and processes are always evolving and improving the way developers and IT operations teams work, one thing is for certain - it is the people that ensure success.

    In episode 12 of Day-to-Day DevOps, we’re exploring how DevOps teams can bridge the gap between humans and machines to create truly best-in-class collaboration and problem solving, and ensure happiness at work.

    Join us live as we cover:
    - What humans can do that machines can’t in DevOps
    - How to harness your soft skills to achieve success
    - The SKIL framework and what it can bring to your operations
    - And more

    Guests:
    Zack Wood - Sr. Cloud Systems Architect at Fidelis
    Judy Ryan - CEO, Lifework Systems
    Don White - CEO - Agility Science
  • Deception Technology 101: Implementer's Guide to Deception Recorded: Mar 3 2021 51 mins
    Kyle Dickinson, SANS Analyst
    Everything you wanted to know about Deception Technology but were afraid to ask. Deception is a proactive cyber defense strategy. Deception provides an additional layer of defense by using decoys and breadcrumbs to lure and detect attackers that have breached your environment.

    In this presentation, you'll learn:
    • What deception technologies are all about
    • How deception technologies can assist with common attack types, including account hijacking, human error, vulnerable applications, and insider threats
    • How organizations can implement and automate deception technologies through a SOAR or SIEM
    • What open source tools are available to assist organizations in their implementation initiatives
  • Succeeding as a CISO in 2021 Recorded: Feb 17 2021 62 mins
    Diana Kelley, SecurityCurve | Patricia Titus, Markel Corp | Jonathan Nguyen-Duy, Fortinet | Gerald Mancini, Fidelis
    This month's episode of The (Security) Balancing Act will look at how the CISO role has evolved in the last few years, what today's expectations are and what it takes to succeed as a CISO.

    Some of the topics to be covered during this roundtable discussion with security and tech leaders include:
    - How has the CISO role evolved over the last few years and what is expected of CISOs in 2021?
    - CISO vs BISO
    - How to see ROI on your cybersecurity investment?
    - How to get the business to understand risk and care about security?
    - How to keep cyber employees happy. The churn is exhausting and costly for companies, and it’s exacerbated by employee burnout and a “grass is greener” approach.

    Panelists
    - Patricia Titus, Chief Privacy and Information Security Officer, Markel Corporation
    - Jonathan Nguyen-Duy, Vice President, Global Field CISO Team at Fortinet
    - Gerald Mancini, Chief Operating Officer of Fidelis Security

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • Grow Your Cyber Defense Skills: The Elements of Advanced Threat Defense Recorded: Feb 10 2021 26 mins
    COO, Jerry Mancini
    Today’s sophisticated attack campaigns use a combination of automated techniques, along with human-led tactics to perpetuate targeted attacks against an organization. To combat these adversaries, we must arm cybersecurity professionals with the knowledge necessary to detect, hunt and remediate advanced persistent threats.
    In this presentation, COO Jerry Mancini, will explain each element of a cyber threat defense plan and how you execute a defense plan to hunt for advanced threats. Improve your cyber defense skills by learning which cyber defense techniques you can implement at your organization!
  • How to Defend Yourself Against the Full Spectrum of Cyber Threats Recorded: Feb 3 2021 21 mins
    Chris Kubic, CISO
    Witnessing the scale and sophistication of recent attacks disrupting our security world, what can CISOs and security operations teams do to level the playing field and defend their enterprise environments against threats originating from cybercriminals, sophisticated and stealthy nation-state attackers, insiders, 3rd party partners, and supply chains - the full spectrum of threats.

    In his presentation, Chris will explain:
    - Tips for patching business critical and exposed systems
    - Breakdown the known and unknown exploits that threat actors deploy
    - Offer strategies for defending an expanding attack surface
  • Managed Detection and Response Is It For You? Recorded: Jan 13 2021 48 mins
    Anubhav Arora, CTO & Tim Roddy, VP, Marketing and Products
    As attackers continue to make their way past existing security defenses and SOC teams are constantly challenged to outpace well-organized threat actors, augmenting threat hunting along with detection and response functions is becoming a need. Additionally, SOC teams are already widely difficult to staff, from both cost and qualification barriers. Because of these factors, interest in MDR (Managed Detection and Response) has surged, and SOC teams may find themselves wondering if their organizations should consider supplementing their security posture with MDR.

    Join Fidelis Cybersecurity’s CTO, Anubhav Arora, and VP, Marketing and Products, Tim Roddy, as they guide attendees to an understanding of how these various security technologies come together to provide coverage against advanced threats. During the discussion, which will be moderated by SecureWorld’s Director of Media and Content, Bruce Sussman, Anubhav and Tim will discuss various aspects of MDR considerations.
  • Live Demo: Proactive Capabilities of Fidelis Elevate XDR Recorded: Dec 16 2020 27 mins
    Ken Donze, Senior Security Engineer
    You can’t protect your data without understanding your cyber terrain. Attackers conduct recon on environments to understand breaks in the attack surface. In order to effectively defend the enterprise, security teams must have holistic, correlative insight into the environment.

    With this visibility of the cyber terrain and understanding of attacker movements and methods, organizations can anticipate threats and shift their security posture to a more proactive strategy and shorten time to detect and uncover threats.

    Join Ken Donze, Senior Security Engineer for a demo of Fidelis Elevate and find out how to:

    *Why knowing Terrain matters
    *Assess and Identify High-Risk assets within your terrain
    *Leveraging Deception Technologies to continuously alter that terrain
  • Live Demo: Retrospective Capabilities of Fidelis Elevate XDR Recorded: Dec 9 2020 22 mins
    Sal Sanshez, Security Engineer
    Continuously Collect and (Re)assess Metadata from Past Incidents to Help Prevent Future Breaches

    In order to find attackers who are working hard to stay out of sight, you need to collect the right data to find them. Fidelis Elevate captures and breaks down sessions into rich metadata at the content and context level. The richer the metadata you have indexed, the richer the set of questions you can query and search as part of your threat hunting efforts, and the faster you can interact with high speed iteration.

    Join Sal Sanshez, Security Engineer for a demo of Fidelis Network and find out how to:

    *Understand the value of Metadata
    *Leverage Metadata to uncover how a breach occurred
    *Threat hunting in Metadata
by Threat Hunters for Threat Hunters
Security tactics for elite security professionals. We help security teams actively defend their organizations with best practices and expert knowledge on threat hunting, threat intelligence and detection & response.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Beyond Prevention: Boosting Detection to Stop Active Attacks
  • Live at: May 19 2021 4:00 pm
  • Presented by: Maxine Holt, Sr. Research Director, Cybersecurity, Omdia & David Ries, Sr. Product Manager – Endpoint, Fidelis Cybersecurity
  • From:
Your email has been sent.
or close