Hi [[ session.user.profile.firstName ]]

Analyze Threats and Detect Incidents Fast With Elite Security Intelligence

Learn how to:
- Expedite threat research and improve reporting with unprecedented security intelligence
- Detect and validate incidents with context
- Hunt for threats in your environment
- Monitor and investigate the dark web for risks to your organization
-Access all known information in a single, real-time view and via customized alerts
- Protect your business with continuous fraud detection and brand monitoring
Recorded Feb 17 2021 42 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Peter Watson
Presentation preview: Analyze Threats and Detect Incidents Fast With Elite Security Intelligence

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The Hunt for RedEcho: The Discovery of a New Campaign Targeting Critical Infrast Recorded: Mar 8 2021 42 mins
    Charity Wright, David SooHoo
    Recorded Future's Insikt Group recently published a report using network traffic analysis to uncover RedEcho, a China-linked group targeting the power sector in India. Learn how we track threat activity groups and applied the same techniques to track RedEcho.

    Topics will include:
    -Events leading up to the discovery of RedEcho
    -Using network traffic analysis for technical identification and analysis
    -Determining clear patterns of cyber activity relating to China-linked groups
  • 고급 검색 기능(Advanced Query)을 활용한 다크웹 검색 Recorded: Mar 3 2021 44 mins
    Jety Yoon
    등록을 통해 아래의 내용을 확인하실 수 있습니다.
    · Advanced Query 소개 및 특징
    · 다크웹 검색 – 유출 계정
    · 다크웹 검색 – 해킹 도구
    · 다크웹 검색 – 내부 문서/자료
  • 레코디드퓨처 웹 포털 살펴보기 Recorded: Feb 25 2021 40 mins
    Jety Yoon
    등록을 통해 아래의 내용을 확인하실 수 있습니다.

    · 웹 포털 - 대시보드

    · 웹 포털 - 위협 뷰

    · 웹 포털 - 설정 메뉴

    · 라이선스 모델별 차이
  • Analyze Threats and Detect Incidents Fast With Elite Security Intelligence Recorded: Feb 17 2021 42 mins
    Peter Watson
    Learn how to:
    - Expedite threat research and improve reporting with unprecedented security intelligence
    - Detect and validate incidents with context
    - Hunt for threats in your environment
    - Monitor and investigate the dark web for risks to your organization
    -Access all known information in a single, real-time view and via customized alerts
    - Protect your business with continuous fraud detection and brand monitoring
  • A Year in Review of The Most Widely Used Malicious Command & Control (C2s) Infra Recorded: Jan 28 2021 42 mins
    Glen Lesnewich
    Malicious command and control families and tools can be tough to keep an eye on. Identifying and monitoring suspicious servers is a tall order. Sometimes "suspicious" hosting providers can turn out to be false positives, and servers that seem innocuous can pose a greater threat than you'd imagine.
    Fortunately, we have some fresh insight to keep you up to speed.
    Join Recorded Future’s world class intelligence experts for an in-depth review of the findings from our recent research report, "Adversary Infrastructure Report 2020: A Defender’s View." This will include an insider look at the novel indicators and intelligence not otherwise available in the public domain.

    Discover from this webinar:
    - Key 2020 findings related to over 10,000 unique command and control servers, across more than 80 families
    -Best practices for proactive detection, ongoing monitoring, and defense-in-depth approaches to adversary infrastructure
    -The 2021 outlook for C2s, and what you can do to stay ahead
  • How to effectively utilizes intelligence on Microsoft Azure Sentinel Recorded: Nov 24 2020 62 mins
    Sharon Ko & Chongming Kong
    As the attack surface grows, security teams are seeing more and more events each day. However, with too little time and not enough context on the activity in their cloud environment, there’s no way to connect the dots between data in Microsoft Azure services and the external risk of any detected threats. This slows responses and potentially enables relevant threats to slip through the cracks.
    An experienced Recorded Future consultant, together with a Microsoft Advanced Security Architect, Global Black Belt will demonstrate how Recorded Future and Microsoft Azure integration:
    Proactively blocks threats in Microsoft Defender Advanced Threat Protection before they impact the business
    Automatically detect risky IOCs in Microsoft Azure Sentinel
    Triage alerts faster with elite, real-time intelligence
    Respond quickly with transparency and context around internal telemetry data
    Maximize your investment in Microsoft Azure
  • Security Intelligence for the Financial Services Industry Recorded: May 6 2020 49 mins
    Kartik Lakhani
    Learn how Recorded Future can help protect your business and clients against threats related to the financial services industry.

    You’ll find out which TTPs are being employed to target victims through common tools such as phishing templates, card leaks, and you’ll leave knowing how to:

    - Use Recorded Future to assess current risks through the CISO dashboard
    - Monitor and track threat actors and malware linkages on a proactive basis
    - Identify phishing templates available for sale on the dark web and special access forums
    - Identify exploit kit developments relevant to technologies already being used in your organization
Security Intelligence: Your Single Source of Truth
Recorded Future delivers meaningful results for our clients. Whether it’s improving efficiency for research and triage, slashing time to threat detection, or improving your organization’s bottom line, we are dedicated to saving our clients time and money — in addition to measurably reducing risk. We believe that intelligence is the key to unlocking the potential of security programs – and protecting our organizations and communities. We believe that security solutions should do just that: be solutions – helping to solve big problems and reduce risk. We know that the right intelligence, in the hands of the right people, at the right time, stops attackers in their tracks.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Analyze Threats and Detect Incidents Fast With Elite Security Intelligence
  • Live at: Feb 17 2021 5:00 am
  • Presented by: Peter Watson
  • From:
Your email has been sent.
or close