Browse communities
Browse communities
Presenting a webinar?

Pre-Empt 2012 Key Online Threats With 360° Security Monitoring

Lee Lawson, Solutions Architect, Dell SecureWorks
Getting real-time visibility on the latest security threats is paramount for organisations to avoid costly blows and brand reputational damage. Tune into this webcast as Dell SecureWorks discuss the following key topics:

· The evolution of security monitoring and where we are today
· How to effectively detect and react instantly to emerging security threats
· Examples gleaned from the coalface where effective monitoring may have made a significant difference
Dec 7 2011
33 mins
Pre-Empt 2012 Key Online Threats With 360° Security Monitoring
Join us for this summit:
More from this community:

IT Security

  • Live and recorded (5381)
  • Upcoming (116)
  • Date
  • Rating
  • Views
  • In this webcast we will look at how to effectively manage Macs in the enterprise as well as mobile devices leveraging your existing IT infrastructure.

    The growth of Mac in the enterprise is undeniable. Apple’s success with the iPhone and iPad is bleeding over into end user preference for laptops. Where Macs used to account for only low single digit percentages of devices deployed and were therefore largely ignored, they are now growing across all verticals and industries and represent a significant challenge for IT.
  • Unfortunately, there is a high likelihood that organizations will suffer a breach by advanced malware. Learn how to minimize response time through real-time forensics to understand the scope of compromise including:

    - Identifying attacked endpoints
    - Finding indicators of compromise
    - Analyzing malicious activity
    - Tracing outbound communication, and more
  • Unfortunately, there is a high likelihood that organizations will suffer a breach by advanced malware. Learn how to minimize response time through real-time forensics to understand the scope of compromise including:

    - Identifying attacked endpoints
    - Finding indicators of compromise
    - Analyzing malicious activity
    - Tracing outbound communication, and more
  • Practice Makes Perfect When Defending Against DDoS Attacks

    DDoS attacks have been on the rise, especially hard-to-detect Layer 7 attacks that take down websites via resource exhaustion. Take the guesswork out of defending against these attacks by validating your DDoS defense effectiveness using realistic scenarios of real-world users and attacker behavior at scale.

    In this webinar, we will analyze and discuss the techniques and technology necessary to validate defenses against DDoS attacks:
    • Take a deep dive into multi-vector DoS attack strategies
    • Learn how to attack yourself in a controlled, safe environment
    • Create a DDoS Range to test your network defenses, personnel, and incident playbook

    Register now to reserve your spot.
  • Did you know the average breach goes undetected for 229 days? The earlier you can detect and respond to a breach, the faster you lower the risk and potential damage. Traditionally, companies have implemented a number of point solutions to for each new threat, an expensive and cumbersome approach. However, by combining threat protection from Fortinet with threat detection and response from AlienVault, companies now have an affordable way to significantly reduce the cost and complexity of complete threat management.

    Join threat experts from AlienVault and Fortinet for this webcast to learn how this integrated solution will provide:

    · Continuous threat prevention, detection and remediation in an easy-to-use solution

    · The ability to identify all critical assets and the potential attack surfaces in your network

    · Advanced analysis of FortiGate logs for threat identification and response through AlienVault USM

    · Simplified protection of your network with ONLY two products, at a price you can afford

    · Continual improvement of your security posture through frequent assessment.

    · Integrated threat intelligence that maximizes the efficiency of your security monitoring program
  • As organisations accept that they are more than likely to be breached, strengthening business resilience and response capabilities is becoming just as important as developing defensive strategies. As a result, organisations are crafting risk-based approaches to balance their priorities in order to protect, detect, respond and recover.

    Drawing on the findings of the Infosecurity Europe Industry Survey, this panel of industry experts will discuss the challenges for information security practitioners and how to prioritise and balance risk. The speakers will share insight into how to develop an information security strategy that protects the organisation’s information assets, whilst ensuring it is resilient and capable of responding robustly to incidents.
  • Companies rely heavily on networked technology today to operate their businesses. Highly distributed organizations like restaurant chains, retail stores, financial services or supply chain companies have an extra layer of difficulty. Rarely does each of the remote locations have IT expertise on site. As an IT manager, you are demanded by your executive management to keep the network available 100% of the time, avoid security breaches, support all the new strategic marketing initiatives and to do all of this with less money than you had in your budget last year! This session will review the top 5 challenges an IT manager in this situation needs to consider and suggest solutions:

    1) Executive mandate to "Do more with less"
    - Free-up your time to do what you do best
    - Vendor consolidation
    - Outsource, focus Internal resources on strategic tasks

    2) Lack of IT Expertise at remote sites
    - Consistency of deployment, Office in a box
    - How to make sure all locations have the same technology
    - Preplanned for growth and new services

    3) Sometimes lack of ownership of remote sites (Franchises)

    4) Security compliance/PCI DSS

    5) High availability
    - Network is down, business has stopped (can't take payments)
  • Join us to hear Africa Director Hendrik Malan and guest speaker Grant Theis, CEO of ttrumpet, as they discuss the emergence of Over-the-Top (OTT) providers and the potential opportunities for growth in the enterprise market.
  • Wie Sie in drei Schritten ein klares IT-Configuration Management aufsetzen

    Als Verantwortlicher für IT-Security sind Sie konstant mit möglichen Angriffszenarien und deren Abwehr beschäftigt. Ein Großteil der Angriffe sind nur deshalb erfolgreich, weil Komponenten in Ihrem Netzwerk unzureichend konfiguriert sind.
    Die Herausforderung ist, genau diese Maschinen zu identifizieren und sicher zu stellen, dass sie korrekt konfiguriert werden und dies auch bleiben.
    Lernen Sie in unserm Webcast wie Qualys Policy Compliance Ihr IT-Configuration-Management verbessern kann und damit Ihre Basis-Security stärkt und das Ganze voll automatisiert.
    Erfahren Sie:
    • Etablieren und Umsetzung von Security Configurations
    • Automatisierung und Durchführung von regelmäßigen Configuration Assessments
    • Priorisierung und Umsetzung von Remedation Workflows
  • Vous souhaitez en finir avec l’information dispersée à travers des centaines de répertoires partagés, espaces personnels, et disques durs locaux ?

    Vous êtes à la recherche d’une plateforme collaborative tout-en-un ?

    Vous êtes certainement déjà familier avec Microsoft SharePoint, mais êtes-vous sur de connaître l’étendue de son périmètre fonctionnel ?

    Car si SharePoint reste une excellente plate-forme intranet, de portail web, de collaboration et de partage documentaire, SharePoint va bien au-delà de ces fonctions avec le réseau social (RSE), les outils de développement, et la gestion documentaire (de type GED).

    Participez à notre webinar pour mieux comprendre la richesse de la plateforme et ses bénéfices : une collaboration unifiée et des gains de productivité à chaque niveau de l’entreprise (utilisateurs métiers, DSI, direction).

    Nous aborderons également les modèles de déploiement de SharePoint (100 % cloud, hybride ou on-premises) ainsi que les limites et bénéfices de chaque configuration.

    Dans un second temps, nous nous pencherons sur les questions de déploiement de SharePoint et nous découvrirons comment AvePoint, avec sa solution de migration pour SharePoint 2013 & Office 365, vous permet d’accélérer la mise en place de votre plateforme.

    Nous ferons un tour d’horizon des problèmes les plus communément rencontrés pendant les projets de migration, et nous verrons en 3 points comment AvePoint vous permet notamment de les adresser :

    • Optimisation des ressources dédiées à la migration en automatisant la suppression du contenu obsolète

    • Réduction de la perturbation des activités pendant le processus de migration grâce à une planification personnalisée.

    • Maintien de l’ensemble du contenu, des permissions et des métadonnées jugés pertinents par vos équipes.
  • Channel
  • Channel profile
  • Benefits of Implementing ISO 27001 to your Organisation Recorded: Dec 17 2014 48 mins
    Hadi Hosn, Managing Principal Consultant
    Information is a business critical asset, forming the backbone of organisation globally, and driving growth. However, the security of information is often overlooked, which is why most security breaches actually come from within the organisation – a result of poor policy, procedures, staff training and their awareness of security risks.

    In response, organisations are now exploring the benefits of certifying to ISO27001 – the industry standard for information security.

    In this latest webcast, Hadi Hosn, Managing Principal consultant at Dell Secureworks, will discuss how certifying to ISO27001 provides a framework for implementing security controls and resolving security issues and can offer the business a competitive advantage and business enablement.

    This webcast will cover the following key topics:

    •Benefits of ISO27001 – Information Security Management System (ISMS)

    •Defining the ISMS scope

    •ISMS implementation and certification process overview
  • The Evolving Security Threat Landscape: Trends, Outlook and Next Steps Recorded: Oct 21 2014 55 mins
    Don Smith, Technology Director
    The webcast will take you on a journey through the threat landscape, taking in sights such as the latest activity on trojans and viruses, how the ‘bad guys’ are stealing intellectual property through the use of malware and the future of cyber warfare.

    During this webcast, Technology Director, Don Smith, will present intelligence gleaned from the Dell SecureWorks Counter Threat Unit (CTU). He will discuss the rise of advanced persistent threats, and how the security threat landscape is evolving and what you can do to keep pace.

    What are the motives of the threat actors, and what could make your organisation a target? Don will provide pragmatic advice on what you can do to protect your critical information assets and reduce the risk.

    Key webcast topics include:

    •Evolution and revolution in the cyber landscape

    •War stories and examples from the coalface - An analysis of threat intelligence we have gathered

    •Inferences, conclusions, and the road ahead: what are the qualitative outcomes of our findings and how can these help inform your security strategy


    Dell SecureWorks processes more than 70 billion security events across thousands of networks around the globe on a daily basis, leveraging the Counter Threat Unit (CTU) research team who perform in-depth analysis of emerging threats and vulnerabilities.

    This global visibility and unmatched expertise enables early warnings and actionable security intelligence to customers to protect against threats and vulnerabilities before they impact their organisation.
  • Five Steps to Improve Security Strategy - A Pragmatic Approach Recorded: Oct 7 2014 45 mins
    Hadi Hosn, Managing Principal Consultant, Dell SecureWorks Security & Risk Consulting
    As part of our recent series of webcasts on the role of the CISO we have examined how the role has evolved, the key focus areas of the role, how best to use external partners and how to build a culture of security.

    In this latest webcast, Hadi Hosn, Managing Principal Consultant at Dell SecureWorks, will discuss the five key areas we believe a CISO should focus today to help shape and drive a security programme. Hadi will focus on the most important areas that are applicable in all market sectors and centre in on those activities that, in our experience, deliver the most value, security improvement and return on investment.

    Key topics covered include:

    •Understanding your organisation’s extended enterprise

    •How to improve visibility into what’s going on in your environment

    •Building a culture of security in your organisation
  • Addressing the weakest link: The importance of user education Recorded: Aug 5 2014 47 mins
    Chris Yule, Senior Security Consultant
    In this webcast we look at one of the most crucial elements of security leadership: building security awareness throughout an organisation. End users will often be the weakest link in the security stack; building an understanding amongst your users of why security is important and what their responsibilities are is a crucial component of protecting your organisation’s information and ensuring you stay out of the headlines.

    Chris Yule, Senior Security Consultant at Dell SecureWorks, will discuss the need to educate employees on proper safeguards in today's climate of social engineering malware scams and targeted attacks.

    Key webcast topics covered:

    •How to approach an awareness campaign, target training at those who need it most and measure effectiveness.

    •The different of domains of training which are appropriate and necessary for different user groups.

    •How to target education at all levels of the organisation, from informing end users about password security and phishing risks, to educating board members on the threats and risks faced by the business and the typical approach taken by your industry peers.
  • How Well Prepared Are You For The Next Security Threat? Recorded: Jun 18 2014 49 mins
    Florian Malecki, Product Marketing & Solution Director for EMEA at Dell Software
    Each and every day you face the risk of your network being hacked by the newest zero-day threat. Not long ago, it was the HeartBleed bug and then the IE vulnerability. And, while you’re still working to defend your infrastructure from these two critical threats, the cybercriminal community is working just as hard trying to exploit the weaknesses of your network. So how well are you prepared for the next attack?

    Florian Malecki, Product Marketing & Solution Director for EMEA at Dell Software discusses the threat landscape and suggests ways that you can take advantage and achieve ongoing protection.
  • The modern CISO: Standing out from the crowd Recorded: Jun 17 2014 54 mins
    Hadi Hosn, Security and Risk Consulting Managing Principal
    The role of the Chief Information Security Officer (CISO) has grown in complexity and magnitude with hacker based activity, cloud computing, and work-from-anywhere initiative only adding to the dilemma. New privacy regulations, social media and BYOD have added further challenges and put additional strains on compliance…

    Information security is becoming more and more vital to organisations in this ever changing landscape, with the role of the CISO now more important than ever. The education and preparation of the cyber security leaders of today must keep pace with this change.

    During the webcast, Hadi Hosn, Senior Solutions Architect at Dell SecureWorks, will provide expertise and practical advice as well as real world examples from those that have lived and breathed the role of the CISO.

    Key topics discussed:

    •Succeed as an effective CISO/Director of Security/Head of Information Security

    •Improve and validate your skills

    •Be recognised as an industry leader and stand out from the crowd
  • The value of a security partnership: Engaging at the right level Recorded: May 8 2014 46 mins
    Chris Yule, Senior Security Consultant
    The remit of information security has grown to encompass all aspects of an organisation. It is no longer just a question of IT security. CISOs now need to understand the risks faced by their organisation, where security fits into every business process, and bridge the gap between technical and business stakeholders.

    As the remit has broadened, the need for insightful assistance has deepened, from help defining organisation-wide security strategy and metrics down to monitoring of individual log events, with policy, compliance, architecture, intelligence, incident response and end user security training in between.

    Chris Yule, Senior Security Consultant at Dell SecureWorks, will discuss how a security partner that can deliver at all levels of the security stack allows for a greater understanding of your organisation, which ultimately delivers better intelligence-led security.

    Key topic outlined:

    •Evolving from a traditional MSS-focused client/vendor approach to a security partnership
    •Examples of successful operating and engagement models
    •Delivering value and results to your organisation
  • POSitive Thinking: Detecting and Preventing Point of Sale (POS) Malware Attacks Recorded: Apr 3 2014 52 mins
    Rafe Pilling, Counter Threat Unit Researcher
    Malware targeting Point of Sale (POS) terminals has been exploited by eCrime operators for a number of years but has recently been catapulted to the forefront of industry attention with a number of high-profile breaches. Properly executed, a malware attack on POS terminals can reap huge volumes of credit card numbers in a short space of time without resorting to low-rate of return strategies involving large phishing campaigns. Due to its low risk/ high reward nature, this type of attack is only likely to become more popular with eCrime operators.

    In the session Rafe Pilling, Counter Threat Unit Special Operations, will look at the nature of the POS malware threat and how it can be defeated through proper application of threat intelligence.

    What will attendees learn:

    * A potted history of POS malware

    * What does the POS malware threat landscape look like?

    * Effective use of threat intelligence to detect and prevent POS malware attacks.
  • Building an Effective Security Operation Centre Recorded: Mar 13 2014 48 mins
    Sandip Wadje, Practice Leader SOC Consulting at Dell SecureWorks
    Security Operation Centres (SOCs) act as the nerve centre of an organisation providing real-time alerts, security intelligence and reports to act against internal and external threats. SOCs often use multiple event monitoring tools, ticketing systems and workflow solutions and as a result, building an effective SOC still remains a challenge for most organisations.

    How do organisations choose a security monitoring solution that gives optimal asset coverage and at the same time address the evolving threat landscape and compliance requirements? How can organisations demonstrate the value of SOC investment to board level stakeholders? How do organisations choose the correct operating model (outsource, in-source, and hybrid) to run and maintain a SOC?

    Sandip Wadje, Practice Leader for SOC Consulting at Dell SecureWorks, will help answer these questions and provide pragmatic next steps to rolling out an effective SOC.

    Key Webcast Topics and Takeaways:

    •The blueprint for an effective SOC
    •SOC tools and integration
    •Metrics and reporting
    •Choosing the right operating model
  • Securing the Extended Enterprise Recorded: Jan 24 2014 44 mins
    Chris Yule, Senior Security Consultant
    Join the latest Dell SecureWorks webcast to learn more on how to effectively secure the extended enterprise.

    The modern enterprise is operating in a hybrid world with data residing inside and outside the organisation; blurring boundaries of responsibility and challenging traditional security strategies. Whilst the complexity of the IT environment is increasing, so is the hostility of the cyber threat landscape.

    How do organisations remain agile and embrace innovation whilst dealing with increasingly sophisticated threats that are looking to exploit any weak points in the extended enterprise?

    This webcast will cover:

    •The latest intelligence from cyber threat researchers in the Counter Threat Unit

    •Security strategy considerations for the move to cloud computing

    •Practical steps for retaining control and reducing risk across the extended enterprise
  • Disrupting Malware Assisted Online Fraud Recorded: Nov 7 2013 47 mins
    Rafe Pilling, Senior Consultant
    E-banking trojans are a core component of a sophisticated and distributed criminal enterprise that routinely and efficiently targets online banking clients. Dell SecureWorks are an industry leader in e-Banking malware research and work with our clients on a daily basis to help them address this threat. In this workshop we will explore:

    •The threats posed by e-Banking malware; both to financial services organisations and their customers

    •The e-Crime “Cloud Services” model

    •Some of the advanced mechanisms employed to perpetuate online fraud

    •Effective mitigation strategies and countermeasures that work in the real world
  • EU Data Protection and Partnering with MSSPs: Debunking the Myths Recorded: Oct 23 2013 49 mins
    Peter Heim, Dell SecureWorks and Antonis Patrikios, Field Fisher Waterhouse
    Managed Security Service Providers (MSSPs) provide enhanced security measures, expertise and awareness and enable organisations to make efficient use of their resources. However, organisations often feel they are stuck between a rock and a hard place when it comes to the EU Data Protection law and partnering with a MSSP.

    This webcast, delivered by experts from Dell SecureWorks and legal firm Field Fisher Waterhouse LLP will help clarify some of the common ‘myths’ regarding the intent of the law and how this affects working with a MSSP.

    Key webcast topics include:

    •Using third parties to process personal data

    •Transferring data outside the EU

    •Using cloud-based services

    •Local law enforcement access to data (e.g. by US authorities under the Patriot Act)
  • PCI 3.0: Go Forth and Comply Recorded: Oct 9 2013 30 mins
    Ron Kiss, Senior Security Consultant, Dell SecureWorks
    The new Payment Card Industry Data Security Standards (PCI DSS) guidelines encourage organisations to focus on security rather than compliance in order to mitigate some of the most frequently seen risks that have precipitated cardholder-data compromise.

    Our latest webcast, delivered by Dell SecureWorks PCI expert, Ron Kiss, focuses on the proposed changes to the standard and how it could affect your organisation when they come into play on 1st January 2014.

    Key webcast topics include:

    •Version 2.0 to 3.0 – what are the changes?

    •A security approach to compliance rather than compliance approach to security

    •Pragmatic advice on what the next steps should be for your organisation
  • Building a Successful PCI Programme in a Complex Cloud Environment Recorded: Aug 29 2013 23 mins
    Ron Kiss, Senior Security Consultant, Dell SecureWorks
    The use of Cloud Computing technology has seen a recent spike in popularity with spend estimated at 25% of all annual IT expenditure growth in 2012 and nearly a third of growth in 2013. With the efficiencies it provides, businesses are clambering to find ways of leveraging its advantage for all types of online business functions, including processing card payments. However, unambiguous information on the Payment Cards Industry (PCI) compliance implications of this new technology are unclear for organisations moving to the cloud.

    This has resulted in much confusion of what compliance means for business and assessors alike. In February this year, the PCI SSC published the Cloud Computing Information Supplement with provides a greater level of clarity for businesses and assessors alike.

    Ron Kiss, Senior Consultant At Dell SecureWorks, will discuss how to incorporate what has been learned from the Information Supplement into a successful PCI program for your organisation’s and its complex cloud environment.

    Key webcast topic include:

    •The rise and rise of cloud and common challenges facing organisations

    •Clarifying the Cloud Computing Information Supplement and how it affects you

    •Building a successful PCI programme tailored for your cloud environment

    Ron Kiss

    Ron Kiss is a Principal Consultant within the Security, Risk and Compliance team at Dell SecureWorks. In his current and past roles, Ron has conducted both PCI-DSS and PA-DSS assessments in Europe and overseas. He brings a wealth of experience in assessing Merchants, Service Providers and Payment Applications from a range of industries such as Retail, Airlines, and Finance. 
  • Complex Security Incident Investigation: Lessons Learned Recorded: Jul 3 2013 45 mins
    Rafe Pilling, Senior Security Researcher
    Join this webcast for insight into recent security breach investigations from the Dell SecureWorks Counter Threat Unit (CTU).

    Dell SecureWorks responds to thousands of incidents on a daily basis with the CTU investigating the most serious of these. Join this session for pragmatic advice based on real-world examples, to help ensure your organisation is better prepared for a security breach.

    This webcast will cover:

    •Critical mistakes Dell SecureWorks has encountered in real-world cases
    •Maximising the value of current controls at no extra cost
    •How to avoid potentially disastrous security lapses

    Rafe Pilling, Counter Threat Unit EMEA

    Rafe Pilling is a security expert working for the EMEA Counter Threat Unit. Rafe has significant experience in incident response and digital forensics from his background as a Senior Consultant within the Dell SecureWorks Consulting firm.

    The Dell SecureWorks Counter Threat Unit research team monitor the cyber underground and watch for emerging threats. Monitoring and analysing over 50 billion events a day, their unparalleled visibility into the global threat landscape helps protect thousands of organisations worldwide.
  • The cloud: Shaking up your security Recorded: Apr 25 2013 44 mins
    Mark Wood, Director of Product Management
    More and more organisations are turning to cloud computing to solve their biggest technology and business challenges. By this stage, most of us are aware of the many benefits cloud has to offer: lower hardware and IT costs, ease of management and increased agility, to name a few. Yet when it comes to security, cloud is not a silver bullet. In fact, according to the Cloud Security Alliance, security is cited as the number one barrier to adoption of cloud services among organisations.

    During this webcast, Mark Wood, Director of Product Management at Dell SecureWorks, will discuss some of the prevalent security risks which exist when moving to the cloud and how this affects the traditional approach to security.

    This webcast will address the following key themes:

    •The security impact of different cloud models and minimising risk in a multi-tenant environment
    •Sharing the security burden and establishing an effective relationship with your cloud provider.
    •Staying one step ahead of the evolving compliance landscape.

    Mark is responsible for managed security for cloud services at Dell SecureWorks. He has more than 25 years of experience in the technology community as a software engineer, a sales engineer, a start-up owner and a product manager.

    Previously, at Cloud Sherpas, a solutions provider focused on migrating organizations to Google Apps, Mark was responsible for product strategy, lifecycle management and optimizing existing products. He has also worked in marketing and product management at a number of leading technology companies, including nCircle, Internet Security Systems (ISS) and AT&T Bell Laboratories.

    Mark holds a Bachelor of Science degree in computer science from Duke University and a Master of Science degree in computer science from Georgia Institute of Technology.
  • Advanced incident response: Are you prepared Recorded: Apr 9 2013 45 mins
    Rafe Pilling, Senior Security Researcher
    How prepared are you for a data breach? With the threat environment growing more complex, and the rise in advanced and targeted attacks, how does your response plan hold up? Threat actors have have changed their tactics; so must you.

    This webcast will examine how to develop a robust incident response plan, which takes into account the changes in the threat landscape. Lee Lawson, Solution Architect at Dell SecureWorks, will discuss new approaches to identify advanced threats earlier, and how to go beyond responding to the most obvious symptoms of an attack, to understanding the full extent of the breach and what has been compromised.

    This webcast will address the following key themes:

    •Security breaches Dell SecureWorks has seen across its global customer base, from advanced and targeted threats
    •Developing an incident response plan which takes into account the complex threat landscape
    •Getting the necessary visibility into your network to enable you to spot advanced threats early and understand the true scale of the attack.
  • Advanced persistent threats: The threat is real Recorded: Mar 21 2013 43 mins
    Rafe Pilling, Counter Threat Unit EMEA
    Advanced Persistent Threats are more than media hype. Dell SecureWorks has seen a significant increase in stealthy activity targeting specific intellectual assets.

    Rafe Pilling, Counter Threat Unit EMEA, will provide the latest intelligence on Advanced Persistent Threats, using real-world examples; and provide pragmatic advice on what you should be doing now to protect your organisation.

    Security strategies and tactics must evolve in light of the growth in APT attacks; how do you find and stop advanced threats before they become serious breaches?

    This webcast will address the following key themes:

    •The latest tools and techniques that advanced threat actors are using
    •Real-world examples of successful APT attacks
    •Best practice for preventing and responding to APTs

    Rafe Pilling is a leading information security expert who works as a Researcher in the Dell SecureWorks Counter Threat Unit (CTU). Leveraging Dell SecureWorks' global threat visibility across thousands of customer networks, proprietary toolsets and unmatched expertise, the Dell SecureWorks CTU security research team performs in-depth analysis of emerging threats, including Advanced Persistent Threats.
  • Risk assessment and threat identification: Guidance on PCI requirement 6.2 Recorded: Mar 6 2013 25 mins
    Ron Kiss, Principal Consultant
    Merchants are now required to have a process in place to identify and risk rank newly-discovered vulnerabilities in order to be PCI compliant. The intent is to ensure that businesses proactively seek information on new vulnerabilities that might affect their systems, and not simply wait for vendor updates and patch announcements that could come weeks, months or even years after vulnerabilities are discovered.

    During this webcast, Ron Kiss, Principal Consultant at Dell SecureWorks, will address the following key themes:

    •Integrating requirements introduced this year on ranking identified vulnerabilities that can compromise your cardholder data
    •Risk ranking frameworks and what processes to put in place for categorising threats and working within your risk assessment process
    •Using threat intelligence to increase protection of the business and provide real value

    Ron Kiss is a Principal Consultant within the Security, Risk and Compliance team at Dell SecureWorks. In his current and past roles, Ron has conducted both PCI-DSS and PA-DSS assessments in Europe and overseas. He brings a wealth of experience in assessing Merchants, Service Providers and Payment Applications from a range of industries such as Retail, Airlines, and Finance. 
  • You’re the one that they want: Targeted threats and you Recorded: Feb 28 2013 37 mins
    Lee Lawson, Solutions Architect
    The rise in targeted threats means that IT security teams must move beyond a general understanding of the threat landscape, to a detailed understanding of their own context and the ability to spot threats targeted at their specific organisation.

    What different techniques should you use as a threat evolves from malicious talk in public forums and social media sites, through to more formulated threats, planning stages, and attack stages? In a world of information-overload and an explosion in communication channels, how do you sift through the noise and identify true threats to your business?

    During this webcast, Lee Lawson, Solutions Architect at Dell SecureWorks, will address the following key themes:

    •The challenges faced by organisations from the rise in targeted threats
    •Limitations of security processes in protecting from targeted threats
    •How to gain early visibility into the threats targeting your particular organisation

    Lee Lawson is the Solutions Architect for Security and Risk Consulting Services at Dell SecureWorks EMEA. In this role he is in charge of envisioning and creating combinations of new and existing services to solve the most unique and difficult customer problems. His past experience was as a Principal Consultant managing the EMEA Security Testing and Response team responsible for all adversarial-testing services such as penetration testing, social engineering and physical intrusions, and all responsive services such as digital forensics and security incident response/handling. This background has provided him with a deep knowledge of the subject having led complex and challenging projects for customers in all industries.
Webcasts from the Dell SecureWorks Team
Dell SecureWorks is relentlessly driven to protect the integrity of the world's digital assets against cyberthreats. We do that with intelligent defences that combine our proprietary technology, global threat visibility and deep expertise. We are 100% focused on information security – it's all we do. That's why we are trusted by thousands of customers. Dell SecureWorks offers a full suite of Managed Security, Threat Intelligence and Security and Risk Consulting services.

Dell SecureWorks is positioned in the Leaders Quadrant of Gartner's Magic Quadrant for MSSPs and has been recognised by SC Magazine’s readers with the “Best Managed Security Service” award for 2006, 2007, 2008, 2009, 2011 (U.S. and Europe) and 2012. Additionally, our experts frequently provide authoritative information security commentary in major media outlets including the New York Times, The Wall Street Journal, The Financial Times, USA Today, The Guardian and many others.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Pre-Empt 2012 Key Online Threats With 360° Security Monitoring
  • Live at: Dec 7 2011 1:00 pm
  • Presented by: Lee Lawson, Solutions Architect, Dell SecureWorks
  • From:
Your email has been sent.
or close
You must be logged in to email this