Managing Vulnerabilities in Mobile Applications

Rafe Pilling,
Mobile applications can give organisations innovative and compelling ways to interact with their customers, employees and partners. However, mobile apps can increase security and compliance risks by increasing the attack surface for hackers or by inadvertently creating a risk of unauthorised access and data loss.

This webcast will examine the mobile application threat landscape and emerging trends. Rafe Pilling, Head of Security Testing at Dell SecureWorks, will discuss how to build a secure mobile application development lifecycle and present best practice for mobile application security testing.

Mobility is here to stay, so ensure that you are ahead in managing the risks so you can say “yes” to your organisation’s wants .
May 30 2012
45 mins
Managing Vulnerabilities in Mobile Applications
Join us for this summit:
More from this community:

IT Security

  • Live and recorded (5259)
  • Upcoming (136)
  • Date
  • Rating
  • Views
  • A new category of threat is emerging – a threat designed to evade traditional signature-based technologies such as Anti-Virus and Intrusion Detection. Attempting to meet the challenge is a new class of technology, “Advanced Malware Protection” or “AMP,” which is an industry term for technology designed to continuously monitor for, offload and detonate files in a sandbox - safely away from the main environment - to observe and detect malicious objects.

    If a security device produces an alert in the forest, who’s there to hear it?

    The challenge is these next generation advanced malware detection solutions produce so much detail about the suspicious activity that most organizations do not have the resources to thoroughly investigate/analyze. The best technology means nothing if you don’t have the right expertise to react to the alert, quickly decipher complex reports, investigate the threat, and determine the right response. And meanwhile, the threat actors aren’t standing still – they’re developing measures to circumvent controls in some traditional sandbox environments.

    You will learn:
    1.How the threat is evolving and how actors are employing evasive practices to overcome traditional and even some more sophisticated security defenses
    2.Why next generation sandboxing and full-system emulation are the keys to combatting evasive malware threats
    3.The expertise needed to accurately identify and diagnose the threat once the alert is received
    4.How to ensure your organization has the ability to respond effectively to the incident and close all the backdoors a threat actor may have opened
  • 2014 could have easily been called, “The year of the biggest security breaches since the beginning of forever.” But given current security practices and technologies, many of the breaches could have been prevented. So why weren’t they?

    Many of the affected companies fell into a very common trap, thinking that if a company goes to the trouble to be legally compliant then it will be effectively “secure.” Unfortunately, as with many kinds of regulations, legal compliance really represents the absolute least amount of effort required. If companies want to give themselves the best chance to avoid the very severe consequences that come with a major breach, there are five practices they need to put in place now.

    Join Adrian Sanabria, Senior Security Analyst at 451 Research, and Amrit Williams, CTO of CloudPassage, on this webinar to learn
    · Possible gaps left by the compliance-first approach to security
    · How to limit vulnerabilities across traditional, virtual and cloud infrastructures
    · Five best practices to avoid a major security breach in 2015
  • The bring-your-own-device (BYOD) movement has been a huge boon for businesses that put a premium on productivity. File sync and share solutions have emerged to help employees work from anywhere, at any time, on any device. In this BrightTALK exclusive, eFolder explores the top seven features that business should consider when adopting a file sync and share solution. Learn what is required for a file sync and share solution to improve collaboration, maximize productivity, and ensure security.
  • Join Tom Kellermann, Chief Cyber Security Officer for Trend Micro, in an informative webinar specifically tailored for corporate executives and directors who are ready to take the reins of a real and effective plan to secure their organization, their data, and their careers against targeted attacks.

    During this live webinar, you’ll learn:
    • How to identify, classify, and protect your valuable data assets
    • How to assess your organization’s vulnerability to attack
    • How to measure and mitigate cyber risks cost-effectively
  • The Internet of Things (the new buzzword for the tech industry) is increasing the connectedness of people and things on a scale that was once beyond imagination. Connected devices outnumber the world's population by 1.5 to 1.It is expected to eventually touch some 200 billion cars, appliances, machinery and devices globally, handling things like remote operation, monitoring and interaction among Internet-connected products.

    In combination with the fact that there are almost as many cell-phone subscriptions (6.8 billion) as there are people on this earth (seven billion), we have all the ingredients for a Perfect Cyber Storm.

    Join me for an informal discussion of the challenges for our profession, and some possible solutions.
  • Do you feel alone? No resources? No help? If you are like many security practitioners faced with a mountain of tasks each day and a small (or non-existent) team to help, prioritization and efficiency are key. Join Joe Schreiber, Solutions Architect for AlienVault for this practical session outlining habits to get the most out of your limited resources.

    In this session, you'll learn how to develop routines to efficiently manage your environment, avoid time-sucks, and determine what you can do by yourself and where you need help.

    In this practical session, Joe will cover:
    - How to work around the limitations of a small (or one person) team
    - Tips for establishing a daily routine
    - Strategies to effectively prioritize daily tasks
    - Benefits of threat intelligence sharing
    - Critical investigation & response steps when the inevitable incident occurs
  • Do you feel alone? No resources? No help? If you are like many security practitioners faced with a mountain of tasks each day and a small (or non-existent) team to help, prioritization and efficiency are key. Join Joe Schreiber, Solutions Architect for AlienVault for this practical session outlining habits to get the most out of your limited resources.

    In this session, you'll learn how to develop routines to efficiently manage your environment, avoid time-sucks, and determine what you can do by yourself and where you need help.

    In this practical session, Joe will cover:
    - How to work around the limitations of a small (or one person) team
    - Tips for establishing a daily routine
    - Strategies to effectively prioritize daily tasks
    - Benefits of threat intelligence sharing
    - Critical investigation & response steps when the inevitable incident occurs
  • Cutting down on the time taken to complete complex document review cycles allows the modern lawyer to operate at the pace required by their industry.

    Join our webinar to learn top tips for shortening these review cycles without losing document integrity and risking corruption. We’ll also cover what technologies are available to provide a quick and accurate way to improve document review efficiency.
  • FireEye recently released a new report that documents how and why governments around the world are turning to the cyber domain as a cost-effective way to spy on other countries, steal technology, and even wage war.

    Whether it’s sensitive military, diplomatic, or economic information, governments depend on the integrity of their data. If that data falls into the wrong hands, the consequences could be severe.

    In the wake of two apparent state- and government-sponsored attacks, APT1 and APT28, government agencies must understand why they are in attackers’ crosshairs, what attackers might be seeking, and how they can protect themselves.

    Join us for a dynamic discussion with subject matter experts where you will learn:

    •What makes your government-related organization an appealing target – whether you’re a political opponent, business, agency or vendor
    •Why it’s important to determine who could be planning an attack, their motives, and how they might carry out their goals
    •How to assess your level of preparedness and how to protect yourself if you are not ready for this new era of cyber warfare
  • Don’t let your security programme fall behind. In a world where executives are asking more questions about security and high-profile breaches and critical vulnerabilities are reported in prime time, rigid policy frameworks and traditionally slow (but cautious) decision making are no longer sufficient.

    Security departments in organisations of all sizes and across all industries must ensure that business critical assets are protected, compliance and regulatory requirements are met, and rapidly changing business goals are supported.

    In this webinar we will discuss:

    • The current state of the art for security programmes
    • How to work with your organisation to ensure that security becomes a business enabler
    • How to build a supportive security programme within an ever-evolving threat landscape
  • Channel
  • Channel profile
  • Benefits of Implementing ISO 27001 to your Organisation Recorded: Dec 17 2014 48 mins
    Information is a business critical asset, forming the backbone of organisation globally, and driving growth. However, the security of information is often overlooked, which is why most security breaches actually come from within the organisation – a result of poor policy, procedures, staff training and their awareness of security risks.

    In response, organisations are now exploring the benefits of certifying to ISO27001 – the industry standard for information security.

    In this latest webcast, Hadi Hosn, Managing Principal consultant at Dell Secureworks, will discuss how certifying to ISO27001 provides a framework for implementing security controls and resolving security issues and can offer the business a competitive advantage and business enablement.

    This webcast will cover the following key topics:

    •Benefits of ISO27001 – Information Security Management System (ISMS)

    •Defining the ISMS scope

    •ISMS implementation and certification process overview
  • The Evolving Security Threat Landscape: Trends, Outlook and Next Steps Recorded: Oct 21 2014 55 mins
    The webcast will take you on a journey through the threat landscape, taking in sights such as the latest activity on trojans and viruses, how the ‘bad guys’ are stealing intellectual property through the use of malware and the future of cyber warfare.

    During this webcast, Technology Director, Don Smith, will present intelligence gleaned from the Dell SecureWorks Counter Threat Unit (CTU). He will discuss the rise of advanced persistent threats, and how the security threat landscape is evolving and what you can do to keep pace.

    What are the motives of the threat actors, and what could make your organisation a target? Don will provide pragmatic advice on what you can do to protect your critical information assets and reduce the risk.

    Key webcast topics include:

    •Evolution and revolution in the cyber landscape

    •War stories and examples from the coalface - An analysis of threat intelligence we have gathered

    •Inferences, conclusions, and the road ahead: what are the qualitative outcomes of our findings and how can these help inform your security strategy

    Dell SecureWorks processes more than 70 billion security events across thousands of networks around the globe on a daily basis, leveraging the Counter Threat Unit (CTU) research team who perform in-depth analysis of emerging threats and vulnerabilities.

    This global visibility and unmatched expertise enables early warnings and actionable security intelligence to customers to protect against threats and vulnerabilities before they impact their organisation.
  • Five Steps to Improve Security Strategy - A Pragmatic Approach Recorded: Oct 7 2014 45 mins
    As part of our recent series of webcasts on the role of the CISO we have examined how the role has evolved, the key focus areas of the role, how best to use external partners and how to build a culture of security.

    In this latest webcast, Hadi Hosn, Managing Principal Consultant at Dell SecureWorks, will discuss the five key areas we believe a CISO should focus today to help shape and drive a security programme. Hadi will focus on the most important areas that are applicable in all market sectors and centre in on those activities that, in our experience, deliver the most value, security improvement and return on investment.

    Key topics covered include:

    •Understanding your organisation’s extended enterprise

    •How to improve visibility into what’s going on in your environment

    •Building a culture of security in your organisation
  • Addressing the weakest link: The importance of user education Recorded: Aug 5 2014 47 mins
    In this webcast we look at one of the most crucial elements of security leadership: building security awareness throughout an organisation. End users will often be the weakest link in the security stack; building an understanding amongst your users of why security is important and what their responsibilities are is a crucial component of protecting your organisation’s information and ensuring you stay out of the headlines.

    Chris Yule, Senior Security Consultant at Dell SecureWorks, will discuss the need to educate employees on proper safeguards in today's climate of social engineering malware scams and targeted attacks.

    Key webcast topics covered:

    •How to approach an awareness campaign, target training at those who need it most and measure effectiveness.

    •The different of domains of training which are appropriate and necessary for different user groups.

    •How to target education at all levels of the organisation, from informing end users about password security and phishing risks, to educating board members on the threats and risks faced by the business and the typical approach taken by your industry peers.
  • How Well Prepared Are You For The Next Security Threat? Recorded: Jun 18 2014 49 mins
    Each and every day you face the risk of your network being hacked by the newest zero-day threat. Not long ago, it was the HeartBleed bug and then the IE vulnerability. And, while you’re still working to defend your infrastructure from these two critical threats, the cybercriminal community is working just as hard trying to exploit the weaknesses of your network. So how well are you prepared for the next attack?

    Florian Malecki, Product Marketing & Solution Director for EMEA at Dell Software discusses the threat landscape and suggests ways that you can take advantage and achieve ongoing protection.
  • The modern CISO: Standing out from the crowd Recorded: Jun 17 2014 54 mins
    The role of the Chief Information Security Officer (CISO) has grown in complexity and magnitude with hacker based activity, cloud computing, and work-from-anywhere initiative only adding to the dilemma. New privacy regulations, social media and BYOD have added further challenges and put additional strains on compliance…

    Information security is becoming more and more vital to organisations in this ever changing landscape, with the role of the CISO now more important than ever. The education and preparation of the cyber security leaders of today must keep pace with this change.

    During the webcast, Hadi Hosn, Senior Solutions Architect at Dell SecureWorks, will provide expertise and practical advice as well as real world examples from those that have lived and breathed the role of the CISO.

    Key topics discussed:

    •Succeed as an effective CISO/Director of Security/Head of Information Security

    •Improve and validate your skills

    •Be recognised as an industry leader and stand out from the crowd
  • The value of a security partnership: Engaging at the right level Recorded: May 8 2014 46 mins
    The remit of information security has grown to encompass all aspects of an organisation. It is no longer just a question of IT security. CISOs now need to understand the risks faced by their organisation, where security fits into every business process, and bridge the gap between technical and business stakeholders.

    As the remit has broadened, the need for insightful assistance has deepened, from help defining organisation-wide security strategy and metrics down to monitoring of individual log events, with policy, compliance, architecture, intelligence, incident response and end user security training in between.

    Chris Yule, Senior Security Consultant at Dell SecureWorks, will discuss how a security partner that can deliver at all levels of the security stack allows for a greater understanding of your organisation, which ultimately delivers better intelligence-led security.

    Key topic outlined:

    •Evolving from a traditional MSS-focused client/vendor approach to a security partnership
    •Examples of successful operating and engagement models
    •Delivering value and results to your organisation
  • POSitive Thinking: Detecting and Preventing Point of Sale (POS) Malware Attacks Recorded: Apr 3 2014 52 mins
    Malware targeting Point of Sale (POS) terminals has been exploited by eCrime operators for a number of years but has recently been catapulted to the forefront of industry attention with a number of high-profile breaches. Properly executed, a malware attack on POS terminals can reap huge volumes of credit card numbers in a short space of time without resorting to low-rate of return strategies involving large phishing campaigns. Due to its low risk/ high reward nature, this type of attack is only likely to become more popular with eCrime operators.

    In the session Rafe Pilling, Counter Threat Unit Special Operations, will look at the nature of the POS malware threat and how it can be defeated through proper application of threat intelligence.

    What will attendees learn:

    * A potted history of POS malware

    * What does the POS malware threat landscape look like?

    * Effective use of threat intelligence to detect and prevent POS malware attacks.
  • Building an Effective Security Operation Centre Recorded: Mar 13 2014 48 mins
    Security Operation Centres (SOCs) act as the nerve centre of an organisation providing real-time alerts, security intelligence and reports to act against internal and external threats. SOCs often use multiple event monitoring tools, ticketing systems and workflow solutions and as a result, building an effective SOC still remains a challenge for most organisations.

    How do organisations choose a security monitoring solution that gives optimal asset coverage and at the same time address the evolving threat landscape and compliance requirements? How can organisations demonstrate the value of SOC investment to board level stakeholders? How do organisations choose the correct operating model (outsource, in-source, and hybrid) to run and maintain a SOC?

    Sandip Wadje, Practice Leader for SOC Consulting at Dell SecureWorks, will help answer these questions and provide pragmatic next steps to rolling out an effective SOC.

    Key Webcast Topics and Takeaways:

    •The blueprint for an effective SOC
    •SOC tools and integration
    •Metrics and reporting
    •Choosing the right operating model
  • Securing the Extended Enterprise Recorded: Jan 24 2014 44 mins
    Join the latest Dell SecureWorks webcast to learn more on how to effectively secure the extended enterprise.

    The modern enterprise is operating in a hybrid world with data residing inside and outside the organisation; blurring boundaries of responsibility and challenging traditional security strategies. Whilst the complexity of the IT environment is increasing, so is the hostility of the cyber threat landscape.

    How do organisations remain agile and embrace innovation whilst dealing with increasingly sophisticated threats that are looking to exploit any weak points in the extended enterprise?

    This webcast will cover:

    •The latest intelligence from cyber threat researchers in the Counter Threat Unit

    •Security strategy considerations for the move to cloud computing

    •Practical steps for retaining control and reducing risk across the extended enterprise
  • Disrupting Malware Assisted Online Fraud Recorded: Nov 7 2013 47 mins
    E-banking trojans are a core component of a sophisticated and distributed criminal enterprise that routinely and efficiently targets online banking clients. Dell SecureWorks are an industry leader in e-Banking malware research and work with our clients on a daily basis to help them address this threat. In this workshop we will explore:

    •The threats posed by e-Banking malware; both to financial services organisations and their customers

    •The e-Crime “Cloud Services” model

    •Some of the advanced mechanisms employed to perpetuate online fraud

    •Effective mitigation strategies and countermeasures that work in the real world
  • EU Data Protection and Partnering with MSSPs: Debunking the Myths Recorded: Oct 23 2013 49 mins
    Managed Security Service Providers (MSSPs) provide enhanced security measures, expertise and awareness and enable organisations to make efficient use of their resources. However, organisations often feel they are stuck between a rock and a hard place when it comes to the EU Data Protection law and partnering with a MSSP.

    This webcast, delivered by experts from Dell SecureWorks and legal firm Field Fisher Waterhouse LLP will help clarify some of the common ‘myths’ regarding the intent of the law and how this affects working with a MSSP.

    Key webcast topics include:

    •Using third parties to process personal data

    •Transferring data outside the EU

    •Using cloud-based services

    •Local law enforcement access to data (e.g. by US authorities under the Patriot Act)
  • PCI 3.0: Go Forth and Comply Recorded: Oct 9 2013 30 mins
    The new Payment Card Industry Data Security Standards (PCI DSS) guidelines encourage organisations to focus on security rather than compliance in order to mitigate some of the most frequently seen risks that have precipitated cardholder-data compromise.

    Our latest webcast, delivered by Dell SecureWorks PCI expert, Ron Kiss, focuses on the proposed changes to the standard and how it could affect your organisation when they come into play on 1st January 2014.

    Key webcast topics include:

    •Version 2.0 to 3.0 – what are the changes?

    •A security approach to compliance rather than compliance approach to security

    •Pragmatic advice on what the next steps should be for your organisation
  • Building a Successful PCI Programme in a Complex Cloud Environment Recorded: Aug 29 2013 23 mins
    The use of Cloud Computing technology has seen a recent spike in popularity with spend estimated at 25% of all annual IT expenditure growth in 2012 and nearly a third of growth in 2013. With the efficiencies it provides, businesses are clambering to find ways of leveraging its advantage for all types of online business functions, including processing card payments. However, unambiguous information on the Payment Cards Industry (PCI) compliance implications of this new technology are unclear for organisations moving to the cloud.

    This has resulted in much confusion of what compliance means for business and assessors alike. In February this year, the PCI SSC published the Cloud Computing Information Supplement with provides a greater level of clarity for businesses and assessors alike.

    Ron Kiss, Senior Consultant At Dell SecureWorks, will discuss how to incorporate what has been learned from the Information Supplement into a successful PCI program for your organisation’s and its complex cloud environment.

    Key webcast topic include:

    •The rise and rise of cloud and common challenges facing organisations

    •Clarifying the Cloud Computing Information Supplement and how it affects you

    •Building a successful PCI programme tailored for your cloud environment

    Ron Kiss

    Ron Kiss is a Principal Consultant within the Security, Risk and Compliance team at Dell SecureWorks. In his current and past roles, Ron has conducted both PCI-DSS and PA-DSS assessments in Europe and overseas. He brings a wealth of experience in assessing Merchants, Service Providers and Payment Applications from a range of industries such as Retail, Airlines, and Finance. 
  • Complex Security Incident Investigation: Lessons Learned Recorded: Jul 3 2013 45 mins
    Join this webcast for insight into recent security breach investigations from the Dell SecureWorks Counter Threat Unit (CTU).

    Dell SecureWorks responds to thousands of incidents on a daily basis with the CTU investigating the most serious of these. Join this session for pragmatic advice based on real-world examples, to help ensure your organisation is better prepared for a security breach.

    This webcast will cover:

    •Critical mistakes Dell SecureWorks has encountered in real-world cases
    •Maximising the value of current controls at no extra cost
    •How to avoid potentially disastrous security lapses

    Rafe Pilling, Counter Threat Unit EMEA

    Rafe Pilling is a security expert working for the EMEA Counter Threat Unit. Rafe has significant experience in incident response and digital forensics from his background as a Senior Consultant within the Dell SecureWorks Consulting firm.

    The Dell SecureWorks Counter Threat Unit research team monitor the cyber underground and watch for emerging threats. Monitoring and analysing over 50 billion events a day, their unparalleled visibility into the global threat landscape helps protect thousands of organisations worldwide.
  • The cloud: Shaking up your security Recorded: Apr 25 2013 44 mins
    More and more organisations are turning to cloud computing to solve their biggest technology and business challenges. By this stage, most of us are aware of the many benefits cloud has to offer: lower hardware and IT costs, ease of management and increased agility, to name a few. Yet when it comes to security, cloud is not a silver bullet. In fact, according to the Cloud Security Alliance, security is cited as the number one barrier to adoption of cloud services among organisations.

    During this webcast, Mark Wood, Director of Product Management at Dell SecureWorks, will discuss some of the prevalent security risks which exist when moving to the cloud and how this affects the traditional approach to security.

    This webcast will address the following key themes:

    •The security impact of different cloud models and minimising risk in a multi-tenant environment
    •Sharing the security burden and establishing an effective relationship with your cloud provider.
    •Staying one step ahead of the evolving compliance landscape.

    Mark is responsible for managed security for cloud services at Dell SecureWorks. He has more than 25 years of experience in the technology community as a software engineer, a sales engineer, a start-up owner and a product manager.

    Previously, at Cloud Sherpas, a solutions provider focused on migrating organizations to Google Apps, Mark was responsible for product strategy, lifecycle management and optimizing existing products. He has also worked in marketing and product management at a number of leading technology companies, including nCircle, Internet Security Systems (ISS) and AT&T Bell Laboratories.

    Mark holds a Bachelor of Science degree in computer science from Duke University and a Master of Science degree in computer science from Georgia Institute of Technology.
  • Advanced incident response: Are you prepared Recorded: Apr 9 2013 45 mins
    How prepared are you for a data breach? With the threat environment growing more complex, and the rise in advanced and targeted attacks, how does your response plan hold up? Threat actors have have changed their tactics; so must you.

    This webcast will examine how to develop a robust incident response plan, which takes into account the changes in the threat landscape. Lee Lawson, Solution Architect at Dell SecureWorks, will discuss new approaches to identify advanced threats earlier, and how to go beyond responding to the most obvious symptoms of an attack, to understanding the full extent of the breach and what has been compromised.

    This webcast will address the following key themes:

    •Security breaches Dell SecureWorks has seen across its global customer base, from advanced and targeted threats
    •Developing an incident response plan which takes into account the complex threat landscape
    •Getting the necessary visibility into your network to enable you to spot advanced threats early and understand the true scale of the attack.
  • Advanced persistent threats: The threat is real Recorded: Mar 21 2013 43 mins
    Advanced Persistent Threats are more than media hype. Dell SecureWorks has seen a significant increase in stealthy activity targeting specific intellectual assets.

    Rafe Pilling, Counter Threat Unit EMEA, will provide the latest intelligence on Advanced Persistent Threats, using real-world examples; and provide pragmatic advice on what you should be doing now to protect your organisation.

    Security strategies and tactics must evolve in light of the growth in APT attacks; how do you find and stop advanced threats before they become serious breaches?

    This webcast will address the following key themes:

    •The latest tools and techniques that advanced threat actors are using
    •Real-world examples of successful APT attacks
    •Best practice for preventing and responding to APTs

    Rafe Pilling is a leading information security expert who works as a Researcher in the Dell SecureWorks Counter Threat Unit (CTU). Leveraging Dell SecureWorks' global threat visibility across thousands of customer networks, proprietary toolsets and unmatched expertise, the Dell SecureWorks CTU security research team performs in-depth analysis of emerging threats, including Advanced Persistent Threats.
  • Risk assessment and threat identification: Guidance on PCI requirement 6.2 Recorded: Mar 6 2013 25 mins
    Merchants are now required to have a process in place to identify and risk rank newly-discovered vulnerabilities in order to be PCI compliant. The intent is to ensure that businesses proactively seek information on new vulnerabilities that might affect their systems, and not simply wait for vendor updates and patch announcements that could come weeks, months or even years after vulnerabilities are discovered.

    During this webcast, Ron Kiss, Principal Consultant at Dell SecureWorks, will address the following key themes:

    •Integrating requirements introduced this year on ranking identified vulnerabilities that can compromise your cardholder data
    •Risk ranking frameworks and what processes to put in place for categorising threats and working within your risk assessment process
    •Using threat intelligence to increase protection of the business and provide real value

    Ron Kiss is a Principal Consultant within the Security, Risk and Compliance team at Dell SecureWorks. In his current and past roles, Ron has conducted both PCI-DSS and PA-DSS assessments in Europe and overseas. He brings a wealth of experience in assessing Merchants, Service Providers and Payment Applications from a range of industries such as Retail, Airlines, and Finance. 
  • You’re the one that they want: Targeted threats and you Recorded: Feb 28 2013 37 mins
    The rise in targeted threats means that IT security teams must move beyond a general understanding of the threat landscape, to a detailed understanding of their own context and the ability to spot threats targeted at their specific organisation.

    What different techniques should you use as a threat evolves from malicious talk in public forums and social media sites, through to more formulated threats, planning stages, and attack stages? In a world of information-overload and an explosion in communication channels, how do you sift through the noise and identify true threats to your business?

    During this webcast, Lee Lawson, Solutions Architect at Dell SecureWorks, will address the following key themes:

    •The challenges faced by organisations from the rise in targeted threats
    •Limitations of security processes in protecting from targeted threats
    •How to gain early visibility into the threats targeting your particular organisation

    Lee Lawson is the Solutions Architect for Security and Risk Consulting Services at Dell SecureWorks EMEA. In this role he is in charge of envisioning and creating combinations of new and existing services to solve the most unique and difficult customer problems. His past experience was as a Principal Consultant managing the EMEA Security Testing and Response team responsible for all adversarial-testing services such as penetration testing, social engineering and physical intrusions, and all responsive services such as digital forensics and security incident response/handling. This background has provided him with a deep knowledge of the subject having led complex and challenging projects for customers in all industries.
Webcasts from the Dell SecureWorks Team
Dell SecureWorks is relentlessly driven to protect the integrity of the world's digital assets against cyberthreats. We do that with intelligent defences that combine our proprietary technology, global threat visibility and deep expertise. We are 100% focused on information security – it's all we do. That's why we are trusted by thousands of customers. Dell SecureWorks offers a full suite of Managed Security, Threat Intelligence and Security and Risk Consulting services.

Dell SecureWorks is positioned in the Leaders Quadrant of Gartner's Magic Quadrant for MSSPs and has been recognised by SC Magazine’s readers with the “Best Managed Security Service” award for 2006, 2007, 2008, 2009, 2011 (U.S. and Europe) and 2012. Additionally, our experts frequently provide authoritative information security commentary in major media outlets including the New York Times, The Wall Street Journal, The Financial Times, USA Today, The Guardian and many others.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Managing Vulnerabilities in Mobile Applications
  • Live at: May 30 2012 11:00 am
  • Presented by: Rafe Pilling,
  • From:
Your email has been sent.
or close
You must be logged in to email this