What you'll learn: • A look back — and forward — at the cybersecurity landscape • New technologies and strategies for managed security services • Five things MSSPs need to offer today �...
What you'll learn: • The evolution of the ransomware “marketplace” • Common vulnerabilities and pitfalls • Real-life examples of ransomware engagements • Cyber essentials for better p...
What you'll learn: • Incident management versus incident response • How Secureworks takes a holistic approach • Key lessons learned from real-life engagements • The top three things to lo...
As cyberattacks grow in frequency and severity, cyber insurance has never been more important. But rising risks can also mean rising premiums. How do you improve your security and minimize your p...
Join Stefan Oancea, Principal Security Engineer at Secureworks, to find out how Secureworks is extending the value of Microsoft security solutions to deliver customers greater value. He’ll offe...
Expanding security threats require an expansive response, but how do you move beyond the endpoint without increasing complexity and risk? All too often, extended detection and response (XDR) is a...
What We'll Cover - The current state of cybersecurity in manufacturing - Risks and impact of cyberattacks - How manufacturers can justify security spend - How Managed Detection & Response (MDR) c...
What We'll Cover - EDR and XDR: a comparison - Combining XDR and MDR in the future - EDR vendors: The secret to success - How to find the right cybersecurity partner - Secureworks transformation ...
What We'll Cover - XDR vs. SIEM - Investment level needed for a SIEM purchase - SOAR platform: necessary or not? Security Information and Event Management (SIEM) has been the solution of choice f...
What We'll Cover - Top tips for cyber incident preparedness - Most common mistakes organizations make in a cyberattack - Planning ahead and best practices - The importance of roles and responsibi...
What We'll Cover - Maximizing talent to address risks: Minimizing the spend footprint - CISO: The evolution of the role - Security tech: Artificial Intelligence (AI) and incorporating humanizatio...
When ransomware-as-a-service (RaaS) was introduced to the cybercrime landscape in the mid-2010s, it significantly lowered the bar to entry for cybercriminals. As a result, the scale of ransomware...
French subtitled An overreliance on endpoint detection and response (EDR) alone is bound to leave holes in your cyber defense. That’s because cybersecurity incidents now originate from almost a...
There’s no doubt that security information and event management (SIEM) platforms provide powerful threat detection tools. But SIEM technology has its (long) list of challenges - cost, skills sh...
The last few years have seen 10 years of digital transformation compress into 3 years and as a result, the entire architecture behind IT has changed beyond recognition for many organizations. At ...
Network defenders often look at "dwell time" – the time between an adversary gaining access and achieving their objectives – as a key metric in understanding threat and risk. Based on Securew...
An overreliance on endpoint detection and response (EDR) alone is bound to leave holes in your cyber defense. That’s because cybersecurity incidents now originate from almost anywhere in the IT...
The rise of AI has made its way to threat detection. With AI-enabled threat detection systems predicting new attacks and notifying admins of data breaches instantly, it’s safe to say that artif...
Lisa Washburn, Senior Director of Product Management at Secureworks discusses: The value of extended detection and response (XDR) How it can improve security. What value it can provide to your or...
Steve Fulton, Chief Product Officer at Secureworks, explains: What extended detection and response (XDR) is The security benefits it provides in extending visibility and adding flexibility to you...
Selecting the right threat detection and incident response solution for your organization can be overwhelming. From Endpoint Detection & Response (EDR), Extended Detection and Response (XDR), Man...
A Many security teams know the struggle all too well: SIEM solutions are not keeping up with the pace of cyber threats. In fact, maybe the only thing about SIEM keeping pace with those threats is...
A discussion from Davos about nation-state actor attribution, criminal gang activity, and how organizations such as NGOs are targeted. Trends from 2022 activity, incident responses, and investiga...
What you’ll learn: Outlining the various solutions in the cybersecurity market Today’s top security challenges The differences between Product (XDR) and Service (MDR) How to select the right ...
Modern approaches to vulnerability management are reducing the need for manual intervention and increasing risk protection. What should you know to automate your organization’s vulnerability ma...
The rise of AI has made its way to threat detection. With AI-enabled threat detection systems predicting new attacks and notifying admins of data breaches instantly, it’s safe to say that artif...
There’s no doubt that security information and event management (SIEM) platforms provide powerful threat detection tools. But SIEM technology has its (long) list of challenges - cost, skills sh...
As cyber threats proliferate, more organizations are turning to extended detection and response (XDR) to detect and eliminate attacks. However, decision-makers have questions about what to expect...
What you'll learn: MITRE basics – a common language for InfoSec How Secureworks maps adversarial tactics to MITRE to cover over 90% of MITRE ATT&CK TTPs The methods and motivations of the adver...
How to Protect Your Digital Business: 3 Top Success Factors to Securing Your Digital Workforce Watch our webinar to discover the impact digital transformation has on the cybersecurity industry an...
What you’ll learn: Outlining the various solutions in the cybersecurity market Today’s top security challenges The differences between Product (XDR) and Service (MDR) How to select the right ...
https://www.brighttalk.com/webinar/edr-xdr-mdr-filtering-out-the-alphabet-soup-of-cybersecurity/
What you’ll learn: The seriousness of the ransomware threat The ransomware landscape post-Colonial Pipeline attack What you can do to defend against ransomware—best practices and common faili...
What you’ll learn: How to unveil current weaknesses in your defenses Frameworks and processes to consider in the context of your IT environment Readiness strategies and ways to reduce...
Modern approaches to vulnerability management are reducing the need for manual intervention and increasing risk protection. What should you know to automate your organization’s vulnerability ma...
Readiness is essential. How will your organization weather the ransomware storm? o What you’ll Learn: o How to proactively defend against the ever-increasing threat of ransomware o Key principl...
Choose the right SecOps platform to spend and defend effectively. What You’ll Learn: • The differences between SIEM and XDR and how they both impact the effectiveness of SecOps teams • The ...
How to Execute a Winning MDR Strategy • What you’ll Learn: o Top challenges that Managed Threat Detection & Response solves o 5 crucial criteria for evaluating MDR solution vendors o Practica...
How to Execute a Winning MDR Strategy • What you’ll Learn: o Top challenges that Managed Threat Detection & Response solves o 5 crucial criteria for evaluating MDR solution vendors o Practica...
Choose the right SecOps platform to spend and defend effectively. What You’ll Learn: • The differences between SIEM and XDR and how they both impact the effectiveness of SecOps teams • The ...
Readiness is essential. How will your organization weather the ransomware storm? o What you’ll Learn: o How to proactively defend against the ever-increasing threat of ransomware o Key principl...
How to Protect Your Digital Business: 3 Top Success Factors to Securing Your Digital Workforce Watch our webinar to discover the impact digital transformation has on the cybersecurity industry an...
What you’ll learn: How to unveil current weaknesses in your defenses Frameworks and processes to consider in the context of your IT environment Readiness strategies and ways to reduce...
What you'll learn: MITRE basics – a common language for InfoSec How Secureworks maps adversarial tactics to MITRE to cover over 90% of MITRE ATT&CK TTPs The methods and motivations of the adver...
What you’ll learn: The seriousness of the ransomware threat The ransomware landscape post-Colonial Pipeline attack What you can do to defend against ransomware—best practices and common faili...
The security landscape is more complex than ever. Cybersecurity professionals are challenged by threat detection and response. As organizations confront resource constraints, how can they stay ah...
Data science has become a buzzword in the industry, but what does it really mean for cybersecurity teams? Listen to a Secureworks® expert cut through the hype of data science and explain how it ...
Each year, Secureworks performs hundreds of proactive incident response exercises and emergency response engagements for a variety of industries, globally. During these engagements, consistent Cy...
Managed Detection and Response is a rapidly emerging security solution seeing increased demand in the marketplace. But what are the trends driving MDR services and what do buyers need to know whe...
The Security Operation Center or SOC has historically played the important role as the ‘command and control’ hub for an organization’s cybersecurity efforts. However, the reactive SOC of ye...
Managed Detection and Response (MDR) solutions are an attractive option for companies who want to optimize threat detection and response times. But is MDR much different from traditional managed ...
The security landscape is more complex than ever. Cybersecurity professionals are challenged by threat detection and response. As organizations confront resource constraints, how can they stay ah...
Each year, Secureworks performs hundreds of proactive incident response exercises and emergency response engagements for a variety of industries, globally. During these engagements, consistent Cy...
The MITRE ATT&CK Framework is a common industry language of threat actor tactics and techniques based on real-world observations. MITRE regularly conducts product evaluations to provide independe...
Many organizations perform regular annual or bi-annual testing to identify network vulnerabilities, gaps in their controls and satisfy industry compliance requirements. Examining results and less...
Managed Detection and Response is a rapidly emerging security solution seeing increased demand in the marketplace. But what are the trends driving MDR services and what do buyers need to know whe...
The Security Operation Center or SOC has historically played the important role as the ‘command and control’ hub for an organization’s cybersecurity efforts. However, the reactive SOC of ye...