Data Sheets

Events

events_philadelphia_360x200

Data Privacy & Security Panel Discussion

Tuesday, December 11
Philadelphia, PA

Learn More

Tools

TimeFrag

TimeFrag

TimeFrag empowers analysts to process and timeline large amounts of data. TimeFrag ingests data from…

Learn More

Webinars

July 10,2018
Best Practices for Securing Your Hosts – Part I

In this 15 minute mini-webinar, Crypsis Group consultants Thomas Aneiro and Brett Rudloff take a look at the defenses that can keep your endpoints...

Read More
May 11,2018
Best Practices for Securing Your Network – Part 1

What network security best practices should your company be following in 2018? In this 15 minute mini-webinar, Crypsis Group consultants Thomas...

Read More
February 23,2018
Incident Response Playbook, The Why, Who and What of Developing an IR Playbook

During this 30 minute, on-demand webinar, “Incident Response Playbook, The Why, Who and What of Developing an IR Playbook,” presenters Kyle Goode and...

Read More
January 29,2018
TimeFrag

During this 30 minute webcast, Jon Tomczak developer of The Crypsis Group’s free tool TimeFrag, discusses how the tool came to be and how to get the...

Read More
September 07,2017
Cyber School is in Session

Over the course of this year, we’ve collectively provided advice to our clients about their cyber security concerns. In nearly all of these cases,...

Read More
July 24,2017
Tales from the Crypsis – What’s the Plan [Stan]?

Mike Tyson summed up prize fighting thusly, “Everyone has a plan until they get punched in the face.”  That statement can almost certainly be applied...

Read More
June 22,2017
Tales From The Crypsis – Interesting Stuff We’ve Found [On-Demand]

Here at The Crypsis Group, it’s been a busy year so far. We’ve worked with a lot of organizations to help them find bad stuff in their networks and...

Read More
May 25,2017
Tales From The Crypsis: Xdedic Threat Profile [On-Demand]

During this 30 minute, on-demand webinar, Crypsis Group consultants will give a history of the xDedic marketplace, share some information about...

Read More
January 25,2017
Cyber Security And Institutional Investors

Cybersecurity attacks continue to impact organizations of all sizes, including financial institutions, hedge funds, and private equity funds....

Read More
December 15,2016
Splunkmon – Taking Sysmon to the Next Level

Many organizations are targeted by threat actors whose mission it is to steal intellectual property, PII data, PCI data, or other proprietary...

Read More
October 05,2016
Don’t Be Held Hostage By Criminal Hackers

Imagine that a hacker installed malware on your company’s computer system, encrypting your files, and preventing you from accessing them. Then that...

Read More
September 22,2016
Outbreak – Ransomware Reporting Requirements In The Health Care Industry

The U.S. Department of Health and Human Services (“HHS”) Office of Civil Rights (“OCR”) recently released guidance on whether or not a ransomware...

Read More

Load More

White Papers

Microsoft Office 365 Best Practices InfoSheet

With an increase in the number of cyber security compromises as a result of phishing attacks, it is prudent for companies using Office 365 products to take appropriate steps to prevent or mitigate the damage from these incidents. Download our InfoSheet to learn which tools Crypsis suggests enabling to make it harder for attackers to…

Targeted Ransomware: The Next Evolution In Cyber Extortion

Over the last five years, cyber criminals have besieged individuals and companies alike with ransomware, which is malicious software that encrypts data and attempts to extort the victim into paying money to decrypt their own data. Even worse, the use of ransomware by malicious actors is increasing: the FBI has reported that in the first…

Splunkmon – Taking Sysmon To The Next Level

The success of security teams when combating cyber threats relies on visibility into the environment they must defend. Security teams that do not have visibility into their endpoints may not see a threat actor moving in the environment, stealing credentials, deploying backdoors, or exfiltrating sensitive data. The goal of this white paper is to illustrate…

The General Counsel’s Playbook for Working with Cybersecurity Consultants

When you are hit with a data breach, knowing who does what will help you respond expeditiously, effectively, and in a manner that minimizes risk to the enterprise. For that your company needs to have an incident response strategy in place. The General Counsel is critical to this process.