News

Webinars

July 10, 2018

Best Practices for Securing Your Hosts – Part I

In this 15 minute mini-webinar, Crypsis Group consultants Thomas Aneiro and Brett Rudloff take a look at the defenses that can keep your endpoints safe.

May 11, 2018

Best Practices for Securing Your Network – Part 1

What network security best practices should your company be following in 2018? In this 15 minute mini-webinar, Crypsis Group consultants Thomas Aneiro and Brett Rudloff take a look at the defenses that can keep your network safe.

February 23, 2018

Incident Response Playbook, The Why, Who and What of Developing an IR Playbook

During this 30 minute, on-demand webinar, “Incident Response Playbook, The Why, Who and What of Developing an IR Playbook,” presenters Kyle Goode and Ized Oikeh will discuss why it is important for organizations of all sizes to create and regularly review an IR playbook. They will also identify who should be involved in the incident response process including information technology staff, lawyers, executives, and public relations/marketing team members. In addition, Kyle and Ized will address the different sections and procedures that every playbook should include. Finally, they will review the importance of tabletop exercises provide an illustrative case study of one organization and the lessons they learned about their playbook after their own incident.

Watch the Webinar

January 29, 2018

TimeFrag

During this 30 minute webcast, Jon Tomczak developer of The Crypsis Group’s free tool TimeFrag, discusses how the tool came to be and how to get the most out of it in your incident investigations.

September 07, 2017

Cyber School is in Session

Over the course of this year, we’ve collectively provided advice to our clients about their cyber security concerns. In nearly all of these cases, much of what we have encountered are common issues that plague organizations of all sizes and security maturity.

July 24, 2017

Tales from the Crypsis – What’s the Plan [Stan]?

Mike Tyson summed up prize fighting thusly, “Everyone has a plan until they get punched in the face.”  That statement can almost certainly be applied to cyber security as well. Companies spend large amounts of time, money, and effort to proactively harden their networks and keep bad actors out. But what happens when threat actors still manage to circumvent those efforts?

June 22, 2017

Tales From The Crypsis – Interesting Stuff We’ve Found [On-Demand]

Here at The Crypsis Group, it’s been a busy year so far. We’ve worked with a lot of organizations to help them find bad stuff in their networks and resolve issues related to data breaches. Along the way, we’ve seen some attackers use trade-craft and tools that have made us stand up and take notice.

May 25, 2017

Tales From The Crypsis: Xdedic Threat Profile [On-Demand]

During this 30 minute, on-demand webinar, Crypsis Group consultants will give a history of the xDedic marketplace, share some information about attacks we have seen using tools available via the marketplace, and share suggestions for steps victims can take to protect themselves against these kinds of attacks.

January 25, 2017

Cyber Security And Institutional Investors

Cybersecurity attacks continue to impact organizations of all sizes, including financial institutions, hedge funds, and private equity funds. Relatedly, cybersecurity has remained at the top of the regulatory agenda for several federal and state agencies that impact these organizations.

December 15, 2016

Splunkmon – Taking Sysmon to the Next Level

Many organizations are targeted by threat actors whose mission it is to steal intellectual property, PII data, PCI data, or other proprietary information. Once the attacker has a particular target in their sights, they more often than not succeed in breaching that organization’s network. Once the attackers are in, the countdown to mission completion begins. Will the threat actor meet their end objective or will the organization’s blue team identify, contain, and eradicate the threat in time?