In this 15 minute mini-webinar, Crypsis Group consultants Thomas Aneiro and Brett Rudloff take a look at the defenses that can keep your endpoints safe.
What network security best practices should your company be following in 2018? In this 15 minute mini-webinar, Crypsis Group consultants Thomas Aneiro and Brett Rudloff take a look at the defenses that can keep your network safe.
During this 30 minute, on-demand webinar, “Incident Response Playbook, The Why, Who and What of Developing an IR Playbook,” presenters Kyle Goode and Ized Oikeh will discuss why it is important for organizations of all sizes to create and regularly review an IR playbook. They will also identify who should be involved in the incident response process including information technology staff, lawyers, executives, and public relations/marketing team members. In addition, Kyle and Ized will address the different sections and procedures that every playbook should include. Finally, they will review the importance of tabletop exercises provide an illustrative case study of one organization and the lessons they learned about their playbook after their own incident.
During this 30 minute webcast, Jon Tomczak developer of The Crypsis Group’s free tool TimeFrag, discusses how the tool came to be and how to get the most out of it in your incident investigations.
Over the course of this year, we’ve collectively provided advice to our clients about their cyber security concerns. In nearly all of these cases, much of what we have encountered are common issues that plague organizations of all sizes and security maturity.
Mike Tyson summed up prize fighting thusly, “Everyone has a plan until they get punched in the face.” That statement can almost certainly be applied to cyber security as well. Companies spend large amounts of time, money, and effort to proactively harden their networks and keep bad actors out. But what happens when threat actors still manage to circumvent those efforts?
Here at The Crypsis Group, it’s been a busy year so far. We’ve worked with a lot of organizations to help them find bad stuff in their networks and resolve issues related to data breaches. Along the way, we’ve seen some attackers use trade-craft and tools that have made us stand up and take notice.
During this 30 minute, on-demand webinar, Crypsis Group consultants will give a history of the xDedic marketplace, share some information about attacks we have seen using tools available via the marketplace, and share suggestions for steps victims can take to protect themselves against these kinds of attacks.
Cybersecurity attacks continue to impact organizations of all sizes, including financial institutions, hedge funds, and private equity funds. Relatedly, cybersecurity has remained at the top of the regulatory agenda for several federal and state agencies that impact these organizations.
Many organizations are targeted by threat actors whose mission it is to steal intellectual property, PII data, PCI data, or other proprietary information. Once the attacker has a particular target in their sights, they more often than not succeed in breaching that organization’s network. Once the attackers are in, the countdown to mission completion begins. Will the threat actor meet their end objective or will the organization’s blue team identify, contain, and eradicate the threat in time?