Cybersecurity Resource Center | Blog | CRITICALSTART
Prepare your business with On-Demand Breach Response
Webinar Series | Once More unto the Breach | Lessons Learned from Billion Dollar Breaches
SIEM Webinar

Why Next Gen SIEM paired with MDR is a game-changer

Upcoming Webinars


SIEM Webinar

Why Next Gen SIEM paired with MDR is a game-changer


Webinar Series

Once More unto the Breach

 

Webinar Series

Once More unto the Breach

About the Series

Cybersecurity breaches can happen for many reasons at companies of any size, and maturity level. Hackers are relentless, and constantly testing the waters to reveal and sneak in through wherever they find vulnerabilities. The list of where vulnerabilities are can be daunting – from endpoints to applications simple human error, and network backdoors that might not be so obvious. No one wants a breach to happen. So, how do you successfully find the right tools, processes and operation to stop breaches from happening?

CRITICALSTART presents a new monthly webinar series, “Once More unto the Breach” – that will take you on an exploratory deep dive into the world of cybersecurity breaches. This series of educational webcasts will present current events, real-world scenarios and use cases to inform on different methods and processes that can effectively be used to stop breaches – led by cybersecurity experts, CISOs and other security leaders.

June 24, 2020
11:00 AM CDT

Uncovering Your Security Blind Spots

How big is your security risk and how do you identify and contain those risks? You may be surprised to learn that there are looming threats you can’t see, and attackers may be enjoying a long dwell time within your system – before you even detect an issue.

Join Quentin Rhoads-Herrera, CRITICALSTART’s Director of Professional Services, on June 24 at 11 am CT, to explore how big your security risk is throughout your organization, and how to uncover those potential blind spots.

In this live session you’ll learn:

  • How to identify potential risk – asset management, risk register development
  • How to build an operation around risk mitigation – how to set up cadence for vulnerability scanning, pentesting, incident response tabletops to gauge your response to a breach
  • How to automate and leverage tools for efficiency across your operation

Watch this webinar on-demand today!

July 22, 2020
11:00 AM CDT

Lessons Learned from Billion Dollar Breaches

Globally, breaches cost organizations billions of dollars every year. In the U.S., losses for each breach average just under $10 million. In 2011, one data management company’s breach is among the most expensive and widely publicized breaches, which created a $4 billion headache for the firm. However, beyond the cost of remediation, breaches also impact an organization’s brand and reputation. After a breach, a company loses an average of 4% of its customer base, while a government entity loses the trust of the citizens using their services.

In examining these breaches, we find ourselves asking, “What did these organizations do right? What could the organizations have done better?”

Join CRITICALSTART with TEAMARES’ security expert, Allyn Lynd, as he shares some first-hand knowledge of the most expensive data breaches in history.  Take a deep dive into what went right and wrong before, during, and after data breaches.

Key takeaways from this webinar include:

  • How to prepare for a breach
  • What to do once a breach occurs
  • How to recover from a breach in the long term
  • What mistakes to avoid if/when a breach does occur

Save your seat – register today!

August 26, 2020
11:00 AM CDT

Impact of Zero Day Exploits on Breaches

Organizations are losing the endpoint security battle against new or unknown zero-day attacks. A recent Ponemon Study on endpoint security revealed that 68% of IT security experts say their company experienced one or more endpoint attacks that compromised data assets or IT infrastructure in 2019. Of those breaches, 80% were zero-day attacks – with the frequency of zero-day attacks expected to increase to 42next year. These exploits frequently go beyond just endpoints. Some of the most impactful vulnerabilities announced in 2020 deal with externally facing network appliances such as firewalls, routers, VPN concentrators, and other devices.  

While there is no way to prevent zero-days, there are steps you can take to reduce the impact and/or severity of security incidents whether or not zero-days are involved.  

To find out how you can shore up vulnerabilities, join CRITICALSTART’s TEAMARES Cory Mathews, Offensive Security Manager, and Rich Mirch, Senior Adversarial Engineer, for “Impact of Zero-Day Exploits on Breaches,” on Aug. 26 at 11 am CT for the third webinar in our series of webcasts exploring the world of cybersecurity breaches.

Key takeaways from this webinar include:

  • What a zero-day is – and what it is not 
  • Using a zero-day to breach the perimeter and pivoting into sensitive areas within organizations 
  • Challenges and methods in defending against zero-days including patching, defense in-depth, and mature network and endpoint monitoring solution and team 
  • TEAMARES’ vulnerability research team’s success stories of discovering zero-days and developing full Proof-of-Concept exploits 
  • Examples of infamous zero-days and +1-day events such as WannaCry using NSA tools released by the Shadow Brokers 

September 23, 2020
11:00 AM CDT

TEAMARES Red and Blue Series: Exploiting Enterprise Passwords

More Information Coming Soon

October 21, 2020
11:00 AM CDT

TEAMARES Red and Blue Series: : Data protection/Sensitive Data

More Information Coming Soon