Technologies and services – Securelist https://securelist.com Mon, 03 Apr 2023 16:48:10 +0000 en-US hourly 1 https://wordpress.org/?v=6.2.2 https://securelist.com/wp-content/themes/securelist2020/assets/images/content/site-icon.png Technologies and services – Securelist https://securelist.com 32 32 ChatGPT – good or evil? AI impact on cybersecurity https://securelist.com/webinars/chatgpt-ai-impact-on-cybersecurity/ https://securelist.com/webinars/chatgpt-ai-impact-on-cybersecurity/#respond Thu, 16 Feb 2023 15:00:57 +0000 https://kasperskycontenthub.com/securelist/?post_type=webinars&p=108817

As the world discusses ChatGPT-3 and its impressive capabilities, the business community is concerned about the AI’s potential to change the game for cyber criminals and wreak havoc in the world of defense organizations. Should businesses soon expect a wave of even more advanced cyber-attacks or simply more attacks? Will current cybersecurity solutions be enough? Or will ChatGPT instead provide cybersecurity specialists with more efficient and smarter defensive and threat hunting tools?

In this webinar, Kaspersky experts will discuss how ChatGPT currently influences the cyber threats landscape and cybersecurity in organizations, and contemplate whether this is a real game changer for the industry and, in particular Security Operation Centers (SOCs). The experts will also discuss the potential benefits of using ChatGPT in threat hunting and malware analysis.

In this webcast you will find out:

  • If ChatGPT can really influence the threat landscape. Where can cyber criminals use it, and will it be effective?
  • Will the emergence of ChatGPT and similar AI language models lead to increased cybersecurity costs?
  • If ChatGPT is capable of becoming an autonomous hacking AI-tool
  • How can cybersecurity experts employ ChatGPT: a demonstration of a scanner for Indicators of Compromise (IoCs)
]]>
https://securelist.com/webinars/chatgpt-ai-impact-on-cybersecurity/feed/ 0 full large medium thumbnail
The practical versatility of SOC https://securelist.com/webinars/the-practical-versatility-of-soc/ https://securelist.com/webinars/the-practical-versatility-of-soc/#respond Wed, 21 Dec 2022 12:30:28 +0000 https://kasperskycontenthub.com/securelist/?post_type=webinars&p=108416

In this video Roman Nazarov, Head of SOC Consulting at Kaspersky, will talk about the practical versatility of SOC services. Learn about the main components of SOC, its value to the company’s threat research team, and how is it useful for compliance department. You will learn about the building of a good SOC, why is it important for the security awareness and many more things, including:

  • Why do we need SOC and how to build a good one?
  • What are the key features of SOC?
  • What are the differences between in-house SOC and MSSP?
  • What is a better choice for SMB and enterprise in terms of security management?
]]>
https://securelist.com/webinars/the-practical-versatility-of-soc/feed/ 0 full large medium thumbnail
SOC consulting projects: common methodology and insights https://securelist.com/webinars/soc-consulting-projects-common-methodology-and-insights/ https://securelist.com/webinars/soc-consulting-projects-common-methodology-and-insights/#respond Fri, 23 Sep 2022 12:00:32 +0000 https://kasperskycontenthub.com/securelist/?post_type=webinars&p=107501

Join this webinar to get actionable information that will help you plan and develop your own security operations strategy and will guide you towards practically proven solutions. During the webinar, Roman Nazarov, Head of SOC Consulting at Kaspersky, will provide a comprehensive review of our consulting services – SOC Maturity assessment and SOC Framework development – and share informative insights based on successfully completed projects, including:

  • The most common SOC services and their dependence on customers’ business areas
  • Typical internal SOC processes and organizational structure and what influences them
  • Common issues in security operations and how they’re mitigated
  • Where to learn security operations and threat hunting in theory and practice

Kaspersky Security Operations Center provides consulting services for customers who aren’t ready to outsource their operations to a Managed Detection and Response team but want to develop internal security operations practices.

A new Kaspersky online cybersecurity course ‘Security Operations and Threat Hunting’ helps SOC analysts and other staff dealing with security operations understand the SOC structure, plan and organize security monitoring, and master threat hunting.

]]>
https://securelist.com/webinars/soc-consulting-projects-common-methodology-and-insights/feed/ 0 full large medium thumbnail
How to effectively detect, prevent & respond to threats with threat intelligence https://securelist.com/webinars/how-to-effectively-detect-prevent-respond-to-threats-with-threat-intelligence/ https://securelist.com/webinars/how-to-effectively-detect-prevent-respond-to-threats-with-threat-intelligence/#respond Mon, 19 Sep 2022 12:36:42 +0000 https://kasperskycontenthub.com/securelist/?post_type=webinars&p=107457

The threat landscape is changing rapidly. It’s becoming incredibly challenging to effectively respond to emerging complex and advanced cyberthreats without a 360-degree view of the tactics, techniques and procedures used by threat actors. Immediate access to relevant and reliable threat intelligence (TI) makes your incident response and SOC teams more efficient and effective, arming them with the threat context required to quickly respond to cyberattacks.

In this webinar, you will see a demonstration of the incident investigation process with the help of different Kaspersky threat intelligence services. Kaspersky experts will present:

  • How to validate specific suspicious activities or artefacts
  • Analyses of the relationships between objects to see the attack spread path
  • How to get more context about observables and understand if they can be attributed to a known threat actor
  • How relevant TI context can speed up incident response process
]]>
https://securelist.com/webinars/how-to-effectively-detect-prevent-respond-to-threats-with-threat-intelligence/feed/ 0 full large medium thumbnail
How EDR can help you manage specific cybersecurity cases https://securelist.com/webinars/how-edr-can-help-you-manage-specific-cybersecurity-cases/ https://securelist.com/webinars/how-edr-can-help-you-manage-specific-cybersecurity-cases/#respond Fri, 28 May 2021 11:56:53 +0000 https://kasperskycontenthub.com/securelist/?post_type=webinars&p=102237

Many call Endpoint Detection and Response the new de facto standard in endpoint protection, even for medium-sized businesses. Better visibility, root cause analysis capabilities and faster mean time to respond are designed to enhance security and boost confidence. But what is EDR really good for? How can *you* use it? And how to avoid spending your whole day managing it?

During the webinar we’ll take a look at a number of EDR use cases to answer these questions and to identify how it can help your organization stay safe in the modern cyber-threat landscape.

]]>
https://securelist.com/webinars/how-edr-can-help-you-manage-specific-cybersecurity-cases/feed/ 0 full large medium thumbnail
Best practices: how to find network threats effectively using NIDS https://securelist.com/webinars/best-practices-how-to-find-network-threats-effectively-using-nids/ https://securelist.com/webinars/best-practices-how-to-find-network-threats-effectively-using-nids/#respond Thu, 13 May 2021 08:45:51 +0000 https://kasperskycontenthub.com/securelist/?post_type=webinars&p=102247

Protecting corporate networks is challenging. Large organizations are attacked daily and more often than not, the speed at which you find threats entering the network is vital. Network Intrusion Detection Systems (NIDS) are key components that help protect the network perimeter and analyze network traffic. But how can they be used most effectively?

In this webinar Tatyana Shishkova, a security researcher at Kaspersky, who specializes in threat detection, will share her expertise and cover the following topics:

  • What NIDS is, how it works and where to start
  • What is possible with threat detection
  • Best practices and Suricata rules
  • NIDS limitations and possible workarounds
]]>
https://securelist.com/webinars/best-practices-how-to-find-network-threats-effectively-using-nids/feed/ 0 full large medium thumbnail
Prioritizing alerts based on level of risk – a step-by-step guide https://securelist.com/webinars/prioritizing-alerts-based-on-level-of-risk-a-step-by-step-guide/ https://securelist.com/webinars/prioritizing-alerts-based-on-level-of-risk-a-step-by-step-guide/#respond Thu, 15 Apr 2021 09:25:10 +0000 https://kasperskycontenthub.com/securelist/?post_type=webinars&p=101923

During this webinar, we will provide a step-by-step guide to demonstrate how the Kaspersky Threat Intelligence Portal allows anyone to easily upload suspicious objects and discover if they pose danger to their company.

]]>
https://securelist.com/webinars/prioritizing-alerts-based-on-level-of-risk-a-step-by-step-guide/feed/ 0 full large medium thumbnail