Technology is transforming security operations, but to harness the power of analytics and automation is both an art and a science. That’s why investing in a singular tool will never be the silver bullet that organizations hope for. Embracing a software-enabled approach, however, can be a game-changer.
At Secureworks, our security software isn’t designed to replace human expertise, but rather to help organizations and security professionals unite in their fight against the adversary. Secureworks developed its Red Cloak™ Security Analytics Platform to help customers modernize their program with visibility across endpoint, cloud and network, and to harness the collaborative intelligence and analytics necessary to take a proactive stance against their adversaries.
At Black Hat USA, August 1-6, Secureworks will deliver demonstrations and presentations focused on what we call Strength in Software. It is a security approach that blends data sciences, threat intelligence and IR experience to help customers accelerate detections, improve fidelity, and streamline investigations for rapid response. Beginning August 1, check out the Black Hat newsletter where Secureworks’ Vice President of Product, Steve Fulton, explains how this collaborative approach to security is upending traditional market categories and changing the way security is integrated into the modern business environment.
Product Demonstrations: Red Cloak™ Threat Detection and Response (TDR) and Detection and Response
- Wednesday, August 5, 8:30am – 4pm PDT
- Thursday, August 6, 8:30am – 4pm PDT
With the strength of software behind them, see first-hand how Secureworks customers detect and respond to the threats with the speed and scale they need to enable digital transformations.
Visit our booth for a demonstration. We have put our top experts and engineers on standby to take you through paces of our cloud-native Threat Detection and Response application using a real-life attack scenario. Learn how you can use the SaaS application in house, or opt to see how Secureworks can manage the software for you as a Managed Detection and Response solution.
Go on a Threat Hunt with Secureworks’ Lead Hunter
- Session: Threat Hunting Intelligently, Thursday, August 6, 2020, 11:20am PDT (20-minutes)
We’ll open with a scan of the threat horizon by Secureworks’ Chief Threat Intelligence Officer, Col. (USA, Ret.) Barry Hensley, who also explains how his team leverages the intersection of technology, tools, and passionate professionals for an ultimate advantage over the adversary. Ryan Cobb, Senior Research Consultant and Threat Hunter then demonstrates how you can combine the insights from threat modeling and intelligence to hunt purposefully and effectively. Bring your questions and ideas for a live Q&A.
See How Threat Intelligence is Curated and Applied by our Counter Threat Unit™ (CTU)
- Session: Intelligence Through Scale and Automation, On-Demand Zone, available any time (15-minutes)
The scalability of software combined with the best threat research talent in the cybersecurity industry—the Counter Threat Unit (CTU™)—are the backbone of the Secureworks advantage. Join Chris Taylor, Secureworks’ Senior Security Researcher, for a test-drive through our CTU’s threat research operations and how we develop use cases for the cutting-edge technology that leaves threat actors no place to hide.
Secureworks is also a Sponsor of the Black Hat CISO Summit – Tuesday, August 4, 9am-4pm PDT
The Black Hat CISO Summit is an invitation-only event during Black Hat USA that brings together top security executives from Global 2000 corporations and government agencies for a full day of high-level discussions. CISO Summit is intended to give InfoSec executives practical insight into the latest security trends, technologies, and enterprise best practices.
Being virtual is an ongoing journey for us all, but the Secureworks team is eager to field your tough questions and hear how you’ve been innovating through change. Join us in the spirit of finding new ways to unite the fight against the adversary. If you’d like a tour of Red Cloak Threat Detection and Response prior to Black Hat, click here. If you have questions you’d like answered prior to the event, contact email@example.com. We’ll see you at Black Hat USA online!