Videos And On-Demand Webinars Archives | CyberMaxx https://www.cybermaxx.com/resources/type/videos-and-on-demand-webinars/ Assess, Monitor, and Manage Fri, 10 Oct 2025 18:20:06 +0000 en-US hourly 1 https://www.cybermaxx.com/wp-content/uploads/2024/09/cropped-Site-Icon-512x512-1-1-32x32.png Videos And On-Demand Webinars Archives | CyberMaxx https://www.cybermaxx.com/resources/type/videos-and-on-demand-webinars/ 32 32 On Demand Webinar – Tales from the SOC: When Action Speaks Louder Than Alerts https://www.cybermaxx.com/resources/on-demand-webinar-tales-from-the-soc-when-action-speaks-louder-than-alerts/ Fri, 10 Oct 2025 10:00:05 +0000 https://cybermaxx2021.wpengine.com/?p=9229 Watch the Tales from the SOC webinar, a live storytelling that pulls back the curtain on the real-time decisions, actions over alerting, and more harrowing tales from our Security Operations Center team. This live 30-minute webinar will dive into stories our team has experienced that highlight the power of proactive, real-time response.  Transcript Here […]

The post On Demand Webinar – Tales from the SOC: When Action Speaks Louder Than Alerts appeared first on CyberMaxx.

]]>
Watch the Tales from the SOC webinar, a live storytelling that pulls back the curtain on the real-time decisions, actions over alerting, and more harrowing tales from our Security Operations Center team. This live 30-minute webinar will dive into stories our team has experienced that highlight the power of proactive, real-time response.

Transcript Here

What You’ll Learn

  • What really happens before, during, and after a cyberattack
  • Why alerts alone aren’t enough—and what action truly looks like
  • How our “Big R” response approach drives results
  • The critical role of human insight in an AI-driven world
  • What it takes to stay ahead of evolving threats

Featuring

Erica Smith, Director of Security Operations (Moderator) | Stephanie Camacho, SOC Shift Lead | Ryan Bratton, SOC Auditor

The post On Demand Webinar – Tales from the SOC: When Action Speaks Louder Than Alerts appeared first on CyberMaxx.

]]>
On Demand Webinar: Avoiding Your Worst Day – What Every Business Leader Needs to Know About Cybersecurity https://www.cybermaxx.com/resources/on-demand-webinar-avoiding-your-worst-day-what-every-business-leader-needs-to-know-about-cybersecurity/ Tue, 07 Oct 2025 20:46:03 +0000 https://cybermaxx2021.wpengine.com/?p=9218  Overview In this exclusive webinar, CyberMaxx CISO Thomas Pioreck will walk you through a real-world breach scenario—highlighting the critical decisions that can either prevent or escalate a cyber crisis. Key takeaways: The full impact of cyber-attacks—beyond financial loss How integrated cybersecurity tools can stop threats in their tracks Lessons from organizations that successfully defended […]

The post On Demand Webinar: Avoiding Your Worst Day – What Every Business Leader Needs to Know About Cybersecurity appeared first on CyberMaxx.

]]>

Overview

In this exclusive webinar, CyberMaxx CISO Thomas Pioreck will walk you through a real-world breach scenario—highlighting the critical decisions that can either prevent or escalate a cyber crisis.

Key takeaways:

  • The full impact of cyber-attacks—beyond financial loss
  • How integrated cybersecurity tools can stop threats in their tracks
  • Lessons from organizations that successfully defended against attacks

This session is essential for business leaders, IT professionals, and anyone responsible for safeguarding operations.

Featuring:
Lisa Burke, Chief Customer Officer at CyberMaxx| Thomas Pioreck, CISO at CyberMaxx | Lee Crockett, Director of Sales at Advanced Logic

 

The post On Demand Webinar: Avoiding Your Worst Day – What Every Business Leader Needs to Know About Cybersecurity appeared first on CyberMaxx.

]]>
On-Demand Webinar: The Value of R with SentinelOne https://www.cybermaxx.com/resources/on-demand-webinar-the-value-of-r-with-sentinelone/ Thu, 18 Sep 2025 18:28:00 +0000 https://cybermaxx2021.wpengine.com/?p=9101 Overview Watch this webinar focused on how CyberMaxx leverages SentinelOne to prioritize rapid response and get you out of your worst day. Join experts from CyberMaxx and SentinelOne as they discuss the real-world impact of “Big R Response” – a proactive approach that goes beyond alerting to drive true cybersecurity outcomes. It’s key to provide […]

The post On-Demand Webinar: The Value of R with SentinelOne appeared first on CyberMaxx.

]]>

Overview

Watch this webinar focused on how CyberMaxx leverages SentinelOne to prioritize rapid response and get you out of your worst day.

Join experts from CyberMaxx and SentinelOne as they discuss the real-world impact of “Big R Response” – a proactive approach that goes beyond alerting to drive true cybersecurity outcomes. It’s key to provide your security team with more than just tools, but real-time support that prioritizes rapid response and gets them out of their worst day quickly.

In this session, Zack Hoffman (CyberMaxx) and Jay Ryerse (SentinelOne) dive into how CyberMaxx utilizes SentinelOne’s best-in-class EDR platform as a cornerstone of its Managed Detection & Response (MDR) strategy. The conversation will share practical use cases that demonstrate how advanced response capabilities are being used to reduce dwell time, contain threats, and protect organizations in real time. Questions are more than welcome.

Key Takeaways:

  • What “Big R” means in the context of modern MDR
  • How CyberMaxx integrates SentinelOne EDR into its threat response workflows
  • Real-life customer scenarios showcasing effective threat mitigation
  • Proactive, response-centric MDR strategies

Transcript:  read the full transcript here.

The post On-Demand Webinar: The Value of R with SentinelOne appeared first on CyberMaxx.

]]>
Modern MDR: Focused on Response with SentinelOne https://www.cybermaxx.com/resources/modern-mdr-focused-on-response-with-sentinelone/ Thu, 28 Aug 2025 19:16:06 +0000 https://cybermaxx2021.wpengine.com/?p=8979 Overview Join our webinar focused on how CyberMaxx leverages SentinelOne to prioritize rapid response and get you out of your worst day. Join experts from CyberMaxx and SentinelOne as they discuss the real-world impact of “Big R Response” – a proactive approach that goes beyond alerting to drive true cybersecurity outcomes. It’s key to provide […]

The post Modern MDR: Focused on Response with SentinelOne appeared first on CyberMaxx.

]]>
Overview

Join our webinar focused on how CyberMaxx leverages SentinelOne to prioritize rapid response and get you out of your worst day.

Join experts from CyberMaxx and SentinelOne as they discuss the real-world impact of “Big R Response” – a proactive approach that goes beyond alerting to drive true cybersecurity outcomes. It’s key to provide your security team with more than just tools, but real-time support that prioritizes rapid response and gets them out of their worst day quickly.

In this session, Zack Hoffman (CyberMaxx) and Jay Ryerse (SentinelOne) dive into how CyberMaxx utilizes SentinelOne’s best-in-class EDR platform as a cornerstone of its Managed Detection & Response (MDR) strategy. The conversation will share practical use cases that demonstrate how advanced response capabilities are being used to reduce dwell time, contain threats, and protect organizations in real time. Questions are more than welcome.

Key Takeaways

  • What “Big R” means in the context of modern MDR
  • How CyberMaxx integrates SentinelOne EDR into its threat response workflows
  • Real-life customer scenarios showcasing effective threat mitigation
  • Proactive, response-centric MDR strategies

Who Should Attend

Security leaders, SOC managers, CISOs, IT professionals, and anyone interested in advanced threat detection and response strategies.

Details

Event Location: Virtual Webinar Link
Date: Wednesday, September 10, 2025
Time: 1:00 p.m. EDT

Spots are limited, so RSVP today! More details will be shared upon RSVP confirmation.

The post Modern MDR: Focused on Response with SentinelOne appeared first on CyberMaxx.

]]>
Ransomware Research Report | Q2 2025 – Audio Blog Interview https://www.cybermaxx.com/resources/ransomware-research-report-q2-2025-audio-blog-interview/ Thu, 24 Jul 2025 17:42:12 +0000 https://cybermaxx2021.wpengine.com/?p=8878  The CyberMaxx team of cyber researchers conducts routine threat research independent of client engagements. The purpose of our research is to help foster collective intelligence among the cybersecurity community. While conducting their research, the team discovers and analyzes ongoing ransomware attacks occurring in the wild. Review Q2’s research here. Video Transcript Introduction Ransomware activity […]

The post Ransomware Research Report | Q2 2025 – Audio Blog Interview appeared first on CyberMaxx.

]]>

The CyberMaxx team of cyber researchers conducts routine threat research independent of client engagements. The purpose of our research is to help foster collective intelligence among the cybersecurity community.

While conducting their research, the team discovers and analyzes ongoing ransomware attacks occurring in the wild.

Review Q2’s research here.

Video Transcript

Introduction

Ransomware activity in Q2 of 2025 showed a significant decline compared to the previous quarter. We observed a total of 1488 successful ransomware attacks between April 1st and June 30th, compared to the 2461 we observed in Q1. This represents a 40% decline in activity. Despite the reduction, ransomware remained a persistent threat, with an average of one successful attack occurring approximately every 87 minutes during Q2.

We observed a total of 75 ransomware groups operating within Q2, up from 74 in Q1. There appears to have been a focus on sectors with sensitivity to operational disruption this quarter – healthcare, manufacturing being two of the top three industries hit – along with education, government and energy all showing growth as well, to a smaller degree.

Qilin is the threat actor with the most successful ransomware attacks this quarter – with 176 total, followed by Akira with 139 and Play with 124. Qilin was most active within the healthcare industry and technology sectors.

While Cl0p was extremely active last quarter, they have not been as active recently – this may be due to them still working through the backlog of victims from exploting Cleo Harmony back in February.

Lockbit Updates

In recent months, two major ransomware groups were quietly hacked, and both attacks featured the same message: “Don’t do crime, xoxo from Prague.” No one has come forward to take responsibility.

In April, the Everest groups leak site was defaced, and then in May Lockbits affiliate panel was also updated with the odd message. The lockbit breach also leaked internal data and crypto wallet addresses.

Theories are circulating that it may have been a rival gang or law enforcement, however no one has officially taken credit for either attacks, which are very likely by the same individual (or group!).

HealthCare

Between April 1 and June 30, 2025, the healthcare sector experienced 95 ransomware attacks, making it the third most targeted industry during this period, following Manufacturing and Tech at 157 and 136 respectively.

Across the broader ransomware landscape, a healthcare organization is now hit with a successful attack roughly every 22 hours. Groups like Qilin and others continue to exploit healthcare’s operational urgency pressuring victims to pay quickly to avoid disruptions to patient care or data exposure.

The impact of each incident tends to be disproportionately high compared to other industries; leading to care delays, system outages, and regulatory complications.

Qilin:

Qilin have been the most prolific group this quarter, primarily targeting high-impact and operationally critical industries.

Manufacturing led all sectors, followed by Technology and Healthcare, reflecting Qilin’s focus on data-sensitive and disruption-prone environments. Transportation/Logistics and Education were also notable targets.

A full breakdown of their operational target industries can be seen in the full report.

Qilin have demonstrated consistent growth throughout the first half of 2025, with attack volumes rising steadily each month. Starting with a relatively low number of incidents in January, activity nearly doubled by February and remained stable through March and April. A sharp increase followed in May, and June marked the group’s most active month to date, with over 75 recorded attacks.

The vulnerabilities we have observed the group using are as follows:

  • CVE-2023-4966 aka CitrixBleed
  • CVE-2023-27532 in Veeam Backup Credential Access
  • CVE-2025-31161, an authentication bypass in CrushFTP
  • CVE-2025-31324 in SAP NetWeaver (which interestingly was exploited at least 3 weeks before public disclosure – showing that the group had early access to a 0day).
  • CVE-2025-32756 which allows unauthenticated RCE in several Fortinet products.

The full list of exploited vulnerabilities is also available in the report, along with a breakdown of their currently active infrastructure.

Q2 Conclusion

The second quarter of 2025 marked a complex and transitional period in the ransomware landscape. While overall attack volume declined significantly, threat activity remained widespread, with critical sectors such as healthcare, government, and education continuing to face sustained pressure. Despite the slowdown in raw

numbers, the frequency of attacks and the strategic focus of top ransomware groups indicate that the threat remains both adaptive and persistent.

Qilin emerged as the most active ransomware group this quarter, steadily increasing its operations and overtaking previously dominant group such as Cl0p. Their consistent targeting of high-impact industries, exploitation of newly disclosed vulnerabilities, and technical adaptability demonstrate a clear evolution in capability and reach. At the same time, the temporary absence of Cl0p from top rankings despite its history of impactful, exploit-driven campaigns highlights the cyclical and opportunistic nature of ransomware group activity.

Sectors like healthcare continue to experience frequent and damaging incidents, underscoring the need for targeted resilience strategies. Meanwhile, the recent breaches of ransomware infrastructure such as the defacements of Everest and LockBit hint that threat actors themselves are not immune to disruption, though the sources of these countermeasures remain unknown.

In summary, Q2 2025 presented fewer attacks overall, but increased complexity in attacker behavior, tooling, and targeting. Organizations must remain proactive, adaptable, and intelligence-driven in their defensive strategies as ransomware continues to evolve.

Read the full report.

The post Ransomware Research Report | Q2 2025 – Audio Blog Interview appeared first on CyberMaxx.

]]>
EDR & MDR https://www.cybermaxx.com/resources/edr-mdr/ Wed, 25 Jun 2025 18:05:19 +0000 https://cybermaxx2021.wpengine.com/?p=8746 Demystifying Cyber: EDR & MDR In this video series, we’re here to peel back the curtain and show how the “tricks” in cyber are done so we can all have a better understanding. Tom Pioreck, CyberMaxx’s CISO, will be diving into all things EDR & MDR. In this episode of “Demystifying Cyber,” we’ll unlock the […]

The post EDR & MDR appeared first on CyberMaxx.

]]>
Demystifying Cyber: EDR & MDR
In this video series, we’re here to peel back the curtain and show how the “tricks” in cyber are done so we can all have a better understanding.

Tom Pioreck, CyberMaxx’s CISO, will be diving into all things EDR & MDR. In this episode of “Demystifying Cyber,” we’ll unlock the mystery and clear the confusion surrounding EDR & MDR.

For your convenience, we’ve included a transcript of the 17-minute episode below. Feel free to watch the video on YouTube.

Transcript

Organizations keep hearing that they need to detect and respond, and EDR, or a trusted MDR provider, is one of the best ways to do that.
That’s all well and good, but what do EDR and MDR mean? What does an organization need to know and consider when determining which option is the better choice for them?

If security professionals keep saying EDR should be a standard part of our security program, then it’s probably a good idea if we understand the abbreviation, the terms it contains, and what we’re really saying when we talk about EDR and MDR.

Hello, I’m Thomas Pioreck, cybersecurity professional with close to 20 years in the industry and self-professed most paranoid person in the room. On this episode of Demystifying Cyber, we define EDR, MDR, and considerations for which one to select as an organization.

The famed author, Arthur C. Clarke had three laws when it came to science fiction, his third law is, “any sufficiently advanced technology is indistinguishable from magic.” We’re here to peel back the curtain and show how the “tricks” in cyber are done, so we can all have a better understanding. This, is “Demystifying Cyber.”

EDR and MDR. In a world of abbreviations, what’s two more? If EDR and MDR are so similar, which seems to be the message out there, then why the need for both terms? Let’s start by breaking down the abbreviations, EDR and MDR.

And since both have “D” and “R,”, let’s start there. The good news is that the D and the R have the same meaning in each abbreviation. The D is for “Detection” and the R is for “Response.” So, that’ll help keep things a little simpler. We will get into what each term means a little later, but what about the E versus the M?
E is for Endpoint. Just like C is for Cookie. Endpoint, endpoint, endpoint start with E. Well, that’s simple enough, isn’t it. Hmm? What’s an Endpoint? Yeah, that’s a good question.

We kind of just throw the term “endpoint” out there and figure everyone knows exactly what we’re referring to when we say “endpoint.”
There’s mostly two different ways people interpret the term “endpoint” and that can create confusion when we’re talking about EDR.

The broadest definition of an endpoint is, “any device that operates within your corporate environment.” And that really means any device; mobile phone, tablet, servers, desktops, switches, laptop, point-of-sale systems, automated inventory systems, smart TV, smart fridge, smart coffee maker (a critical asset, if ever there was one), an “endpoint” is anything and everything.

When we ask an organization about asset inventories and we ask them to account for all of their endpoints, this is the breadth we want you to consider and document. Generally, though, when a company is considering EDR (and this applies to MDR too), we tend to narrow the scope just a bit.

Your EDR “endpoints” really comes down to computers, whether laptop, tower, or desktop, and your servers, physical or virtual. Why such a narrow scope? The reason is what’s available on the market as of this recording. It’s these endpoints that have available agents that are tried and true. Yes, some solutions on the market have an agent for phones and tablets, and depending on what runs your point-of-sale system, an agent for that, maybe an agent for a smart device, like that TV in the boardroom, but they don’t have the operational history like the agents for servers and computers do.

Let’s take that term “agent.” That word gets thrown around a lot too. Single agent, agentless, consolidated agent, call my agent, almost all solutions out there have some kind of “agent” associated with them. Even AI is getting in on the game with “agentic AI.” So, what’s an agent?

Let’s say you’ve decided to go with an EDR solution, which we’ll just call The Farm. The main component, the brains if you will, exists as some kind of central headquarters. That headquarters could be something you build, install, and run in your own data center, or it could be a cloud-platform solution, often called the “console,” that The Farm provides.

That console is where all the data and information is visible to you. It’s where you login to see data, alerts generated and where you go to triage those alerts, set your configurations, the real functional aspect. All of the intelligence you’re gathering comes back to this central location. It serves as a central intelligence hub. Here’s where central intelligence’s agent comes in.

The agent works for The Farm. Its job is to monitor what happens on the single endpoint it’s been deployed to and report back on all the activity that it sees, so that modules within The Farm can perform an analysis and decide if what it’s seeing is “suspicious, malicious,” or “benign.” The agent is basically a small piece of software that gets deployed on every endpoint. Once it’s deployed, it’s perma-linked to that endpoint and reports back to headquarters, or the mothership, so to speak, pretty much in real-time. Agents can function on their own, but their operating parameters are defined by the mothership, kind of like the alien ships in Independence Day.

So now I have an agent deployed on the servers and computers, my “endpoints,” that operate across my environment. The activity that occurs on each endpoint reports back to the console, where the “magic” happens. Congratulations, you’ve implemented the first step in monitoring your environment. You are getting insight into the activity that is occurring on each endpoint and can be alerted when malicious, or at least suspicious, activity is Detected.
And that’s the D in EDR. Detection. By being able to ingest the activity and analyze it, we’re then able to detect unwanted behavior. There’s a bit more that happens than just “detecting” though.

EDR systems have some form of alerting or notification whenever something is detected that you need/want to be aware of, see what’s really going on. So the D for Detect really has a silent N for Notify or silent A for Alert.

Great, so I’ve monitored, detected, and been notified, but I want to do something about it. That activity you alerted me to is bad, make the bad thing stop, I need to Respond to the bad thing. I don’t want to be aware that it’s happening and just sit there while it wreaks havoc on my company, I want to Respond. And there’s our R.
R is for Response. You want to be able to Stop the activity. You’ll hear the word “Kill” used here a lot with EDR vendors. You can set parameters where the EDR solution itself will Kill and/or Quarantine (exactly what you think it means) that activity or process. The really cool part is you can set a lot of the Response actions to happen automatically within the system and not give up manual review or human decision–making.

If the system seems to be killing too many legitimate actions just because they seem sketchy, you can tune its behavior. Or tell it to alert you but take no further action until you tell it to do so.

Most EDR solutions can isolate that endpoint. Meaning, nothing that’s happening on that one endpoint can get to any other system on the network or even anywhere on the Internet. The only communication an isolated endpoint can have is back to the mothership. The endpoint can only phone home. So, we have any number of response capabilities ready for us to implement now.

Ok, that’s EDR in a nutshell, so what’s MDR? The D and the R are the same, Detection and Response. The M is for Managed, so MDR is Managed Detection and Response. So, what’s the difference between EDR and MDR? The difference lays in who manages the solution.
See, MDR is really Managed EDR. You select a vendor to manage the EDR solution that’s been implemented. The functionality of the EDR doesn’t change, it’s the same for EDR and MDR, but with MDR, you’re offloading the management of the system to a trusted security partner. And that partner is usually an MSSP, a Managed Security Service Provider, specifically an MDR vendor. Notice the M means the same thing in MDR and MSSP? That’s how you can remember the connection and meaning, plus the difference between MDR and EDR.

Your next question is likely, is EDR or MDR better for my organization? That’s a fair question. And it may seem like a simple question of do I want to outsource it or do I want to run it in-house? There’s actually a lot that goes into that decision.

Managing an EDR is a 24/7 job. That’s just the time. That whole Detection component? It requires constant tuning and maintenance, tweaking it until you find that perfect sweet spot where the alerts you’re getting are mostly just the signal amongst the noise. The cyber world changes so rapidly that your tuning is never truly complete. You’re always going back and tuning as the threat landscape changes, as new attack techniques are identified and shared, as your business evolves and changes. Once you have the system tuned, you still need to investigate each alert that is generated for risk and actual legitimacy.

And you can’t do any of that without staffing, and staffing means a knowledgeable team of professionals that have experience and can put items in context. Folks that can really apply critical thinking to the deluge of notifications and intelligence that all these solutions present.

Think of it like this. You own a home. Not an especially large home, but what most folks think of when they think of a typical American home in the suburbs. That home has a lawn, likely some bushes, maybe even a couple of flower beds. You want your home to have a beautiful yard. Well, that means mowing, edging, weeding, and pruning. That’s just the regular maintenance you have to do every week. Then there’s knowing when to plant, managing the soil, being able to identify crab grass, grubs, rot, plant infections or whatever they’re called, knowing when to plant what plants at what time of year, in what soil and maintain the pH of that soil, in a location where they’ll get the right amount of sunlight and shade. That’s a lot of work, a lot of time, and a lot of knowledge you need to have or obtain. Can you really afford to do all that yourself AND have the outcome you want? Oh, and have time for the myriad of other things going on in your life?

Like many suburban homeowners, you’d likely hire a landscaping service. Professionals who have the experience and know the answers to those questions, who can recommend treatments, how to plant and what to plant, lay new seed, mitigate the grubs and other bugs, identify when foliage seems to have become infected and treat it, recommending future steps to avoid it from happening. And when they do the maintenance, the mowing, the edging, the pruning, they know just how to do it, so that the yard remains and looks healthy. Trusting them to carry out that work means you get two things. One, you feel better knowing that this thing of importance to you, your yard’s health, is entrusted to professionals with years of experience. And second, you free up your time that would be spent performing these tasks and research to gain the knowledge required to achieve the results desired, to focus on other areas of importance for your life. You’re gaining in two places, not just one.

That, admittedly somewhat loosely, is what you get when you elect to go with an MDR to implement an EDR solution. And just like with the landscaper, there are additional costs when you do it yourself that you incur when trusting it to experienced professionals.

All that equipment that landscapers use, you would need to buy for yourself. That includes the fuel, replacement blades, sharpening the blades, pruners, trimmers, edgers, seed, insecticide, plant formula, all of it. Those costs recur; they don’t go away. Same is true with implementing your own EDR. All the tools, watchlists, implementations, API’s, workstations, sandboxes, all the utilities that you may not even think of, are a recurring cost. And that doesn’t cover the cost of staffing and training that you would have to incur. Plus, you get the benefit of all the knowledge they gain from working on all the other houses that they service, which allows them to see and diagnose potential issues faster or make recommendations to get ahead of an issue they’ve encountered at another home recently. They’re aware of trends because it’s just a part of what they do. Of course, that will all depend on the value that they provide. Are they doing the bare minimum, mow, trim, prune, preseason clean, postseason clean? Or are they a committed partner? I know which one I’d prefer.

Endpoint Detection Response, EDR, and Managed Detection Response, MDR, are an integral component of what we call, “Continuous Security Monitoring.” Real-time insights, data points for correlation and aggregation, and ability to respond to threats as they’re occurring, a lot of times at the point of attempted entry, before they get to taking action within a system. Frankly, in today’s business world, having them is table stakes. Insurance carriers will ask if you’ve deployed them, your partners will ask about it, and many of your clients and prospects will ask about it. The days of rolling out an antivirus solution alone are over. Going back to our suburban home analogy, having an alarm system is pretty much the same thing. It doesn’t mean we stop putting locks on the doors and windows, it just means that we acknowledge that times have changed, and having someone be able to monitor our valuable assets for us 24/7 is a must-have. And we trust a service provider to enhance the capability and manage the monitoring, detection, and response for us. Think about it, do you really want to, can you really afford to, monitor and respond to your doorbell camera every time it goes off? 24/7?

And hopefully now you have a better understanding of what everyone means when they’re talking about EDR and MDR, what they provide you, and how they differ when you’re determining which is the best option for your organization. I think EDR is incredibly vital to a security program and hope you do now too.

Until next time, I’m Thomas Pioreck for Demystifying Cyber.

The post EDR & MDR appeared first on CyberMaxx.

]]>
On-Demand Webinar: Improving Healthcare Cybersecurity So Patient Data Doesn’t End Up on the Dark Web https://www.cybermaxx.com/resources/on-demand-webinar-improving-healthcare-cybersecurity-so-patient-data-doesnt-end-up-on-the-dark-web/ Wed, 07 May 2025 20:29:43 +0000 https://cybermaxx2021.wpengine.com/?p=8592 Watch this insightful webinar where we delve into the world of healthcare cybersecurity, including the alarming rise of ransomware attacks in healthcare systems, examples of real-world healthcare data compromise, and effective strategies you can put in place to safeguard your data. Hosted by CyberMaxx and HS-ISAC, this session will provide context and stories from cybersecurity […]

The post On-Demand Webinar: Improving Healthcare Cybersecurity So Patient Data Doesn’t End Up on the Dark Web appeared first on CyberMaxx.

]]>
Watch this insightful webinar where we delve into the world of healthcare cybersecurity, including the alarming rise of ransomware attacks in healthcare systems, examples of real-world healthcare data compromise, and effective strategies you can put in place to safeguard your data.

Hosted by CyberMaxx and HS-ISAC, this session will provide context and stories from cybersecurity experts and healthcare customers, validating the real-world impact of cyber threats happening daily, targeting medical and dental organizations of all sizes.

This webinar will cover the following:

  • The Dilemma: Understand the critical data points and statistics highlighting the increase in ransomware attacks targeting healthcare institutions.
  • Expert Perspectives: Discover our official stance on essential cybersecurity measures, including adopting Zero Trust architecture and Multi-Factor Authentication (MFA).
  • Real-Life Stories: Hear from a cybersecurity healthcare professional who will share firsthand experiences and challenges faced in protecting patient data.
  • Tactical Insights: Gain practical advice from security experts on implementing robust cybersecurity tactics.

The post On-Demand Webinar: Improving Healthcare Cybersecurity So Patient Data Doesn’t End Up on the Dark Web appeared first on CyberMaxx.

]]>
Webinar: Improving Healthcare Cybersecurity So Patient Data Doesn’t End Up on the Dark Web https://www.cybermaxx.com/resources/webinar-improving-healthcare-cybersecurity-so-patient-data-doesnt-end-up-on-the-dark-web/ Tue, 25 Mar 2025 19:26:59 +0000 https://cybermaxx2021.wpengine.com/?p=8411 Join us May 7th, 2 PM EST for an insightful webinar where we delve into the world of healthcare cybersecurity, including the alarming rise of ransomware attacks in healthcare systems, examples of real-world healthcare data compromise and effective strategies you can put in place to safeguard your data. Hosted by CyberMaxx and HS-ISAC, this session […]

The post Webinar: Improving Healthcare Cybersecurity So Patient Data Doesn’t End Up on the Dark Web appeared first on CyberMaxx.

]]>
Join us May 7th, 2 PM EST for an insightful webinar where we delve into the world of healthcare cybersecurity, including the alarming rise of ransomware attacks in healthcare systems, examples of real-world healthcare data compromise and effective strategies you can put in place to safeguard your data.

Hosted by CyberMaxx and HS-ISAC, this session will provide context and stories from cybersecurity experts and healthcare customers, validating the real-world impact of cyber threats happening daily, targeting medical and dental organizations of all sizes.

Date, Time: May 7th, 2 pm ET.

Attend live, or register for on-demand here.

 

 

The post Webinar: Improving Healthcare Cybersecurity So Patient Data Doesn’t End Up on the Dark Web appeared first on CyberMaxx.

]]>
A Few MDR Case Studies: On-Demand Webinar https://www.cybermaxx.com/resources/a-few-mdr-case-studies-on-demand-webinar/ Tue, 28 Jan 2025 15:23:34 +0000 https://cybermaxx2021.wpengine.com/?p=8238 During this 30-minute webinar, Neil McCann and Steve Wilson, CyberMaxx Sales Engineers, will be reviewing and discussing several common case studies our clients have experienced. While we won’t be sharing the client for obvious reasons, we will be diving into the issues, the solutions, and how we tackled these challenges. We will also cover the […]

The post A Few MDR Case Studies: On-Demand Webinar appeared first on CyberMaxx.

]]>

During this 30-minute webinar, Neil McCann and Steve Wilson, CyberMaxx Sales Engineers, will be reviewing and discussing several common case studies our clients have experienced.

While we won’t be sharing the client for obvious reasons, we will be diving into the issues, the solutions, and how we tackled these challenges. We will also cover the process from detection or alert to resolution. They will also dive into the importance of the human element of MDR, and why a 24x7x365 SOC is critical to quick resolutions.

This webinar covers the following topics:

  • Malware Detections, ransomware, abnormal traffic, and business email compromise
  • MDR overview
  • How to get to resolution fast

The post A Few MDR Case Studies: On-Demand Webinar appeared first on CyberMaxx.

]]>
Building a Strong Cybersecurity Foundation: What Every Business Should Know https://www.cybermaxx.com/resources/building-a-strong-cybersecurity-foundation-what-every-business-should-know/ Tue, 14 Jan 2025 13:00:35 +0000 https://cybermaxx2021.wpengine.com/?p=8170 As cyber threats evolve and the number of active ransomware groups continues to increase, corporate cybersecurity has become a necessity for most organizations worldwide. This article will cover key topics discussed in the SecureWorld webinar, which provides insights into essential strategies. It also discusses the growing importance of corporate cybersecurity strategies and the role of […]

The post Building a Strong Cybersecurity Foundation: What Every Business Should Know appeared first on CyberMaxx.

]]>
As cyber threats evolve and the number of active ransomware groups continues to increase, corporate cybersecurity has become a necessity for most organizations worldwide.

This article will cover key topics discussed in the SecureWorld webinar, which provides insights into essential strategies. It also discusses the growing importance of corporate cybersecurity strategies and the role of a cybersecurity cost-benefit analysis.

The Cost-Benefit of Basic Cybersecurity Measures

Following foundational cybersecurity practices provides long-term value for businesses by preventing significant financial and operational losses. A cybersecurity cost-benefit analysis can help your organization weigh the potential cost of a cyberattack against the expense of implementing cybersecurity measures.

Why Basic Measures Are Cost-Effective

Many organizations refrain from implementing basic cybersecurity measures in an attempt to save money. However, implementing these measures typically saves more in the long term by reducing the risks of breaches and subsequent damages.

There have been many instances in which breaches have escalated as a result of organizations failing to implement basic security measures. For example, the WannaCry ransomware attack in 2017 spread so widely because so many organizations failed to install the required security patches.

Other organizations have implemented such measures to minimize damages. For instance, Yahoo’s use of two-factor authentication helped to reduce the damage of the 2013 Yahoo data breach, which affected over three billion accounts.

Risk Reduction with Minimal Investment

Even the most basic cost-effective practices can help address vulnerabilities and significantly reduce the risk to organizations.

For instance, regular software updates ensure that vulnerabilities are patched before attackers can exploit them. Employee training programs can instill a culture of cybersecurity awareness and teach employees to set strong passwords and recognize phishing emails. Additionally, implementing proper access controls ensures that only authorized users can access sensitive data. The cost of implementing these features is a fraction of the cost of addressing a breach.

Offensive Tactics in Corporate Cybersecurity

We are currently witnessing a shift towards proactive cybersecurity, with offensive cybersecurity tactics gaining traction in corporate strategies.

Understanding Offensive Cybersecurity Tactics

An “offensive” cyber strategy takes proactive measures to identify potential threats and vulnerabilities before attackers can exploit them. That contrasts with a defensive strategy, which is reactive and involves creating barriers designed to prevent successful attacks and only responds to attacks after they occur. At CyberMaxx, we believe that in order to build the strongest defense, you need to think like an adversary and harness offensive tactics.

Examples of Offensive Cybersecurity Tactics

Penetration testing, in which security experts attempt to find vulnerabilities and exploit them, is an offensive tactic. Another example is red teaming, which is when a group of security experts simulates a non-destructive cyberattack against an organization. Organizations frequently use these strategies to identify and mitigate potential risks preemptively.

Benchmarking Cybersecurity Program Costs

Budgeting cybersecurity effectively is vital. Organizations typically create budgets based on risk and industry standards.

Different Benchmarking Methods

Organizations set cybersecurity budgets by using IT budget percentages, compliance needs, and industry risks. Budgeting flexibility depends on the size of the organization and its specific needs.

Small businesses with smaller budgets and lower risks may allocate only a small portion of their budgets to cybersecurity. Meanwhile, large organizations and those in high-risk sectors may allocate more of their budgets.

Organizations operating in industries that face high regulations, such as those across healthcare, finance, and government, may need to comply with higher standards. For this reason, they may allocate more of their budgets toward cybersecurity.

Balancing Cost with Risk Management

Organizations can adjust their cybersecurity investments as threats evolve, and their risk profiles change. For instance, if the organization expands or introduces new technologies, it may need to increase its cybersecurity budget. Alternatively, threat intelligence feeds or risk assessments may suggest an increased risk.

As emerging threats become more sophisticated and automated, organizations must increase their cybersecurity investments. It is becoming increasingly valuable for organizations to invest in proactive threat mitigation to avoid financial strain later.

The Role of DSPM in Corporate Security

Data Security Posture Management (DSPM) enhances data security by continuously monitoring and assessing data posture.

What is DSPM?

Organizations use Data Security Posture Management (DSPM) to monitor and improve their data security. DSPM provides continuous data monitoring and detects risks automatically. This strategy reduces risks and helps organizations increase their security levels. DSPM also allows organizations to meet compliance standards by automating auditing and risk assessments.

Real-World Application of DSPM

An organization can use DSPM in many ways to detect data vulnerabilities. It can scan an organization and automatically identify and classify data to prioritize security measures and ensure that high-risk data is adequately protected.

DSPM can also monitor data flows to detect unexpected behavior that could signal vulnerabilities or gaps in data protection policies. By flagging these in real time, the organization can fix them before they escalate and become critical.

When to Consider New Cybersecurity Solutions

There are several that indicate an organization should explore new cybersecurity tools or strategies.

Indicators for New Cybersecurity Needs

A high frequency of attacks is the most obvious sign that an organization should explore new cybersecurity strategies. It is a significant indicator that the current defenses are no longer sufficient.

Regulatory shifts may also make an organization’s existing cybersecurity defenses inadequate. This issue can put the organization at risk of non-compliance, which can result in severe reputational damage, financial penalties, and legal liabilities.

New technologies can also introduce new threats. For instance, developments in AI mean cybercriminals are finding ways to automate attacks and carry out more sophisticated phishing campaigns.

Staying Agile in a Dynamic Threat Landscape

Cybercriminals use technological advances to develop new attack methods. It is vital to stay adaptive to evolving threats to keep your organization secure and ensure you’re always one step ahead.

There are several ways to stay informed on the latest cybersecurity developments. For instance, information-sharing intelligence centers and threat networks provide industry-specific insights into the latest threats. In addition, cybersecurity news websites, such as The Hacker News, and company blogs, such as the CyberMaxx blog, regularly share insights into the latest research and trends.

The Importance of Corporate Cybersecurity Strategies

Protecting your organization from threats requires a balanced, proactive security approach that includes basic measures, offensive cybersecurity tactics, and ongoing evaluations. While the initial cost of these cybersecurity measures may seem high, it is often worth it in the long run.

Watch the full SecureWorld webinar to gain even more insights into building a strong cybersecurity foundation for businesses.

The post Building a Strong Cybersecurity Foundation: What Every Business Should Know appeared first on CyberMaxx.

]]>