Cybersecurity Resource Center | Blog | CRITICALSTART
Learn real world attack and defense strategies with Adversarial Emulation and Active Defense training from TEAMARES
TEAMARES launches Breach Attack as a Service for quick testing whenever your environment changes.
Gain full transparency and reduce alert fatigue with CRITICALSTART's managed SIEM powered by Devo.
Webinar Series | Once More unto the Breach | Lessons Learned from Billion Dollar Breaches

Upcoming Webinars

SIEM Webinar

Why Next Gen SIEM paired with MDR is a game-changer

Webinar Series

Once More unto the Breach


Webinar Series

Once More unto the Breach

About the Series

Cybersecurity breaches can happen for many reasons at companies of any size, and maturity level. Hackers are relentless, and constantly testing the waters to reveal and sneak in through wherever they find vulnerabilities. The list of where vulnerabilities are can be daunting – from endpoints to applications simple human error, and network backdoors that might not be so obvious. No one wants a breach to happen. So, how do you successfully find the right tools, processes and operation to stop breaches from happening?

CRITICALSTART presents a new monthly webinar series, “Once More unto the Breach” – that will take you on an exploratory deep dive into the world of cybersecurity breaches. This series of educational webcasts will present current events, real-world scenarios and use cases to inform on different methods and processes that can effectively be used to stop breaches – led by cybersecurity experts, CISOs and other security leaders.

June 24, 2020
11:00 AM CDT

Uncovering Your Security Blind Spots

How big is your security risk and how do you identify and contain those risks? You may be surprised to learn that there are looming threats you can’t see, and attackers may be enjoying a long dwell time within your system – before you even detect an issue.

Join Quentin Rhoads-Herrera, CRITICALSTART’s Director of Professional Services, on June 24 at 11 am CT, to explore how big your security risk is throughout your organization, and how to uncover those potential blind spots.

In this live session you’ll learn:

  • How to identify potential risk – asset management, risk register development
  • How to build an operation around risk mitigation – how to set up cadence for vulnerability scanning, pentesting, incident response tabletops to gauge your response to a breach
  • How to automate and leverage tools for efficiency across your operation

Watch this webinar on-demand today!

July 22, 2020
11:00 AM CDT

Lessons Learned from Billion Dollar Breaches

Globally, breaches cost organizations billions of dollars every year. In the U.S., losses for each breach average just under $10 million. In 2011, one data management company’s breach is among the most expensive and widely publicized breaches, which created a $4 billion headache for the firm. However, beyond the cost of remediation, breaches also impact an organization’s brand and reputation. After a breach, a company loses an average of 4% of its customer base, while a government entity loses the trust of the citizens using their services.

In examining these breaches, we find ourselves asking, “What did these organizations do right? What could the organizations have done better?”

Join CRITICALSTART with TEAMARES’ security expert, Allyn Lynd, as he shares some first-hand knowledge of the most expensive data breaches in history.  Take a deep dive into what went right and wrong before, during, and after data breaches.

Key takeaways from this webinar include:

  • How to prepare for a breach
  • What to do once a breach occurs
  • How to recover from a breach in the long term
  • What mistakes to avoid if/when a breach does occur

Save your seat – register today!

August 26, 2020
11:00 AM CDT

Impact of Zero Day Exploits on Breaches

Organizations are losing the endpoint security battle against new or unknown zero-day attacks. A recent Ponemon Study on endpoint security revealed that 68% of IT security experts say their company experienced one or more endpoint attacks that compromised data assets or IT infrastructure in 2019. Of those breaches, 80% were zero-day attacks – with the frequency of zero-day attacks expected to increase to 42next year. These exploits frequently go beyond just endpoints. Some of the most impactful vulnerabilities announced in 2020 deal with externally facing network appliances such as firewalls, routers, VPN concentrators, and other devices.  

While there is no way to prevent zero-days, there are steps you can take to reduce the impact and/or severity of security incidents whether or not zero-days are involved.  

To find out how you can shore up vulnerabilities, join CRITICALSTART’s TEAMARES Cory Mathews, Offensive Security Manager, and Rich Mirch, Senior Adversarial Engineer, for “Impact of Zero-Day Exploits on Breaches,” on Aug. 26 at 11 am CT for the third webinar in our series of webcasts exploring the world of cybersecurity breaches.

Key takeaways from this webinar include:

  • What a zero-day is – and what it is not 
  • Using a zero-day to breach the perimeter and pivoting into sensitive areas within organizations 
  • Challenges and methods in defending against zero-days including patching, defense in-depth, and mature network and endpoint monitoring solution and team 
  • TEAMARES’ vulnerability research team’s success stories of discovering zero-days and developing full Proof-of-Concept exploits 
  • Examples of infamous zero-days and +1-day events such as WannaCry using NSA tools released by the Shadow Brokers 

September 23, 2020
11:00 AM CDT

TEAMARES Red and Blue Series: Exploiting Enterprise Passwords

No matter how much you think you’ve done to safeguard your data and systems against breaches, common vulnerabilities continue to wreak havoc on enterprises. The top of the list of these vulnerabilities is weak passwords. According to a 2019 Verizon Data Breach Investigations Report (DBIR), 80% of hacking-related breaches involved compromised and weak credentials.

Attackers are finding quick access to enterprise domain admins by simply guessing a password and logging in as that domain admin, giving them a foothold and control over your entire infrastructure.

Given these challenges, what can you do to shore up your passwords and protect your organization? Join CRITICALSTART’s TEAMARES security experts, Cory Mathews and Joffrin Alexander, as they present, “Exploiting Enterprise Passwords” on Wednesday, September 23 at 11 am CT. 

From phishing pages to password spraying, you’ll learn how attackers gain access to passwords and what they do with those passwords once they’ve cracked them, as well as:

  • Methods to defend against these attacks specifically focusing on using strong passwords, password manager solutions, and probably most importantly multi-factor authentication.
  • External attacks such as logging in to enterprise solutions such as OWA, VPN, and file shares to maliciously changing passwords to lockout user’s access – and what you can do to prevent these attacks.
  • Proactive defense strategies including how to ensure you’re using strong passwords and how multi-factor can prevent breaches.
  • Internal actions you can take such as limiting excessive admin rights and other preventative measures.

Save your seat – register today!

October 21, 2020
11:00 AM CDT

TEAMARES Red and Blue Series: Best Practices for Securing OT and SCADA Networks

Reduce Your Risk: Best Practices for Securing Operational Technology and SCADA Networks

How vulnerable is your operational technology? In sectors ranging from manufacturing and utilities to transportation and healthcare, automation makes work easier and more efficient. But increased automation brings greater security risks and more opportunities for hackers who are looking to disrupt and exploit OT environments.

In the connected world of industrial Internet of Things, prime OT targets include:

  • Supervisory control and data acquisition (SCADA) networks, a common framework of control systems used in industrial operations to provide services such as water, electricity, and natural gas to cities and communities
  • Distributed control systems (DCS) providing automation in large processing plants and manufacturing facilities
  • Building automation systems that connect heating, HVAC, lighting, and other hardware and software systems.

Join CRITICALSTART’s TEAMARES security experts Allyn Lynd (Blue team) and Chase Dardaman (Red team) on Wednesday, October 21 at 11 am CT for “Reduce Your Risk: Best Practices for Securing Operational Technology and SCADA Networks.”

In this live, one-hour session, you will learn best practices to:

  • Deploy and maintain security for your OT / SCADA devices (spoiler alert: number one is OT/IT segmentation).
  • Design new OT / SCADA systems integrating security from the beginning as opposed to after it has been deployed.
  • Ensure your incident response plan has what it takes to limit damages from breaches.
  • Build your business case to secure approval and funding for new security measures.

You will also discover where the biggest risks are, the motivations of attackers, and where to find more best practices and resources.

Not enough? How about actual use cases of OT / SCADA attacks; Allyn will share from his experience working as an FBI agent.

Save your seat – register today