0 Results Found
              Back To Results
                Webcasts

                How the Counter Threat Unit™ Sets Secureworks Consulting Services Apart

                Hear a panel of our technical and strategic consultants as they review lessons from the field

                How the Counter Threat Unit™ Sets Secureworks Consulting Services Apart
                Speaker: Panel of Secureworks Information Security Strategic and Technical Consultants
                Recorded :
                Duration: 60 mins

                As the scope for security skill and expertise demanded of organizations extends, CISOs are increasingly turning to security consulting partners for strategic guidance and technical and advisory expertise.

                There are a broad range of organizations in today’s market offering security consultancy services based on best practices and standard frameworks. Partnering with one of these firms can provide your organization with the technical expertise to improve network visibility and gain a clearer understanding of your vulnerabilities, provide the strategic and practical guidance that helps you prioritize and build out programs that enable business objectives, as well as advise on how to effectively engage with the C-suite.

                What truly sets Secureworks’ information security consulting services apart is how we utilize our Counter Threat Unit™ and knowledge garnered from thousands of client engagements to ensure you are being consulted on the latest industry trends and threats. This way, the outcome is based on real-world scenarios that matter to your organization.

                Join consultants across our technical and strategic practices as they share lessons learned from their most challenging engagements and the value that real-time threat intelligence has brought to those engagements.

                Key topics discussed include:

                • Examples of real-world engagements where the CTU™ and Consulting Practice improved the outcomes for clients
                • Tools consultants use to ensure that your outcome is based on real-world scenarios and threats that matter to your organization
                • Lessons learned from our most strategic and complex engagements

                Like what you're reading?
                Just a few questions to get started

                Select Role:

                • Board of Directors
                • CEO / CFO / COO
                • CISO / CSO
                • CIO / CTO
                • IT / IS / Security VP/Director
                • IT / IS / Security Manager
                • IT / IS / Security Staff
                • IT / IS / Non-Security
                • Risk / Legal / Compliance / Finance
                • Sales / Marketing
                • Press / Industry Analyst
                • Student

                Select Country:

                • Select an item

                Select State:

                • Select an item

                Select Annual Revenue:

                • ≥ $500M
                • $100-$499M
                • ≤ $100M

                Select Industry:

                • Banking
                • Business Services
                • Credit Union
                • Education
                • Finance
                • Government
                • Health Care (Non-Hospital)
                • Heavy Industry
                • Hospitality
                • Hospitals
                • Insurance
                • Legal
                • Manufacturing
                • Media
                • Membership Organizations
                • Retail
                • Technology
                • Telecom
                • Transportation
                • Utilities
                • Other

                Current Security Environment?:

                • Managing In-House
                • Managing Externally (3rd Party)
                • Blended Model (In-house and 3rd Party)
                • Not sure

                Select Next Security Initiative Timeframe:

                • 0-3 months
                • 3-6 months
                • 6-12 months
                • 12-24 months

                Select Our Greatest Security Challenge:

                • Securing The Cloud
                • Assessing security posture
                • Optimizing Security Operations
                • Protecting critical assets
                • Meeting & maintaining compliance
                • Preventing a data breach
                • Access to actionable security intelligence
                • Access to security expertise
                • Preparing & responding to an incident

                Interested in learning more

                Currently Looking for Assistance With (Select all that Apply)

                Select Best time to call:

                • Early morning (8-10am EST)
                • Late morning (10am-12pm EST)
                • Early afternoon (12-3pm EST)
                • Late afternoon (3-5pm EST)

                SecureWorks News :

                Related Content