On-Demand Webinars

The Syncurity SOAR Platform and SOAR 2.0

When:Thursday, July 18th, 2019 at 11:00am ET

About this webinar

  • What is SOAR 2.0?
  • Introduction to the Syncurity SOAR Platform
  • Enterprise & Service Providers Benefits
  • Case & Knowledge Management
  • Integrations & Use Cases

Social Engineering, Phishing and Protecting the Enterprise


About this webinar

This webinar is part of the 2019 Trends and Predictions series on BrightTALK.

Join top security leaders for an interactive discussion on how to better secure the enterprise in 2019:

– Top threats on the horizon and what’s at risk
– Cyber defenses and your employees
– Basic cyber safety recommendations to protect against social engineering, phishing and email cyber attacks
– Use cases and examples
– Actions to take today to protect your employees and enterprise from cyber criminals
– What to expect in 2019


– John Bambenek, VP Security Research & Intelligence, ThreatSTOP
– JP Bourget, Founder & Chief Security Officer, Syncurity
– Jan Liband, CMO, SlashNext

Using Syncurity IR-Flow SOAR Platform to Contain and Identify Threats Faster with Cisco Security


Live Webinar October 19, 2018 at 1:00pm Eastern Time / 10:00am Pacific Time

The combination of Cisco AMP for Endpoints, Threat Grid and Umbrella provide compelling protection and visibility into your organization’s cyber risk. But adversaries are stealth, and are not always easy to spot. We’ll demo how the Syncurity IR Flow SOAR platform integrates to these key Cisco Security solutions; by checking AMP for Endpoints for presence of a suspicious file, sending the file to Threat Grid for analysis, extracting IOCs from that analysis and updating blocks for URLs in Umbrella, to accelerate the Triage and Containment/Remediation in the SOC.

Developing and Testing an Effective Incident Response Program



Now Available On Demand

If your organization doesn’t have a plan for handling a major data breach, you’re already in trouble. In order to swiftly and effectively respond to a cyber compromise, you must develop a program for first response in the data center, and downstream response in the business units and in the public eye. This session offers some guidance on how to build an incident response plan that can identify and repair compromises as quickly as possible — and how to test and practice that plan so that you’re ready for the real thing.

Attend this course and you’ll learn:

  • The fundamental parts of any incident response plans, and get a breakdown of the leading cyber IR frameworks
  • Who should be on your incident response team
  • multiple methods to test your incident response procedures, before you need them, (and how often they need to be practiced)
  • how to measure the effectiveness of your incident response plan


Featured Speakers

  • Sara Peters, Dark Reading Senior Editor
  • Andy Jordan, Senior Security Associate, Bishop Fox
  • John Jolly, President & CEO, Syncurity

Shrinking Attack Dwell Times – A Phishing Case Study Demo

Security Operations team struggle to quickly prioritize their alert queues to find true positives and rapidly respond to minimize damage. Quickly finding the alerts that represent real attacks presenting the most risk, is key to reducing business disruption as attack surface increases with cloud and mobile, and alert surface increases with new tools like EDR. This session will demonstrate a practical approach to accelerate this process through thoughtful automation and risk scoring using a user-submitted phishing email use case. Attendees will see how the attack dwell time can be compressed using a Security Automation & Orchestration platform, that leverages the existing security stack and SOC tribal knowledge.


Speaker Bios:


John Pescatore

John Pescatore joined SANS as director of emerging security trends in January 2013 after more than 13 years as lead security analyst for Gartner, 11 years with GTE, and service with both the National Security Agency, where he designed secure voice systems, and the U.S. Secret Service, where he developed secure communications and voice systems “and the occasional ballistic armor installation.” John has testified before Congress about cyber security, was named one of the 15 most-influential people in security in 2008 and remains an NSA-certified cryptologic engineer.


JP Bourget

JP Bourget, Founder and Chief Security Officer of Syncurity, has more than 10 years of experience in cybersecurity. With a passion to bring solutions to cyber security teams that saves time and makes life easier, JP works with Syncurity’s customers and market influencers to drive adoption of the company’s flagship IR-Flow platform. Prior to co-founding Syncurity, JP was a Network Security Manager at a $200 million global manufacturing company, where he redesigned the enterprise network, systems and security architecture from the ground up to better align with business needs and uptime requirements. He also previously served as an adjunct professor at Rochester Institute of Technology, teaching undergraduate classes in Network Security and Forensics. JP has a MS in Computer Security and Information Assurance and a BS in Information Technology from Rochester Institute of Technology and also has a bunch of those alphabetical things called Certs.

Trends in Fintech Security – Mobile Payment Apps, Risks & Cybersecurity

Fintech may still be in its early stages, but it’s seen tremendous growth and is expected to see global investments exceed $150 billion in 2017. With the proliferation of mobile apps, cybersecurity is extremely important. Trust is a key difference maker for customers, so fintech companies need to ensure that their sensitive client information stays secure.

RSA 2017: JP Bourget on Top Cyber Challenges for 2017

JP Bourget, Chief Security Officer of Syncurity, provides an in-depth conversation on the current state of information security, today’s threatscape and a discussion on the cyber industry. Topics up for discussion, include what’s to be learnt from the Yahoo breach revelations, cyber security and how it’s moved into the political sphere, the supposed Russian Hack of the US Elections and what it means for Cyber Warfare, the top challenges for US cyber teams in 2017, and trends in the threatscape, threat actors and motives.

On-Demand Webinar: Addressing Security Analyst Fatigue in the SOC

This talk provides a look into the fatigue that we’ve observed in operating and managing security operations teams. We look at some of the causes, indicators, costs and prevention techniques to help internal Incident Response (IR) and security teams be more effective. In this on-demand webinar we explore solutions like tooling, cross-training, continuous rotations and explain the benefits of these approaches and why you should rethink how you run your SOC/CIRT/MSSP.