Q&A with Olivia (Ross) Taylor, Director of CRO at Directive Consulting

Olivia Taylor, Director of CRO at Directive Consulting has 10 years of working experience in graphic designing and has expert knowledge in CRO/UX in landing pages and websites designing.

Olivia was recently nominated for the Orange County Business Journal's Top 25 Women in Business Awards.

MEDIA 7: What’s your superpower?
OLIVIA TAYLOR: I would like to think my superpower is empathy. That’s part of what CRO is: figuring out and understanding what’s going on through people’s minds and finding out what people need and want.

M7: Does it point to user intent, a term generally used in Account Based Marketing?
OT: 
Yes, exactly that. Because I’m able to basically understand where the consumer and the buyer is coming from, I can better optimize my clients’ websites, change that language in the headline and the subhead to relate to the customers’ pain points and better describe the benefits of what my client can provide to them.

M7: Your career spans an impressive 8 years from a Graphic Designer to being a Director of CRO at Directive Consulting. What attracted you to this industry, and how does Directive Consulting fit into your story?
OT:
I became a designer because all other subjects in school were boring. 2+2 will always be 4, but with design, there are so many possibilities - so many different solutions to a problem. Plus, I always loved drawing and creating.
While going to school, I worked as a designer at a few different places. Then upon graduating, I worked at a tech company in-house but it just wasn’t for me. I moved on to an agency that was full-service, but that also was not the right fit. After that job, I ended up at a PPC agency where I learned about CRO. I started there as just a designer and left there as the Director of CRO.

Using the skills I learned there, I was able to join the upstanding company that is Directive where I’m learning so much more, and doing so many more awesome things than I did at any other job and it has been amazing. It’s so wonderful to work at a place that is professional and that takes the work so seriously, only striving to be the best at being different. 


"The best way we can convince the customers is that we need to address what our client does, that no other competitor can do."

M7: Could you tell us about your best practices for creating an ideal customer experience?
OT: 
A functioning website that loads quickly
Easy navigation and user experience
Clear offerings and clear unique value propositions (what is it that you do that no competitor does?)
Great social proof (testimonials and case studies from current clients, awards, etc)

Great customer service: prompt support, regular email check-ins to see how your customer is doing, offer deals and promotions - all of these things keep a customer coming back for more.

M7: While creating a unique value proposition, how do you drive in the utility? In other words, how do you convince the customer about the uniqueness of your service?
OT: 
We definitely have to utilize this through the headline and anywhere in the hero section of the landing page or the homepage because that’s where people are landing first and you need to be able to grab their attention in the first five seconds. So, the best way we can convince the customers, is that we need to address what our client does, that no other competitor can do.

If you can say we’re the only platform that does x, y, and z, that is a great unique selling point. Another thing to consider is backing up your clients with data. If you are offering some sort of platform that will save me time on the implementation of a process, then tell me how much time I’m going to save. If you say, “Cut down your execution time by 90% with our platform” that’s a unique value proposition. That shows the benefit to the user there, and that will entice users to click through and complete the form. So, gaining conversions is usually based around giving real data that explains exactly what value the visitors are going to see or how much money is going to be made or saved, and how much time is going to be saved to solve a problem with this solution. The other side of the coin is “we are the only ones that do x y z” and that will basically set a business apart from their competitors.

M7: How does collaboration and communication come into play in your role?
OT: 
It’s the entire job. I oversee a design team and I need to make sure my team is not only communicating with me but communicating with other departments. PPC, SEO, and CRO must all work together to get the job done and we’re stronger together than apart. I have daily follow-ups on different accounts, weekly meetings, client sync ups - whatever it takes to make sure that I and the rest of the team have complete transparency into what is happening with these accounts so that we can assist in whatever way we can. We want our specialists and account managers to own their strategy, but the directors are responsible for approving the strategy and improving it if needed.


"As designers, we need to remember that form follows function, so we must be sure that this information is easily accessible, that the message is clear."

M7: What are the biggest mistakes you see businesses making when attempting to optimize their site to increase conversions?
OT:
These companies spend tens of thousands of dollars on a rebrand which will be done by a branding agency that has no knowledge of designing a site for increased conversions. Too many times we’ve had clients come in that just had a rebrand done and their conversions plummeted. So we will go in and audit the site to find out what is causing the problem. Too often, design takes over function but we must always remember that form follows function. As an example, the white space in the new site may be beautiful, but none of your visitors can even see what you’re offering until they get halfway down the page. Things like this are the biggest issues we see.

Also, with too many changes implemented at once, it makes it harder to pinpoint what caused the drop in conversions. It’s often times all of the things combined together that caused the problem. If a company is going to focus on increasing conversions, the changes need to be based on data and not on whims or best practices. Data doesn’t lie.

M7: What is the most challenging part of doing a conversion optimization project? What type of resource commitment do you require from your team?
OT:
The most challenging part is that the results cannot be guaranteed. Our tests are based on data but they’re just that: a test, a hypothesis. Nothing is written in stone. 9 out of 10 times I will be right in my hypothesis, but there will always be a test that fails. We still celebrate the failure because we still learn from it. We can find out why the test didn’t work and use it to narrow down on what will work.

As far as resources are concerned, we want to make sure that we’re testing at least a few things each week per client. We use Hotjar for qualitative research as well as Google Optimize for on-page testing, and Instapage/Unbounce for landing page testing. Reporting is a big part of our deliverable so a good amount of our time is spent gathering the data and providing insights to the client.

M7: According to you, what prompts a visitor to scroll down to the bottom of a webpage?
OT: 
Usually you would have to have a message that entices them in the hero section of the landing page. Just like we discussed about the UVPs, we need to show the customer right when they land on the page, that this is the solution for your problem. That will entice them to scroll down. You can sometimes kind of coax people to scroll down: I like to use false CTAs to get more information and if they click that CTA, it will scroll down to the benefit section on the page and that will get people to start scrolling. And from that benefit section you could have a CTA linking to the case studies on the landing page and get them to scroll down even further on the page.

The main issue is people think of redesigning their page to look better and they see horrible conversions because it may be beautiful but it’s not functional. The messaging is vague and does not relate to what it is they do as a company that’s better than anybody else. They don’t adjust the benefits, and they’re too stuck on this flowery and technical language that a lot of SaaS companies like to use. So, the biggest thing is being very upfront with what you do in layman’s terms, making it as clear as possible to the lowest common denominator, so that you have a potentially larger pool of leads versus only having that technical jargon that only a few may understand. This usually relates a lot to B2B and SaaS clients. They get really hung up on their own language that’s very technical but the common man that needs their service doesn’t understand that...just tell them what the benefit is.

So, to summarize that long rant: basically, make sure that the messaging is clear about the benefits right away, then use CTAs on your page to entice people to keep scrolling so they continue to learn more. Keep people engaged and reading, section by section.


"Gaining conversions is based around giving real data that explains what value the visitors are going to see or how much money is going to be made or saved, and how much time is going to be saved."

M7: In a world where anyone can start a web-based business, generating trust is more important than ever before. Considering this, what impact does design have on revenue?
OT: 
It has a huge impact. If you land on a site that is poorly designed - it’s ugly, it’s confusing, you have no idea what they sell - do you think you would stay on that site for long? No, you’d go to a site that has a clear hero image showing the product and how it works, and a headline that explains what sets it apart from any other competitor product. The way information is presented is just as important as what information is being said.




One-size-doesn’t-fit-all and I’ve seen pages that - funny enough - looked horrible but converted better than the redesign we did, just because the form was more readily available. All the information was above the fold and it looked really scrunched. However, the customers got whatever they needed right away and that was what was important. So even when you’re seeing this image of bad vs good, we could argue that maybe the option on the right still won’t convert because it’s not quite explaining any unique value composition. It has a lot of beautiful imagery but it’s not getting to the point. Although these full-width websites with huge images is the trend, I think it needs to be taken with a grain of salt and used sparingly; and it needs to be dialed back a bit when it comes to conversions. You have these big beautiful images and people have to scroll very far just to get down to the first paragraph which is not good for conversions even though it’s trendy. As designers, we need to remember that form follows function, so we must be sure that this information is easily accessible, that the message is clear and if it is, then great! The beauty comes after that, but messaging has to be clear, concise, and easily understood.

M7: Directive Consulting ranks #1 on Google for “SEO Agency”. What SEO strategies and tools does the company leverage to channelize its sales campaigns?
OT: 
On page SEO and targeted guest posting with keyword driven anchor text. Then we continually write content around SEO and internally link back to our core SEO page.

M7: As a child what did you want to be when you grew up?
OT:
I wanted to be a speleologist (a cave scientist) for years. I was obsessed with caves, stalactites, and stalagmites. I’ve always been interested in maths and sciences, but there are dangers tied to being a cave scientist so I gave up on that. I still sometimes wonder what would have been if I had gone into the sciences instead of design. Maybe I’ll try it out in a few years!

M7: That sounds interesting! Have you visited caves in your earlier days?
OT: Yes, I did visit just a few caves, nothing big like the Man of the cave or Carlsbad cavern but as a child I was very interested in science – Biology, Zoology, Geology just the world around me and caves are interesting because they’re the dark places that not many people go to. I love history, I love biology so I think caves are kind of that interesting combination of both cause they’re ancient and they have these creatures that are so bizarre you know, like these blind salamanders which is like a different world there. I got very fixated on that for a few years as a child, reading all the books I could about it. I had my mind set, this is what I was going to do and I didn’t take into account the dangers of being a cave scientist. You’ll have to get into tight little spaces and there could be cavemen, you could get lost and stuck. Me being a homebody and kind of a bookworm, I decided, you know, maybe this is not the path for me, but I was also an artistic child. I was drawing all the time and that’s how I ended up in design school instead. So a very different path, but I still love science and history so I might dabble in it later in my life but for now it’s been design.

ABOUT DIRECTIVE CONSULTING

Directive does beautiful search marketing for B2B and enterprise companies that share our values. We redefine the global standard for how marketers work, live, and grow. We are a group of SEO, PPC, and content experts who are passionate about working with the best B2B brands in the world. When we are not executing ROI driven campaigns, you can find us drinking cold brew, volunteering in our community, or playing an intense game of ping-pong.

More C-Suite on deck

‘In the industry, we've observed fragmentation, especially among larger organizations,’ says Chris Fisher

Media 7 | October 16, 2023

Chris Fisher is a seasoned marketing professional who specializes in digital marketing and demand generation to fuel business growth. I integrate product messaging and innovative strategies with data-driven marketing to achieve quantifiable outcomes. Read on to know his thoughts about safeguarding the layers of Cyber-security.

Read More

'AI & ML algorithms will play a critical role in identifying cyber threats,' asserts Trishneet Arora

Media 7 | July 28, 2023

Trishneet Arora, a self-made individual, demonstrated remarkable vision, intellect, and competence when he established a startup at the young age of 19. Under his guidance, the flagship venture has expanded into both the entertainment and educational sectors. With Trishneet at the helm, the potential for growth and success knows no bounds. Let's delve into his insights on securing UPI-based applications.

Read More

‘Data and analytics play a crucial role in shaping our advertising strategies,' asserts Aleksander Groshev

Media 7 | June 28, 2023

Aleksander Groshev is the CEO and Co-Founder of Autobahn Security. Previously he was Vice President of Product responsible for the product development of the SaaS platform. Before joining Autobahn Security he held the position of Head of Product at Fincite, a wealth management B2B platform.

Read More

‘In the industry, we've observed fragmentation, especially among larger organizations,’ says Chris Fisher

Media 7 | October 16, 2023

Chris Fisher is a seasoned marketing professional who specializes in digital marketing and demand generation to fuel business growth. I integrate product messaging and innovative strategies with data-driven marketing to achieve quantifiable outcomes. Read on to know his thoughts about safeguarding the layers of Cyber-security.

Read More

'AI & ML algorithms will play a critical role in identifying cyber threats,' asserts Trishneet Arora

Media 7 | July 28, 2023

Trishneet Arora, a self-made individual, demonstrated remarkable vision, intellect, and competence when he established a startup at the young age of 19. Under his guidance, the flagship venture has expanded into both the entertainment and educational sectors. With Trishneet at the helm, the potential for growth and success knows no bounds. Let's delve into his insights on securing UPI-based applications.

Read More

‘Data and analytics play a crucial role in shaping our advertising strategies,' asserts Aleksander Groshev

Media 7 | June 28, 2023

Aleksander Groshev is the CEO and Co-Founder of Autobahn Security. Previously he was Vice President of Product responsible for the product development of the SaaS platform. Before joining Autobahn Security he held the position of Head of Product at Fincite, a wealth management B2B platform.

Read More

Related News

Platform Security

Stellar Cyber and Proofpoint Strategic Alliance to Deliver Comprehensive Email Security Solution For SecOps Teams

Stellar Cyber | January 23, 2024

Stellar Cyber, the innovator of Open XDR, announced a new partnership with Proofpoint, a leading cybersecurity and compliance company. Through this alliance, Proofpoint and Stellar Cyber customers benefit from an out-of-the-box integration enabling swift email investigations and real-time response actions to email-driven attacks. Proofpoint Targeted Attack Protection monitors emails to identify suspicious emails and potentially malicious attachments and URLs. Once identified, the findings are shared with Stellar Cyber automatically. Stellar Cyber’s Open XDR platform ingests, normalizes, and analyzes Proofpoint findings and other collected data to deliver a comprehensive threat picture. As security analysts conduct investigations, they can instruct integrated third-party products – including Proofpoint – on corrective actions. “Protecting organizations against email-borne attacks is a top priority, and security teams need a way to automatically correlate threat telemetry across the entire attack surface in order to quickly remediate threats,” said Andrew Homer, VP of Strategic Alliances, Stellar Cyber. “This new partnership with Proofpoint is the latest example of Stellar Cyber delivering on its Open XDR strategy to provide customers turn-key integrations that improve productivity and threat detection.” “Email attacks remain the number one entry point into an organization, and the level of sophistication of these attacks continues to grow exponentially,” said D.J. Long, Vice President, Strategic Alliances & Business Development, Proofpoint. “We’re thrilled to work with Stellar Cyber on this strategic alliance to help customers protect against advanced email-based threats and unify their cybersecurity defense.” Through this alliance, Stellar Cyber and Proofpoint give security teams an advantage over attackers, resulting in the following: Real-time threat signals exchanged for proactive detection Correlation of Proofpoint alerts across the entire attack surface Automated response actions for immediate threat containment About Stellar Cyber Stellar Cyber’s Open XDR Platform delivers comprehensive, unified security without complexity, empowering lean security teams of any skill level to secure their environments successfully. With Stellar Cyber, organizations reduce risk with early and precise identification and remediation of threats while slashing costs, retaining investments in existing tools, and improving analyst productivity, delivering an 8X improvement in MTTD and a 20X improvement in MTTR. The company is based in Silicon Valley.

Read More

Data Security

Rubrik Chosen by Carhartt to Drive Complete Cyber Resilience

Rubrik | January 10, 2024

Rubrik, the Zero Trust Data Security™ company, today announced that America’s premium workwear brand Carhartt has consolidated multiple legacy backup tools with Rubrik Security Cloud to achieve cyber resilience. After moving to Rubrik, Carhartt realized more than 50 percent in monthly cost savings, while significantly improving its data security capabilities. “Data resilience is key to the continued security and success of our business. We work hard to ward off intruders but we have to operate on the assumption that they will find a way in,” said Michael Karasienski, cloud platforms manager at Carhartt. “Rubrik Security Cloud restores data fast and without fail for both our cloud and on-premises environments. Rubrik plays a key role in building trust in our system with secure protocols and access controls; it isn’t just a data security solution, it’s peace of mind for our brand.” Established in 1889, Carhartt has a rich heritage of developing rugged products for workers on and off the job. The company honors hard work, approaching its business with the same honesty, dependability, and trust that its consumers display day-in and day-out. Prior to Rubrik, Carhartt used a variety of different backup solutions across its operations. After an upgrade of a critical application failed, Carhartt’s administrators discovered that that application data hadn’t been backed up, forcing the team to reconstruct more than two-weeks’ worth of data manually. Furthermore, the Carhartt team discovered malware in backups from its legacy tools, resulting in weeks of searching data sets to manually complete the investigation. With Rubrik Security Cloud, Carhartt’s IT team can now devote more time to other priorities — like business requests, incidents, and reducing technical debt — while saving more than 50 percent in operational costs each month. The company’s IT and Security teams are also collaborating to reduce risk to the organization, zeroing in on malware and tying investigations into its security operations center. “A highly interconnected business like Carhartt is responsible for mountains of sensitive data. Protecting that data is paramount to maintain customer trust and minimize business disruption,” said Anneka Gupta, Chief Product Officer at Rubrik. “Outdated legacy technology was never built with security in mind, so organizations must turn to modernized platforms and zero-trust methodologies to defend their data. With a holistic solution like Rubrik Security Cloud, organizations like Carhartt know their business will be resilient in the face of any cyber threat.” Carhartt utilizes numerous Rubrik products, including Anomaly Detection, Sensitive Data Monitoring, Threat Hunting, as well as its integration with Microsoft Sentinel. About Rubrik Rubrik is on a mission to secure the world’s data. With Zero Trust Data Security™, we help organizations achieve business resilience against cyberattacks, malicious insiders, and operational disruptions. Rubrik Security Cloud, powered by machine learning, secures data across enterprise, cloud, and SaaS applications. We help organizations uphold data integrity, deliver data availability that withstands adverse conditions, continuously monitor data risks and threats, and restore businesses with their data when infrastructure is attacked.

Read More

Software Security

Deepwatch Announces New Forensic-Focused Operations Service To Enhance Cyber Resilience

Deepwatch | January 09, 2024

Deepwatch, the leading managed security platform for the cyber resilient enterprise, today announced the launch of Threat Signal, its standalone forensic-focused operations service. Deepwatch designed Threat Signal to enhance companies’ cybersecurity defenses, proactively identify and help mitigate attack vectors, and stay ahead of evolving risks to strengthen cyber resilience. Threat Signal provides protection beyond traditional security measures, finding advanced cyber threats that have bypassed existing controls by leveraging the latest attacker methodologies to stay in tune with the constantly evolving threat landscape. Using an “outside-in” methodology, Threat Signal evaluates an organization’s externally accessible presence from an attacker’s perspective to pinpoint and investigate risky systems and services. This informs the initial investigation and allows Deepwatch Experts to leverage advanced capabilities through organic intelligence, deep forensics, and threat hunting. According to Forrester’s “How to Make Threat Intelligence Actionable” report¹, “Over time, companies need to move beyond tactical use cases. Threat hunting can uncover threats that have bypassed traditional security tools, allowing companies to stop attacks earlier to minimize disruptions. As Forrester’s Threat Hunting 101 report describes, threat intelligence is vital because it provides insights into the TTPs of threat actors and details on how malware behaves. If time, expertise, and resources are constrained, consider leveraging an external service provider to conduct the threat-hunting exercise as an annual consulting engagement.” Threat Signal provides tailored and proactive security measures through customer-specific intelligence that takes an organization's unique attack surface, business risks, and the latest adversary intelligence or "threat cases" into account. Threat Signal’s additional features and capabilities include: Deepwatch Experts - Seasoned forensic security experts perform in-depth investigations, identifying threats before they disrupt an organization. Attack Surface Profiles - These profiles provide a customer actionable report, detailing external opportunity areas that an attacker could leverage against an organization, including high-risk opportunities, mitigation recommendations, and threat hunting leads. Forensic-Agent-Based Threat Hunting Engagements - Deepwatch’s specialists consistently engage in hunting activities to reveal concealed threats within a company’s infrastructure and provide a threat hunt summary report with detailed observations and any actions that the customer took during that hunt cycle. Reporting and Reviews - Deepwatch provides customers with reports, including: Weekly intelligence brief reports on analyzed open-source intelligence with Deepwatch recommendations. Summary presentations on the solution engagement status, including but not limited to hunting reports. Up to two executive reviews of the solution and observables per year. Ad-hoc awareness briefs of security advisories based on Deepwatch threat criteria. Annual intelligence reports on incident lessons learned and predictions. Malware Analysis - Deepwatch’s Adversary Tactics and Intelligence (ATI) team analyze collected malware and provide a report. Enhanced Security - Deepwatch’s MDR customers benefit from cross-collaborative security operations, harnessing advanced threat detection, and hyper-responsive capabilities. “As security professionals, we look to enhance a company’s security readiness. To do that, it’s critical for them to look beyond their existing security controls to ensure they are identifying and proactively protecting the business from external threats,” said Jerrod Barton, VP, Cyber Operations & Intelligence for Deepwatch. “With Threat Signal, we’re able to help our enterprise customers view their security readiness through the lens of the ‘attackers,’ ensuring that they can rapidly respond to any incoming threats, which in turn helps them elevate their cyber resilience.” About Deepwatch Deepwatch is the leading managed security platform for the cyber resilient enterprise. The Deepwatch Managed Security Platform and security experts provide enterprises with 24/7/365 cyber resilience, rapid detections, high fidelity alerts, reduced false positives, and automated actions. We operate as an extension of cybersecurity teams by delivering exceptional security expertise, visibility across your attack surface, precision response to threats, and a compelling return on your security investments. The Deepwatch Managed Security Platform is trusted by many of the world’s leading brands to improve their security posture, cyber resilience, and peace of mind. Learn more at www.deepwatch.com.

Read More

Platform Security

Stellar Cyber and Proofpoint Strategic Alliance to Deliver Comprehensive Email Security Solution For SecOps Teams

Stellar Cyber | January 23, 2024

Stellar Cyber, the innovator of Open XDR, announced a new partnership with Proofpoint, a leading cybersecurity and compliance company. Through this alliance, Proofpoint and Stellar Cyber customers benefit from an out-of-the-box integration enabling swift email investigations and real-time response actions to email-driven attacks. Proofpoint Targeted Attack Protection monitors emails to identify suspicious emails and potentially malicious attachments and URLs. Once identified, the findings are shared with Stellar Cyber automatically. Stellar Cyber’s Open XDR platform ingests, normalizes, and analyzes Proofpoint findings and other collected data to deliver a comprehensive threat picture. As security analysts conduct investigations, they can instruct integrated third-party products – including Proofpoint – on corrective actions. “Protecting organizations against email-borne attacks is a top priority, and security teams need a way to automatically correlate threat telemetry across the entire attack surface in order to quickly remediate threats,” said Andrew Homer, VP of Strategic Alliances, Stellar Cyber. “This new partnership with Proofpoint is the latest example of Stellar Cyber delivering on its Open XDR strategy to provide customers turn-key integrations that improve productivity and threat detection.” “Email attacks remain the number one entry point into an organization, and the level of sophistication of these attacks continues to grow exponentially,” said D.J. Long, Vice President, Strategic Alliances & Business Development, Proofpoint. “We’re thrilled to work with Stellar Cyber on this strategic alliance to help customers protect against advanced email-based threats and unify their cybersecurity defense.” Through this alliance, Stellar Cyber and Proofpoint give security teams an advantage over attackers, resulting in the following: Real-time threat signals exchanged for proactive detection Correlation of Proofpoint alerts across the entire attack surface Automated response actions for immediate threat containment About Stellar Cyber Stellar Cyber’s Open XDR Platform delivers comprehensive, unified security without complexity, empowering lean security teams of any skill level to secure their environments successfully. With Stellar Cyber, organizations reduce risk with early and precise identification and remediation of threats while slashing costs, retaining investments in existing tools, and improving analyst productivity, delivering an 8X improvement in MTTD and a 20X improvement in MTTR. The company is based in Silicon Valley.

Read More

Data Security

Rubrik Chosen by Carhartt to Drive Complete Cyber Resilience

Rubrik | January 10, 2024

Rubrik, the Zero Trust Data Security™ company, today announced that America’s premium workwear brand Carhartt has consolidated multiple legacy backup tools with Rubrik Security Cloud to achieve cyber resilience. After moving to Rubrik, Carhartt realized more than 50 percent in monthly cost savings, while significantly improving its data security capabilities. “Data resilience is key to the continued security and success of our business. We work hard to ward off intruders but we have to operate on the assumption that they will find a way in,” said Michael Karasienski, cloud platforms manager at Carhartt. “Rubrik Security Cloud restores data fast and without fail for both our cloud and on-premises environments. Rubrik plays a key role in building trust in our system with secure protocols and access controls; it isn’t just a data security solution, it’s peace of mind for our brand.” Established in 1889, Carhartt has a rich heritage of developing rugged products for workers on and off the job. The company honors hard work, approaching its business with the same honesty, dependability, and trust that its consumers display day-in and day-out. Prior to Rubrik, Carhartt used a variety of different backup solutions across its operations. After an upgrade of a critical application failed, Carhartt’s administrators discovered that that application data hadn’t been backed up, forcing the team to reconstruct more than two-weeks’ worth of data manually. Furthermore, the Carhartt team discovered malware in backups from its legacy tools, resulting in weeks of searching data sets to manually complete the investigation. With Rubrik Security Cloud, Carhartt’s IT team can now devote more time to other priorities — like business requests, incidents, and reducing technical debt — while saving more than 50 percent in operational costs each month. The company’s IT and Security teams are also collaborating to reduce risk to the organization, zeroing in on malware and tying investigations into its security operations center. “A highly interconnected business like Carhartt is responsible for mountains of sensitive data. Protecting that data is paramount to maintain customer trust and minimize business disruption,” said Anneka Gupta, Chief Product Officer at Rubrik. “Outdated legacy technology was never built with security in mind, so organizations must turn to modernized platforms and zero-trust methodologies to defend their data. With a holistic solution like Rubrik Security Cloud, organizations like Carhartt know their business will be resilient in the face of any cyber threat.” Carhartt utilizes numerous Rubrik products, including Anomaly Detection, Sensitive Data Monitoring, Threat Hunting, as well as its integration with Microsoft Sentinel. About Rubrik Rubrik is on a mission to secure the world’s data. With Zero Trust Data Security™, we help organizations achieve business resilience against cyberattacks, malicious insiders, and operational disruptions. Rubrik Security Cloud, powered by machine learning, secures data across enterprise, cloud, and SaaS applications. We help organizations uphold data integrity, deliver data availability that withstands adverse conditions, continuously monitor data risks and threats, and restore businesses with their data when infrastructure is attacked.

Read More

Software Security

Deepwatch Announces New Forensic-Focused Operations Service To Enhance Cyber Resilience

Deepwatch | January 09, 2024

Deepwatch, the leading managed security platform for the cyber resilient enterprise, today announced the launch of Threat Signal, its standalone forensic-focused operations service. Deepwatch designed Threat Signal to enhance companies’ cybersecurity defenses, proactively identify and help mitigate attack vectors, and stay ahead of evolving risks to strengthen cyber resilience. Threat Signal provides protection beyond traditional security measures, finding advanced cyber threats that have bypassed existing controls by leveraging the latest attacker methodologies to stay in tune with the constantly evolving threat landscape. Using an “outside-in” methodology, Threat Signal evaluates an organization’s externally accessible presence from an attacker’s perspective to pinpoint and investigate risky systems and services. This informs the initial investigation and allows Deepwatch Experts to leverage advanced capabilities through organic intelligence, deep forensics, and threat hunting. According to Forrester’s “How to Make Threat Intelligence Actionable” report¹, “Over time, companies need to move beyond tactical use cases. Threat hunting can uncover threats that have bypassed traditional security tools, allowing companies to stop attacks earlier to minimize disruptions. As Forrester’s Threat Hunting 101 report describes, threat intelligence is vital because it provides insights into the TTPs of threat actors and details on how malware behaves. If time, expertise, and resources are constrained, consider leveraging an external service provider to conduct the threat-hunting exercise as an annual consulting engagement.” Threat Signal provides tailored and proactive security measures through customer-specific intelligence that takes an organization's unique attack surface, business risks, and the latest adversary intelligence or "threat cases" into account. Threat Signal’s additional features and capabilities include: Deepwatch Experts - Seasoned forensic security experts perform in-depth investigations, identifying threats before they disrupt an organization. Attack Surface Profiles - These profiles provide a customer actionable report, detailing external opportunity areas that an attacker could leverage against an organization, including high-risk opportunities, mitigation recommendations, and threat hunting leads. Forensic-Agent-Based Threat Hunting Engagements - Deepwatch’s specialists consistently engage in hunting activities to reveal concealed threats within a company’s infrastructure and provide a threat hunt summary report with detailed observations and any actions that the customer took during that hunt cycle. Reporting and Reviews - Deepwatch provides customers with reports, including: Weekly intelligence brief reports on analyzed open-source intelligence with Deepwatch recommendations. Summary presentations on the solution engagement status, including but not limited to hunting reports. Up to two executive reviews of the solution and observables per year. Ad-hoc awareness briefs of security advisories based on Deepwatch threat criteria. Annual intelligence reports on incident lessons learned and predictions. Malware Analysis - Deepwatch’s Adversary Tactics and Intelligence (ATI) team analyze collected malware and provide a report. Enhanced Security - Deepwatch’s MDR customers benefit from cross-collaborative security operations, harnessing advanced threat detection, and hyper-responsive capabilities. “As security professionals, we look to enhance a company’s security readiness. To do that, it’s critical for them to look beyond their existing security controls to ensure they are identifying and proactively protecting the business from external threats,” said Jerrod Barton, VP, Cyber Operations & Intelligence for Deepwatch. “With Threat Signal, we’re able to help our enterprise customers view their security readiness through the lens of the ‘attackers,’ ensuring that they can rapidly respond to any incoming threats, which in turn helps them elevate their cyber resilience.” About Deepwatch Deepwatch is the leading managed security platform for the cyber resilient enterprise. The Deepwatch Managed Security Platform and security experts provide enterprises with 24/7/365 cyber resilience, rapid detections, high fidelity alerts, reduced false positives, and automated actions. We operate as an extension of cybersecurity teams by delivering exceptional security expertise, visibility across your attack surface, precision response to threats, and a compelling return on your security investments. The Deepwatch Managed Security Platform is trusted by many of the world’s leading brands to improve their security posture, cyber resilience, and peace of mind. Learn more at www.deepwatch.com.

Read More

Spotlight

Directive Consulting

Directive Consulting

Directive does beautiful search marketing for B2B and enterprise companies that share our values. We redefine the global standard for how marketers work, live, and grow. We are a group of SEO, PPC and content experts who are passionate about working with the best B2B brands in the world. When we are...

Events

Resources