Understanding the New Cybersecurity Maturity Model Certification

Working with the DoD? The U.S. Department of Defense (DoD) will require that your organization meet the Cybersecurity Maturity Model Certification (CMMC) requirements to bid on contracts. The CMMC mandates that DoD contractors obtain third-party certification to ensure appropriate levels…

Live demo - MITRE ATT&CK with LogRhythm

Live Product Demo – MITRE ATT&CK With LogRhythm

This product demo follows the MITRE ATT&CK session available on our BrightTALK channel. Watch this on-demand technical demonstration to hear how the LogRhythm platform can help you align to the MITRE ATT&CK framework.

MITRE ATT&CK 2020: An update in SIEM alignment

MITRE ATT&CK 2020: An Update in SIEM Alignment

In this on-demand webinar Andrew provides an overview of how security professionals and the businesses that employ them can benefit from integrating the MITRE ATT&CK framework into their SIEM.

Live demo - Threat hunting with LogRhythm

Live Product Demo – Threat Hunting With LogRhythm

In this on-demand session, you will learn some practical threat hunting tips and tricks using the LogRhythm NextGen SIEM Platform.

Logging & threat detection in the cloud: AWS, GCP, Microsoft Azure & Office 365

Logging and Threat Detection With AWS, GCP, Microsoft Azure and Office 365

In this on-demand technical webinar LogRhythm’s Daniel Crossley outlines logging and threat detection strategies within cloud environments, including Amazon Web Services (AWS), Google Cloud Platform (GCP), Microsoft Azure and Office 365.

Cybersecurity: A CISO’s perspective

Cybersecurity: A CISO’s Perspective

Watch our Q&A panel session to gain insight into how James Carder, LogRhythm CISO and our guest speakers build and maintain a cybersecurity culture at their organisations, how they manage board-level reporting, exec-level relationships, and how they achieve their goals as a security leader, while appealing to the board’s mission and the core mission of their business.

Maximising the productivity of your SOC with UEBA and SOAR

Maximising the Productivity of Your SOC With UEBA and SOAR

If your team is struggling with resource constraints, you’re probably facing longer-than-ideal response times. This puts your organisation at risk. In this on-demand webinar Ed Carolan, Manager, Enterprise Sales Engineering, outlines how you can maximise the benefits of time optimisation and reduce the burden on your team with SOAR and UEBA.

Getting Value From Your NextGen SIEM Project

Getting Value From Your NextGen SIEM Project

In this on-demand webinar Andrew Habibi-Parker, Director, Professional Services EMEA & APJ and Adam Thompson, Principal Professional Services Consultant will walk you through how a good deployment methodology can pave the way to SIEM success.

How to map your risk reduction over time, and achieve cost predictability

How to Map Your Risk Reduction Overtime and Achieve Cost Predictability

In this on-demand webinar, LogRhythm’s Jonathan Zulberg and James Carder introduce the LogRhythm Security Operations Maturity Model (SOMM), which was developed to help cybersecurity professionals assess their organisation’s current level of security maturity and plan for making improvements over time.

Experiences from the Trenches: Security Career Roundtable

Looking to take the next step in your career? Find out how others paved the way for success in the security field. In this roundtable, you’ll hear from tenured security professionals on how they established their careers, overcame obstacles, and…