Webcasts

Webcasts

Get the latest tips for solving your security challenges from industry experts.

Understanding the New Cybersecurity Maturity Model Certification

Working with the DoD? The U.S. Department of Defense (DoD) will require that your organization meet the Cybersecurity Maturity Model Certification (CMMC) requirements to bid on contracts. The CMMC mandates that DoD contractors obtain third-party certification to ensure appropriate levels…

Read More
Live demo - MITRE ATT&CK with LogRhythm

Live Product Demo – MITRE ATT&CK With LogRhythm

This product demo follows the MITRE ATT&CK session available on our BrightTALK channel. Watch this on-demand technical demonstration to hear how the LogRhythm platform can help you align to the MITRE ATT&CK framework.

Read More
Cybersecurity: A CISO’s perspective

Cybersecurity: A CISO’s Perspective

Watch our Q&A panel session to gain insight into how James Carder, LogRhythm CISO and our guest speakers build and maintain a cybersecurity culture at their organisations, how they manage board-level reporting, exec-level relationships, and how they achieve their goals as a security leader, while appealing to the board’s mission and the core mission of their business.

Read More
Maximising the productivity of your SOC with UEBA and SOAR

Maximising the Productivity of Your SOC With UEBA and SOAR

If your team is struggling with resource constraints, you’re probably facing longer-than-ideal response times. This puts your organisation at risk. In this on-demand webinar Ed Carolan, Manager, Enterprise Sales Engineering, outlines how you can maximise the benefits of time optimisation and reduce the burden on your team with SOAR and UEBA.

Read More
Getting Value From Your NextGen SIEM Project

Getting Value From Your NextGen SIEM Project

In this on-demand webinar Andrew Habibi-Parker, Director, Professional Services EMEA & APJ and Adam Thompson, Principal Professional Services Consultant will walk you through how a good deployment methodology can pave the way to SIEM success.

Read More
How to map your risk reduction over time, and achieve cost predictability

How to Map Your Risk Reduction Overtime and Achieve Cost Predictability

In this on-demand webinar, LogRhythm’s Jonathan Zulberg and James Carder introduce the LogRhythm Security Operations Maturity Model (SOMM), which was developed to help cybersecurity professionals assess their organisation’s current level of security maturity and plan for making improvements over time.

Read More
Experiences from The Trenches: A Cybersecurity Career Roundtable Preview

Experiences from the Trenches: Security Career Roundtable

Looking to take the next step in your career? Find out how others paved the way for success in the security field. In this roundtable, you’ll hear from tenured security professionals on how they established their careers, overcame obstacles, and…

Read More

Anatomy of a Hacker Group: APT29 (AKA Cozy Bear)

The threat group APT29, also known as Cozy Bear, is well-known for their alleged work infiltrating the U.S. Democratic National Committee during the 2016 presidential election cycle — but that’s only the tip of the iceberg when it comes to what…

Read More