Webcasts

Webcasts

Get the latest tips for solving your security challenges from industry experts.

Pushing the Limits of Network Security Monitoring

Duration: 01:25:35 Good investigators gather the clues they need to crack a case. The best, analyze those clues, make connections, and solve a case quickly. As a threat hunter, you also need to have an effective set of techniques and…

Read More

Kubernetes Audit Logging | Kubernetes Security

Duration: 1:24:27 Applications are increasingly being containerized, and when that happens, they are likely to find their way to a cluster within a container-orchestration system like Kubernetes. However, containerized applications are only as safe as the Kubernetes cluster they run…

Read More

Aligning Security Solutions with MITRE ATT&CK

Duration: 1:00:30 The MITRE ATT&CK framework is quickly growing in popularity as an effective method to get on the offense of threat detection and response. In this webinar, presenters go beyond definitions and demonstrate how to apply the MITRE ATT&CK…

Read More

Threat Detection for Common MITRE ATT&CK Techniques

Duration: 01:43:53 If you’re ready to take a deep dive into applying the MITRE ATT&CK framework and learning how to use it in your environment, then this webinar is for you. In this on-demand webinar, LogRhythm threat research engineers join…

Read More

SANS Shares Evaluator’s Guide for NextGen SIEM

There’s no question about it: Legacy SIEMs hinder your ability to achieve your security objectives. Traditional solutions are limited and often lack the flexibility to scale and grow as your security needs increase. To combat today’s threats, you need a…

Read More

Building a Cybersecurity Architecture to Combat Today’s Risks

The rapid development and adoption of cloud infrastructure, mobile workforces, the Internet of Things (IoT), and other susceptible environments have mandated a reappraisal of security architecture. Modern organizations are recognizing their security posture may not be keeping up with the…

Read More