On-Demand Webcasts

SANS 2016 Incident Response Survey

This on-demand webcast will cover the results of the third annual SANS survey on incident response. It will explore the continuing evolution of incident response, how tactics and tools have changed in the last three years and how security professionals are dealing with increasing numbers and kinds of attacks.

Read More

Discover hidden threats with User Behaviour Analytics (UBA)

As a cyber security professional, you already know that users are both an organisation’s greatest asset and its greatest vulnerability. Many companies are confronting this challenge with User Behaviour Analytics (UBA), which can help you detect and respond to user threats. Find out more in this on-demand webcast.

Read More

Do You Really Know Your Users?

In this on-demand webcast, explore how User Entity and Behavior Analytics can help you discover hidden user threats, reduce false-positives, and properly prioritize the most concerning threats.

Read More

Leveraging your SIEM to Catch and Respond to Ransomware

In this webinar, Randy Franklin Smith of Ultimate Windows Security is joined by Nathaniel “Q” Quist to discuss how to leverage SIEM technology to catch and respond to ransomware to prevent it from spreading and reaching the critical mass.

Read More

Defending Against Cyberthreats: Are You Keeping Up?

In this on-demand webcast, Steve Piper, CEO of the information security research firm CyberEdge Group, is joined by Mike Reagan, CMO of LogRhythm, will give you an analysis of the 2016 CyberEdge Cyberthreat Defense Report. You’ll learn about the threats, response plans, processes and investments that organizations are making in 2016.

Read More

Rightsizing Your SIEM

In this on-demand webcast, Chris Petersen LogRhythm CTO, SVP of Customer Care and Co-Founder, discusses the issues organizations face as they embrace SIEM and debunk some common myths along the way.

Read More

Protecting Your Business from the Ransomware Threat

In this webinar, LogRhythm looks at the business problems surrounding the new and evolved ransomware threat. The webinar also gives you a brief technical overview of how these schemes function and how they can be spotted and responded to early enough in the threat lifecycle to severely limit the potential damage.

Read More

PowerShell Audit Logging Deep Dive

This on-demand webcast will cover how you can catch intruders exploiting PowerShell. We'll zero in on auditing capabilities in PowerShell, explore sample events and how to interpret them, and talk about how to filter the noise.

Read More