Webcasts

Webcasts

Get the latest tips for solving your security challenges from industry experts
Experiences from The Trenches: A Cybersecurity Career Roundtable Preview

Experiences from the Trenches: Security Career Roundtable

Watch this on-demand webinar to hear from tenured security professionals on how they established their careers, overcame obstacles, and ascertained new roles and promotions. Most careers in cybersecurity are anything but linear. Learn how to navigate your own path — with or without a “traditional” background.

Read More

Anatomy of a Hacker Group: APT29 (AKA Cozy Bear)

Watch the on-demand webinar now to learn from members of LogRhythm Labs’ threat research team and Randy Franklin Smith of Ultimate Windows Security, who will do a deep-dive into the APT29 threat group, their activities, and how you can automate the detection and mitigation of threats either associated with the group or that use similar techniques.

Read More
AMA: Learn How LogRhythm Implemented the WFH Change

AMA: Learn How LogRhythm Implemented the WFH Change

As a result of recent events and the COVID-19 pandemic, most organizations are implementing work-at-home policies. Yet company-wide remote environments present unique challenges for IT and cybersecurity professionals. Watch the on-demand webcast today to learn how LogRhythm made the move to a remote workforce and how you can do the same.

Read More
Securing a Remote Workforce: How to Get Started​

Securing a Remote Workforce: How to Get Started​

In light of COVID-19, we’ve seen businesses across industries implement remote work policies. This brings about new security concerns, many of which either weren’t considered or prioritized beforehand. Watch the on-demand webinar now to learn how to secure your remote team.

Read More
4 Trending Phishing Techniques

4 Trending Phishing Techniques: Real-Life Examples and Tips for Detection

Many successful attacks begin with a phishing email that some user falls for. And that’s why MITRE prominently features Spearphishing (T1192) as an Initial Access technique in ATT&CK. View the on-demand webinar with Ultimate Windows Security to learn about the latest phishing techniques used by attackers and how MITRE ATT&CK can help detect and remediate these threats.

Read More