Getting Value From Your NextGen SIEM Project
In this on-demand webinar Andrew Habibi-Parker, Director, Professional Services EMEA & APJ and Adam Thompson, Principal Professional Services Consultant will walk you through how a good deployment methodology can pave the way to SIEM success.
Read More
June 24, 2020
How to Map Your Risk Reduction Overtime and Achieve Cost Predictability
In this on-demand webinar, LogRhythm’s Jonathan Zulberg and James Carder introduce the LogRhythm Security Operations Maturity Model (SOMM), which was developed to help cybersecurity professionals assess their organisation’s current level of security maturity and plan for making improvements over time.
Read More
June 24, 2020
Experiences from the Trenches: Security Career Roundtable
Watch this on-demand webinar to hear from tenured security professionals on how they established their careers, overcame obstacles, and ascertained new roles and promotions. Most careers in cybersecurity are anything but linear. Learn how to navigate your own path — with or without a “traditional” background.
Read More
June 23, 2020
Anatomy of a Hacker Group: APT29 (AKA Cozy Bear)
Watch the on-demand webinar now to learn from members of LogRhythm Labs’ threat research team and Randy Franklin Smith of Ultimate Windows Security, who will do a deep-dive into the APT29 threat group, their activities, and how you can automate the detection and mitigation of threats either associated with the group or that use similar techniques.
Read More
June 9, 2020
Exploring 5 Techniques from the MITRE ATT&CK Cloud Matrix Specific to O365
Just like how ATT&CK has specific Techniques for Windows and Linux, ATT&CK’s cloud matrix defines Techniques specific to Office 365, Azure, AWS, Google, and others. Watch this on-demand technical session for the latest ways to protect your cloud resources with MITRE ATT&CK.
Read More
May 5, 2020
AMA: Learn How LogRhythm Implemented the WFH Change
As a result of recent events and the COVID-19 pandemic, most organizations are implementing work-at-home policies. Yet company-wide remote environments present unique challenges for IT and cybersecurity professionals. Watch the on-demand webcast today to learn how LogRhythm made the move to a remote workforce and how you can do the same.
Read More
April 13, 2020