Webcasts

Webcasts

Get the latest tips for solving your security challenges from industry experts.
Experiences from The Trenches: A Cybersecurity Career Roundtable Preview

Experiences from the Trenches: Security Career Roundtable

Looking to take the next step in your career? Find out how others paved the way for success in the security field. In this roundtable, you’ll hear from tenured security professionals on how they established their careers, overcame obstacles, and…

Read More

Anatomy of a Hacker Group: APT29 (AKA Cozy Bear)

The threat group APT29, also known as Cozy Bear, is well-known for their alleged work infiltrating the U.S. Democratic National Committee during the 2016 presidential election cycle — but that’s only the tip of the iceberg when it comes to what…

Read More

AMA: Learn How LogRhythm Implemented the WFH Change

As a result of recent events and the COVID-19 pandemic, most organizations are implementing work-at-home policies. Yet company-wide remote environments present unique challenges for IT and cybersecurity professionals. During this webinar, Rex Young, chief information officer, and Zack Rowland, strategic…

Read More

Securing a Remote Workforce: How to Get Started​

In light of COVID-19, we’ve seen businesses across industries implement remote work policies. This brings about new security concerns, many of which either weren’t considered or prioritized beforehand. In this on-demand webcast, LogRhythm experts including James Carder, CSO and VP…

Read More

Pushing the Limits of Network Security Monitoring

Duration: 01:25:35 Good investigators gather the clues they need to crack a case. The best, analyze those clues, make connections, and solve a case quickly. As a threat hunter, you also need to have an effective set of techniques and…

Read More

Kubernetes Audit Logging | Kubernetes Security

Duration: 1:24:27 Applications are increasingly being containerized, and when that happens, they are likely to find their way to a cluster within a container-orchestration system like Kubernetes. However, containerized applications are only as safe as the Kubernetes cluster they run…

Read More

Aligning Security Solutions with MITRE ATT&CK

Duration: 1:00:30 The MITRE ATT&CK framework is quickly growing in popularity as an effective method to get on the offense of threat detection and response. In this webinar, presenters go beyond definitions and demonstrate how to apply the MITRE ATT&CK…

Read More

Threat Detection for Common MITRE ATT&CK Techniques

Duration: 01:43:53 If you’re ready to take a deep dive into applying the MITRE ATT&CK framework and learning how to use it in your environment, then this webinar is for you. In this on-demand webinar, LogRhythm threat research engineers join…

Read More