Webcasts

Webcasts

Get the latest tips for solving your security challenges from industry experts.
Maximising the productivity of your SOC with UEBA and SOAR

Maximising the Productivity of Your SOC With UEBA and SOAR

If your team is struggling with resource constraints, you’re probably facing longer-than-ideal response times. This puts your organisation at risk. In this on-demand webinar Ed Carolan, Manager, Enterprise Sales Engineering, outlines how you can maximise the benefits of time optimisation and reduce the burden on your team with SOAR and UEBA.

Read More
Getting Value From Your NextGen SIEM Project

Getting Value From Your NextGen SIEM Project

In this on-demand webinar Andrew Habibi-Parker, Director, Professional Services EMEA & APJ and Adam Thompson, Principal Professional Services Consultant will walk you through how a good deployment methodology can pave the way to SIEM success.

Read More
How to map your risk reduction over time, and achieve cost predictability

How to Map Your Risk Reduction Overtime and Achieve Cost Predictability

In this on-demand webinar, LogRhythm’s Jonathan Zulberg and James Carder introduce the LogRhythm Security Operations Maturity Model (SOMM), which was developed to help cybersecurity professionals assess their organisation’s current level of security maturity and plan for making improvements over time.

Read More
Experiences from The Trenches: A Cybersecurity Career Roundtable Preview

Experiences from the Trenches: Security Career Roundtable

Looking to take the next step in your career? Find out how others paved the way for success in the security field. In this roundtable, you’ll hear from tenured security professionals on how they established their careers, overcame obstacles, and…

Read More

Anatomy of a Hacker Group: APT29 (AKA Cozy Bear)

The threat group APT29, also known as Cozy Bear, is well-known for their alleged work infiltrating the U.S. Democratic National Committee during the 2016 presidential election cycle — but that’s only the tip of the iceberg when it comes to what…

Read More

AMA: Learn How LogRhythm Implemented the WFH Change

As a result of recent events and the COVID-19 pandemic, most organizations are implementing work-at-home policies. Yet company-wide remote environments present unique challenges for IT and cybersecurity professionals. During this webinar, Rex Young, chief information officer, and Zack Rowland, strategic…

Read More

Securing a Remote Workforce: How to Get Started​

In light of COVID-19, we’ve seen businesses across industries implement remote work policies. This brings about new security concerns, many of which either weren’t considered or prioritized beforehand. In this on-demand webcast, LogRhythm experts including James Carder, CSO and VP…

Read More

Pushing the Limits of Network Security Monitoring

Duration: 01:25:35 Good investigators gather the clues they need to crack a case. The best, analyze those clues, make connections, and solve a case quickly. As a threat hunter, you also need to have an effective set of techniques and…

Read More

Kubernetes Audit Logging | Kubernetes Security

Duration: 1:24:27 Applications are increasingly being containerized, and when that happens, they are likely to find their way to a cluster within a container-orchestration system like Kubernetes. However, containerized applications are only as safe as the Kubernetes cluster they run…

Read More