Webcasts

Webcasts

Get the latest tips for solving your security challenges from industry experts.

Moving UEBA Beyond the Ground Floor

Insider threats, administrator abuse, and compromised accounts are among the most damaging and difficult to detect threats. User and entity-based analytics (UEBA) solutions are making it possible to detect these advanced threats by employing artificial intelligence (AI) and machine learning.…

Read More

Impact of the Modernizing Government Technology Act

Revision 5 of NIST 800 has been delayed to late 2017 or early 2018. As a result, organizations have an opportunity to mature their security operations beyond basic compliance oriented processes and systems. In this webinar, Timothy Young, director of…

Read More

Impact of the Modernizing Government Technology Act

How Dell and LogRhythm are Transforming IT and Security Technology in Federal Agencies Federal security operations teams face the daunting task of limiting our nation’s cyber risk and securing critical data while using outdated hardware and software. Fortunately, the Modernizing…

Read More

SANS Incident Response Survey Results, Part 1

SANS’ 2016 survey of incident response (IR) capabilities indicated that the IR landscape was ever changing. Advanced industries were able to maintain effective IR teams, but it identified hurdles responders face to increase the efficiency of their IR teams. In…

Read More

New Methods for Managing the Cybersecurity Skills Shortage

Industry estimates project that there will be a shortfall of as many as one million cybersecurity professionals in the next few years. In this on-demand webinar, Seth Goldhammer, senior director of product management at LogRhythm, will join speakers from Dark…

Read More

Using Sysmon to See What’s Happening on Endpoints

Sysmon v6.01 is out from Windows Sysinternals and it’s even better than ever. This free tool runs in the background of your machine and provides efficient and powerful tracking of key security activity data that you can use to catch…

Read More

Results of the SANS 2017 SOC Survey, Part 1

Security operations center (SOC) functions are increasingly converging with intelligence, threat hunting, and other emerging processes to aid in threat prevention and response. In this on-demand webcast, James Carder, LogRhythm CISO and VP of LogRhythm Labs, joins the SANS team…

Read More

Detect the First Time Computers Talk to Each Other

How to Detect Two Computers on Your Network Talking to Each Other for the First Time Download Slide Deck Over time, any given computer on your network will establish a pattern of systems it does and doesn’t talk to. If…

Read More