Webcasts

Webcasts

Get the latest tips for solving your security challenges from industry experts.

Understanding Office 365 Unified Audit Logging

Watch the On-Demand Webinar Office 365 provides a centralized audit logging facility that allows you to track what’s happening in Azure Active Directory, Exchange Online, SharePoint Online, and OneDrive for Business. This new auditing feature is different than auditing logging…

Read More

Building the Next-Gen Security Operations Center (SOC)

To handle the skyrocketing volume of malware and cyber exploits, many enterprises are building SOCs that provide a central place for detecting, diagnosing, and remediating online attacks. Thanks to the development of new capabilities and technologies, today’s security operations center…

Read More

How To Get Your Hands Around Security Analytics

Your Guide to Security Analytics “Big data” has dominated the enterprise market lately, with businesses wanting to filter their data using analytics tools. But what does all of this really mean? How can security analytics help a company perform more…

Read More

NetMon & Behavior Analysis

Achieve Real-Time Network Visibility When attackers compromise the perimeter or are operating from within, you need to know. You can only stop attackers from gaining a foothold in your network to expand their presence if you can see them. The…

Read More

Triage: The Art of Threat Detection and Risk Assessment

In healthcare, medical professionals use triage procedures to quickly assess, prioritize and allocate the right resources to treat patients, adjusting their response to the severity of the situation. Similar to healthcare, today’s cybersecurity teams are dealing with a constant barrage…

Read More

Activated Charcoal

Making Sense of Endpoint Data Security operations is all about understanding and acting upon of large amounts of data. When you can pull data from multiple sources, condense it down and correlate across systems, you are able to highlight trends,…

Read More

Beyond the Sticker Price

Factors Impacting the Total Cost of Ownership of a SIEM Many organizations today are losing the race against the hacker community by a large margin. As noted in the Verizon 2016 Data Breach Investigation Report, the percent of compromises that…

Read More

Top 8 Things to Analyze in Outbound Packets

Most modern malware operates as part of a system. Whether it’s a multi-part kill chain with droppers and payloads, a botnet with command and control servers, or ransomware encrypting files, the malware on the compromised system talks to other systems…

Read More

SANS 2016 Incident Response Survey

Emerging Trends in Incident Response and Survey Results This webinar will cover the results of the third annual SANS survey on incident response. It will explore the continuing evolution of incident response, how tactics and tools have changed in the…

Read More

Discover hidden threats with User Behaviour Analytics (UBA)

As a cyber security professional, you already know that users are both an organisation’s greatest asset and its greatest vulnerability. Users can do great damage— and they’re notoriously difficult to catch. Many companies are confronting this challenge with User Entity…

Read More

Do You Really Know Your Users?

How User Behavior Analytics Can Help You to Detect User Threats As a cybersecurity pro, you already know that users are both an organization’s greatest asset and its greatest vulnerability. Users can do great damage—and they’re notoriously difficult to catch.…

Read More