Webcasts

Webcasts

Get the latest tips for solving your security challenges from industry experts.

Discover hidden threats with User Behaviour Analytics (UBA)

As a cyber security professional, you already know that users are both an organisation’s greatest asset and its greatest vulnerability. Users can do great damage— and they’re notoriously difficult to catch. Many companies are confronting this challenge with User Entity…

Read More

Do You Really Know Your Users?

How User Behavior Analytics Can Help You to Detect User Threats As a cybersecurity pro, you already know that users are both an organization’s greatest asset and its greatest vulnerability. Users can do great damage—and they’re notoriously difficult to catch.…

Read More

Leveraging your SIEM to Catch and Respond to Ransomware

Free Training Brought to you by LogRhythm and Ultimate Windows Security Over the past three years, ransomware has jumped into the spotlight of the cyber threat landscape. In fact, the FBI estimates that $1 billion in losses will be incurred…

Read More

Defending Against Cyberthreats: Are You Keeping Up?

An Analysis of CyberEdge’s 2016 Cyberthreat Defense Report Despite record security spending, successful cyberattacks are on the rise. Seventy-six percent of organizations around the globe were compromised by a successful cyber attack in in 2015—up from 62% in 2014. Steve…

Read More

Rightsizing Your SIEM

SC Media 20/20 Webcast SIEM might be old hat for large enterprises, but the explosion of advanced and motivated threats is fueling the SIEM market—even for companies that might not have considered it essential in the past. This can be…

Read More

Defending Against Insider Threats: Malicious and Benign

SC Media 20/20 Webcast How safe are you from an insider attack? Despite the numerous press reports of devastating outsider attacks, insider attacks (deliberate or accidental) put your corporation at risk. In this 20/20 webcast with SC Media, James Carder,…

Read More

Protecting Your Business from the Ransomware Threat

In this webinar, LogRhythm looks at the business problems surrounding the new and evolved ransomware threat. The webinar also gives you a brief technical overview of how these schemes function and how they can be spotted and responded to early…

Read More

PowerShell Audit Logging Deep Dive

Catch Intruders Living off the Land and Enforce Privileged User Accountability PowerShell is like nuclear fission — it’s powerful, and it can be used for good and evil. PowerShell is one of the best post-exploitation tools out there simply because it’s…

Read More