Hi [[ session.user.profile.firstName ]]

Alert Logic

  • Date
  • Rating
  • Views
  • Five Recommendations to Strengthen Your Security Program
    Five Recommendations to Strengthen Your Security Program
    Jack Danahy - SVP, Security Recorded: May 16 2019 60 mins
    Cyber attack methods have evolved aggressively to become more targeted, more sophisticated, and more frequent. For this webinar we have distilled 5 of the most common and urgent problems that enterprises face, and will share our analysis of the issues and practical recommendations for addressing them within your own security program.

    Join Jack Danahy, SVP, Security, as he outlines steps to:

    •Track and combat the evolving threat landscape
    •Increase visibility and resistance at the attack surface
    •Battle alert fatigue and the security talent shortage
    •Define a cyber-risk baseline and process for your security program

    Attendees will receive a Security Workbook with steps to take within the next 30 days to assess and improve their enterprise security program.
  • Another Bucket Bites the Dust... Simplifying AWS Cybersecurity
    Another Bucket Bites the Dust... Simplifying AWS Cybersecurity
    Dan Pitman, Principal Security Architect, Alert Logic Recorded: May 16 2019 54 mins
    With the rapid rise of web application attacks, which is the number one source of data breaches, securing cloud-based web applications is a challenge. In order to fully protect your web applications in the cloud, it is important to know the risks, select the right security tool, and understand your role in the shared responsibility for security.

    Securing your AWS workload can mean many different things, ranging from locking down your environment via the AWS best practices list, to completely outsourcing the security management and responsibility to another company. While every company’s security journey is different, everyone can agree that the need to monitor and improve security posture is becoming increasingly important.

    Start here with Dan Pitman, Principal Security Architect, Alert Logic as he lists the top considerations to better protect your AWS workloads and applications. Learn the core fundamentals to a stronger AWS cloud security strategy.

    Register now and gain key security takeaways, including:
    • Guidelines to security risk: understanding your AWS environment and the exposures your web apps face
    • Learnings from top configuration vulnerabilities involving root, S3, IAM, security groups, and more
    • How security incidents differ on hybrid networks versus public-cloud installations
    • Threat detection capabilities and creating an effective incident response plan
  • Defending Against Cyber Threats: Hack Attack
    Defending Against Cyber Threats: Hack Attack
    Graeme McMillan, Solutions Architect, Alert Logic Recorded: May 16 2019 18 mins
    Data breaches are now a common global occurrence, causing real economic damage to businesses. Lost revenue, damaged reputations, disrupted operations, and significant costs to recover, cyber attackers are adapting their techniques at a much faster pace than most businesses. These once less sophisticated cyber criminals now have easier access to automated exploits that were previously only available to highly skilled nation-state actors.

    Unfortunately protecting an organisation against a cyber threat becomes impossible if you don’t know that the threat exists. So how do you protect your organisations against known and unknown threats? Security is constantly changing. To stay ahead of cyber threats, you need to leverage software plus services to augment your security team and capabilities.

    Join this webinar to hear about emerging threats and the current state of web application vulnerabilities. Learn about the most impactful web app attacks as well as remediation strategies. And take away best practices on how to ensure secure continuity in the cloud.

    Highlights Include:
    • Cyber Hack Demo
    • Insights from Alert Logic's 2018 Critical Watch Report
    • Understand how today’s vulnerabilities are being exploited
    • Realities for scaling threat detection & response across on-prem to cloud environments

    An exciting and very important demonstration for anyone who develops applications, manages websites or is interested in security.
  • This is Security: Nothing is what it SIEMs
    This is Security: Nothing is what it SIEMs
    Dan Pitman, Principal Security Architect, Alert Logic Recorded: Apr 29 2019 48 mins
    Companies of every size and across every industry need to have a solution to defend against cyber attacks. For medium-sized and budget-constrained companies especially – the array of security technologies and solution and the volume of cyber threats can make the challenge seem overwhelming.

    Organizations suffer trying to manage raw data, security events and false positive incidents with limited context, overworked staff, and a lack of threat landscape knowledge. There is a better way to improve your security without the time, effort, and cost of purchasing and integrating multiple tools, a traditional SIEM or expensive traditional security outsourcing vendors.

    A seamless combination of platform, threat intelligence, and expert services can provide a simpler, most cost-effective approach to security for all infrastructure and workloads across physical, virtual and cloud environments.

    Get the inside scoop on a new approach to threat management that gives you the right level of coverage for the right resources. Join our Principal Security Architect, Dan Pitman to learn more about this more effective approach to cybersecurity and threat management.

    Highlights Include:
    • Insights from Alert Logic's 2018 Critical Watch Report
    • Realities for scaling threat detection & response across on-prem to cloud environments
    • Understand how today’s vulnerabilities are being exploited
    • Find out how to achieve the right level of leverage for the optimal level of investment
  • Cybersecurity in Financial Services: No one can afford a cyber attack
    Cybersecurity in Financial Services: No one can afford a cyber attack
    Dan Pitman, Principal Security Architect Recorded: Apr 25 2019 53 mins
    Financial organisations fall victim to cyber-attacks more frequently than any other industries. The growth in volume and sophistication of cyber-threats, combined with regulatory changes, mean that financial institutions are having to improve their IT security postures notably.

    Facing modern cyber-threats head-on requires organisations to follow well-defined processes and mature IT security tools that need to be closely monitored and managed. Additionally, financial businesses handle highly confidential data that must be stored in a compliant manner and managed securely. A seamless combination of platform, threat intelligence, and expert services can provide a simpler, most cost-effective approach to security for all infrastructure and workloads across physical, virtual and cloud environments.

    Get the inside scoop on a new approach to threat management that gives financial organisations the right level of coverage for the right resources. Join our Principal Security Architect, Dan Pitman, to learn more about this more effective approach to cybersecurity and threat management in the financial world.

    Highlights Include:
    • The state of cybersecurity at financial institutions
    • Integrating security and compliance within Financial Services
    • Understand how today’s vulnerabilities are being exploited
    • Find out how to achieve the right level of leverage for the optimal level of investment
  • This is Security: Stories from the SOC
    This is Security: Stories from the SOC
    Dan Pitman, Principal Security Architect, Alert Logic Steffan Jones, Manager, Security Operations Centre Recorded: Apr 11 2019 50 mins
    Security Operations Center (SOC) analysts are people who understand security, technology and the business – they watch your back 24/7 – and they’ve seen it all.. A SOC provides proactive threat monitoring, threat detection, and advice to stop cyber threats in their tracks.

    Staying continuously ahead of elusive assaults is a daily challenge security professionals face and you may be surprised at what goes on behind the scenes to keep you safe. To win, you need the capabilities of a modern, fully-staffed SOC. With the Alert Logic threat intelligence team, you get an army of researchers on your side, creating the cutting-edge security data necessary to protect your organisation against the latest cyber threats. 24/7 expert defense, with no added staff, and no more sleepless nights (not only in Seattle).

    In this webinar, our cyber threat experts will walk through:

    • The critical role a SOC plays in a defensive cybersecurity strategy across any platform
    • Techniques used to defend against attempted cyber attacks and breaches
    • Strategies to help you proactively identify and address high risk areas
    • Our SOC gives you the edge over cyber adversaries. Join us and learn how.
  • HIPAA Compliance – Are You Staying Healthy?
    HIPAA Compliance – Are You Staying Healthy?
    Tony Bailey, Director, Product Marketing Recorded: Apr 10 2019 35 mins
    The medical/healthcare industry accounted for more than 23 percent of total cybersecurity breaches*.

    But, keeping up-to-date with HIPAA requirements to help protect data can be difficult. And selecting technologies so your organization can implement security controls to comply with HIPAA regulations can be overwhelming.

    We can help you break it down. In this webinar we will walk through:

    • The current state of HIPAA compliance, and how businesses are stacking up
    • Top reasons for HIPAA compliance failures and how to avoid them
    • A customer example that’s using Alert Logic for their HIPAA compliance project

    And, we’ll share how Alert Logic can help you stay healthy with your HIPAA compliance projects with low cost and effective threat management for achieving and maintain compliance over time with less effort and cost.

    *Identity Theft Resource Center
    https://www.idtheftcenter.org/images/breach/2017Breaches/2017AnnualDataBreachYearEndReview.pdf
  • Cybersecurity in Retail: A Necessity
    Cybersecurity in Retail: A Necessity
    Dan Pitman, Principal Security Architect, Alert Logic Recorded: Mar 28 2019 52 mins
    The retail industry faces a challenging cyber threat environment. Retailers store more consumer data than ever before, across an increasing range of digital platforms, providing cybercriminals with more valuable data to target and more doorways to access it. As retailers invest in new technologies to collect and manage customer data, there is a corresponding rise in the need to navigate the regulatory issues unique to these technologies and to maintain effective system controls to ensure the security of the collected data.

    As hacker techniques are becoming more widespread and sophisticated, it is important to have a comprehensive cyber security strategy in place. The impact of these data breaches can be catastrophic, especially in retail where brand reputation and loyalty are the keys to success. For retailers, more detection capability is necessary. They need access to more diverse, detection-based security controls to give them broader visibility of malicious activity in their network.

    In this live webinar, Dan Pitman at Alert Logic, will analyse the current UK Retail cyber threat landscape and the new approach to threat management that gives you the right level of coverage for the right resources to help you overcome the challenges of retail cyber security.

    • Trends in UK Cyber Crime targeting the Retail and eCommerce Sector
    • Understand what cyber attackers are really after, why, and how they’re getting what they want
    • Realities for scaling threat detection & response across on-prem to cloud environments
  • Why You No Longer Need a SIEM Tool
    Why You No Longer Need a SIEM Tool
    Matt Selheimer, Chief Strategist Recorded: Mar 26 2019 58 mins
    How to handle evolving threats and expanding compliance risks when you have resource constraints.

    For years, organizations have struggled with the high-cost and long time-to-value of implementing Security Information and Event Management (SIEM) tools. Even worse, you may have tried an expensive cybersecurity outsourcing vendor that failed to deliver little more than yet another alert stream.

    Join this webinar instead of being held back by the past. Because the good news is there’s a new approach that seamlessly combines an award-winning security platform, cutting-edge threat intelligence, and 24x7 expert defenders that doesn’t take months or years to implement – with starting costs far less than one FTE a year – yes, you read that right.

    It’s a risk-based approach that gives you the right level of security and compliance coverage for cloud, hybrid, and on-premises environments.

    You really should check it out, unless you want to keep trying to make that SIEM tool work…
  • This is Security: Nothing is what it SIEMs
    This is Security: Nothing is what it SIEMs
    Dan Pitman, Principal Security Architect, Alert Logic Recorded: Mar 21 2019 49 mins
    Companies of every size and across every industry need to have a solution to defend against cyber attacks. For medium-sized and budget-constrained companies especially – the array of security technologies and solution and the volume of cyber threats can make the challenge seem overwhelming.

    Organisations suffer trying to manage raw data, security events and false positive incidents with limited context, overworked staff, and a lack of threat landscape knowledge. There is a better way to improve your security without the time, effort, and cost of purchasing and integrating multiple tools, a traditional SIEM or expensive traditional security outsourcing vendors.

    A seamless combination of platform, threat intelligence, and expert services can provide a simpler, most cost-effective approach to security for all infrastructure and workloads across physical, virtual and cloud environments.

    Get the inside scoop on a new approach to threat management that gives you the right level of coverage for the right resources. Join our Principal Security Architect, Dan Pitman to learn more about this more effective approach to cybersecurity and threat management.

    Highlights Include:
    • Insights from Alert Logic's 2018 Critical Watch Report
    • Realities for scaling threat detection & response across on-prem to cloud environments
    • Understand how today’s vulnerabilities are being exploited
    • Find out how to achieve the right level of leverage for the optimal level of investment

Embed in website or blog