Hi [[ session.user.profile.firstName ]]

LogRhythm Europe | Security. Made Smarter.

  • Date
  • Rating
  • Views
  • Reduce time to detect and respond to cyber threats - without adding resources
    Reduce time to detect and respond to cyber threats - without adding resources Chris Martin, LogRhythm Security Expert Recorded: Sep 18 2018 48 mins
    Today’s reality is that organisations will continue to be confronted by increasingly frequent and complex cyber threats. It’s not a matter of if your organisation will be compromised, but when.

    The Threat Lifecycle Management Framework (TLM) is a series of aligned security operations capabilities. It begins with the ability to see broadly and deeply across your IT environment and ends with the ability to quickly mitigate and recover from security incidents. The result? A reduction in your mean time to detect and mean time to respond without adding staff to accomplish the job.

    In this webcast, Chris Martin, LogRhythm security expert, will explain what TLM is and demonstrate how the end-to-end security workflow helps reduce your mean time to detect and respond to cyber threats.

    You’ll learn:

    • The definition and details of the TLM framework
    • How TLM enables you to sort through the noise to highlight and investigate concerning incidents
    • How TLM works to streamline processes through automated workflow
    • Specific use cases TLM can address to prevent major data breaches

    Register now to learn how to enhance your threat detection and response capabilities with LogRhythm and Threat Lifecycle Management (TLM).
  • Top Windows Security Logs for UEBA
    Top Windows Security Logs for UEBA Randy Franklin Smith, Windows Security Expert (UWS); Matt Willems, Technical Product Manager (LogRhythm) Recorded: Sep 4 2018 105 mins
    User and entity behaviour analytics (UEBA) and security information and event management (SIEM) are separate security solutions that can work together to detect shifts in behaviour that indicate a compromise. UEBA is enhanced by leveraging the data collected and enriched by a SIEM, and SIEM capabilities are expanded by ingesting UEBA events for further correlation.

    One of the best ways to understand this symbiotic relationship is to take an actual source of security events and apply UEBA to it. In this on-demand webinar, Matt Willems, LogRhythm’s technical product manager, joins Ultimate Window Security’s Randy Franklin Smith to uncover the relationship between UEBA and SIEM — giving you an inside view of user behaviour analysis in action.

    In this webcast, you’ll learn how to apply UEBA and SIEM using data from the Windows Security Log to track:

    - When a user normally logs on
    - The computer from which the user authenticates
    - Additional computers the user accesses

    The webinar identifies the most important events from the Windows Security Log for UEBA and the roles that generate them, as well as challenges in correlation. In addition, you’ll learn about alternative logs that augment user behaviour analysis.

    Presenters will also cover:

    - Examples of identity construction from user identifiers such as Active Directory credentials and email addresses (both corporate and personal)
    - Dynamic baselining (i.e., what is normal in your environment vs. a threshold/whitelist/blacklist)
    - Two UEBA use cases: one that focuses on authentication from an abnormal location and another that highlights an unusual time/blacklisted location

    Watch the webinar to learn how to successfully apply UEBA to security events.
  • Managing Cybersecurity Risk and Delivering Business Value
    Managing Cybersecurity Risk and Delivering Business Value Craig Saunderson, Reliance acsn & Amardeep Sachdev, LogRhythm Recorded: Jul 19 2018 40 mins
    Your job is to protect your organisation from the risk associated to cyberattacks. Resources may be tight, you may be struggling with too many alerts, and you may not be getting the visibility you need. As such, constantly evolving threats can slip through the cracks and the risk of suffering a damaging breach could be causing you to lose sleep.

    Join LogRhythm and Reliance ascn to discover what managing cyber risk really means and how the right approach can help you deliver continuous value to the business. We’ll outline how you can reduce your organisation’s cyber risk with a smarter approach to cybersecurity that maximises the efficiency and effectiveness of your security operations centre.

    Join us to:

    • Understand the challenges our customers are facing & how they’re overcoming them
    • Discover the technologies & processes you can use to manage and reduce cyber risk
    • Understand how NextGen SIEM enables measurably faster threat detection and response
    • Learn how automation and orchestration boosts efficiency and productivity
    • Hear how machine learning and true AI capabilities can enhance your security analytics
  • GDPR Compliance: Keep it SIEMple
    GDPR Compliance: Keep it SIEMple Rob McGovern & Chris Dutch, LogRhythm Recorded: Jun 19 2018 58 mins
    GDPR is live. Whether you are deep into your compliance initiatives or playing catchup, you should know how your SIEM plays a key role in supporting your compliance efforts.

    Join LogRhythm’s compliance experts to learn how we, as a cyber-security vendor, are not only working through our own compliance needs, but also finding ways to make it easier to achieve compliance.

    Discover:

    •How GDPR is playing out in the real world
    •What LogRhythm is doing for our own GDPR compliance
    •How to leverage LogRhythm’s experience and GDPR Compliance Module to simplify your own compliance efforts

    Register today to see how other organisations are handling compliance with GDPR and learn how a SIEM solution like LogRhythm can streamline your compliance with the regulation.
  • Securing the IoT: Keeping planes in the air and the lights on at home
    Securing the IoT: Keeping planes in the air and the lights on at home Adam Brady & Mark Baker, LogRhythm Recorded: Jun 12 2018 48 mins
    The Internet of Things (IoT) will generate, process and share more data than ever before. Data that needs to be secured.

    The data generated by non-traditional sensors and systems can help detect anomalous behaviour and maintain the uptime we expect from the new wave of connected devices.

    In this webinar, LogRhythm’s security experts will explain how this data can be used, with examples from a range of industries – from jet turbine manufacturers to in-home automation providers.

    Join the webinar to discover:
    1. How IoT devices blur the boundaries between IT security, operational technology and security in the physical world
    2. How to gain visibility into the data generated by these devices – and what it really means
    3. What customers have experienced through real-life use cases
  • Best practices with UEBA: LogRhythm customer use cases
    Best practices with UEBA: LogRhythm customer use cases Stephen Frank, director of technology & security (NHLPA) | Damon Gross, sales engineer, (LogRhythm) Recorded: Jun 12 2018 48 mins
    Security teams are increasingly using User and Entity Behaviour Analytics (UEBA) to detect, prioritise, and respond to anomalous and alarming user behaviour.

    Hear from a LogRhythm customer, Stephen Frank, director of technology & security at National Hockey League Players Association (NHLPA), sharing how his team has applied UEBA to meet their security needs. Along with Damon Gross from LogRhythm, they will share use cases and how LogRhythm is supporting their security initiatives.

    Join us to discover
    • Why UEBA is a critical component to effective security
    • A customer's security environment challenges and key use cases
    • Innovations and advancements in UEBA
    • A short showcase of UEBA capabilities from inside the LogRhythm platform

    Register now to get an inside look at how NHLPA is enhancing their UEBA capabilities.
  • Protecting your business from ransomware - Have we learned lessons?
    Protecting your business from ransomware - Have we learned lessons? Rob McGovern (LogRhythm) | Nick Frost (Principal Consultant, ISF) | Raja Mukerji (ExtraHop) | Patrick Grillo (Fortinet) Recorded: Jun 6 2018 45 mins
    Have we learned lessons from the hardest hitting ransomware attacks to date; Wannacry, NotPetya? What are organisations doing to prepare for the next big attack?

    Join top security experts for this interactive Q&A discussion on:
    - The trends in ransomware attacks
    - Backups, patches and other ways you can protect your data
    - How to bolster your organisation's security culture
    - Other threats on the horizon

    Speakers:
    - Rob McGovern, Technical Product Manager, LogRhythm
    - Nick Frost, Principal Consultant, Information Security Forum (ISF)
    - Raja Mukerji, Co-Founder and President, ExtraHop
    - Patrick Grillo, Senior Director Solutions Marketing, Fortinet

    The session was streamed live from London at the Infosecurity Europe conference.
  • Securing the banking industry: Detecting threats and mitigating cyberattacks
    Securing the banking industry: Detecting threats and mitigating cyberattacks Amardeep Sachdev, LogRhythm & Tony Masse, LogRhythm Recorded: May 22 2018 43 mins
    The banking industry is a lucrative target for cybercriminals and the increase in attacks is a huge concern for CISOs in the industry. Threats are evolving, getting more sophisticated and insider threats are increasing. In particular, payment fraud is key concern for the industry and pressure is mounting on security teams to avoid breaches as well as complying with more and more regulations and frameworks.

    With attackers more determined and sophisticated, we must be able to detect anomalous activity, such as fraud, quickly to reduce the risk of suffering a damaging consequence/breach. This is especially true within the SWIFT environment and its security controls framework aims to establish a security baseline for the SWIFT community to help maintain a secure environment for all its users.

    In this presentation, LogRhythm experts will focus on specific security controls from the framework and outline how SIEM and UEBA can be used to detect anomalous activity in a user’s local environment and how it can be stopped with the right response and mitigation approach. We will also outline how to automate compliance and other processes to help free up time to focus on real, higher risk alerts.

    Join this session to:
    •Understand what a typical cyberattack on a user’s local environment would look like with a real use case.
    •Discover how the SWIFT security controls can be supported by SIEM solutions.
    •How compliance automation can enable your organisation to meet regulatory and compliance demands efficiently.
  • Detecting dangerous user behaviour: Use cases from SANS & LogRhythm
    Detecting dangerous user behaviour: Use cases from SANS & LogRhythm Dave Shackleford, analyst and instructor, SANS | Seth Goldhammer, senior director of product management, LogRhythm Recorded: May 3 2018 51 mins
    When threats occur, underesourced security operations centres (SOCs) lack sufficient access to contextual information. This lack of visibility is a key problem that LogRhythm CloudAI for User and Entity Behaviour Analytics (UEBA) are designed to solve.

    In this product-related webcast, Dave Shackleford, senior SANS instructor and analyst, joins Seth Goldhammer from LogRhythm, to explore how CloudAI uses supervised and unsupervised learning to establish baselines and monitor user behaviour.

    Shackleford reviews the product openely during this webcast and runs through various use cases, such as insider threat, account compromise, and admin abuse.

    Discover how LogRhythm CloudAI:

    - Detects malicious user behaviour
    - Scores user activities, provides recommendations and takes automated actions
    - Supports threat hunting and incident response capabilities
    - Improves the machine learning experience through supervised and unsupervised learning

    Join us to understand how LogRhythm CloudAI can help you detect anomalous user behaviour and rapidly mitigate threats.
  • Understanding ransomware: Insights from threat research
    Understanding ransomware: Insights from threat research Erika Noerenberg | Senior Malware Analyst | LogRhythm Recorded: Apr 5 2018 42 mins
    Ransomware has dominated recent cybersecurity news and made mainstream headlines throughout 2017. While there are ways to protect organisations against ransomware, cybercriminals are constantly evolving their tactics to stay ahead of security teams.

    In this webinar, Erika Noerenberg, senior malware analyst, will discuss the ransomware threat and the biggest ransomware events to date, including WanaCry and NotPetya. She’ll also provide valuable threat intelligence and key defensive strategies to help you protect your organisation from ransomware.

    You’ll discover:
    • An introduction to ransomware
    • Notable ransomware threats
    • Ransomware threat research
    • Key mitigation and defensive strategies

    Register now to hear about the rise of ransomware and tips to defend your organisation.

Embed in website or blog