Hi [[ session.user.profile.firstName ]]

LogRhythm Europe | Security. Made Smarter.

  • Date
  • Rating
  • Views
  • GDPR Compliance: Keep it SIEMple
    GDPR Compliance: Keep it SIEMple Rob McGovern & Chris Dutch, LogRhythm Recorded: Jun 19 2018 58 mins
    GDPR is live. Whether you are deep into your compliance initiatives or playing catchup, you should know how your SIEM plays a key role in supporting your compliance efforts.

    Join LogRhythm’s compliance experts to learn how we, as a cyber-security vendor, are not only working through our own compliance needs, but also finding ways to make it easier to achieve compliance.

    Discover:

    •How GDPR is playing out in the real world
    •What LogRhythm is doing for our own GDPR compliance
    •How to leverage LogRhythm’s experience and GDPR Compliance Module to simplify your own compliance efforts

    Register today to see how other organisations are handling compliance with GDPR and learn how a SIEM solution like LogRhythm can streamline your compliance with the regulation.
  • Securing the IoT: Keeping planes in the air and the lights on at home
    Securing the IoT: Keeping planes in the air and the lights on at home Adam Brady & Mark Baker, LogRhythm Recorded: Jun 12 2018 48 mins
    The Internet of Things (IoT) will generate, process and share more data than ever before. Data that needs to be secured.

    The data generated by non-traditional sensors and systems can help detect anomalous behaviour and maintain the uptime we expect from the new wave of connected devices.

    In this webinar, LogRhythm’s security experts will explain how this data can be used, with examples from a range of industries – from jet turbine manufacturers to in-home automation providers.

    Join the webinar to discover:
    1. How IoT devices blur the boundaries between IT security, operational technology and security in the physical world
    2. How to gain visibility into the data generated by these devices – and what it really means
    3. What customers have experienced through real-life use cases
  • Best practices with UEBA: LogRhythm customer use cases
    Best practices with UEBA: LogRhythm customer use cases Stephen Frank, director of technology & security (NHLPA) | Damon Gross, sales engineer, (LogRhythm) Recorded: Jun 12 2018 48 mins
    Security teams are increasingly using User and Entity Behaviour Analytics (UEBA) to detect, prioritise, and respond to anomalous and alarming user behaviour.

    Hear from a LogRhythm customer, Stephen Frank, director of technology & security at National Hockey League Players Association (NHLPA), sharing how his team has applied UEBA to meet their security needs. Along with Damon Gross from LogRhythm, they will share use cases and how LogRhythm is supporting their security initiatives.

    Join us to discover
    • Why UEBA is a critical component to effective security
    • A customer's security environment challenges and key use cases
    • Innovations and advancements in UEBA
    • A short showcase of UEBA capabilities from inside the LogRhythm platform

    Register now to get an inside look at how NHLPA is enhancing their UEBA capabilities.
  • Protecting Against Ransomware
    Protecting Against Ransomware Nick Frost (Principal Consultant, ISF) | Raja Mukerji (ExtraHop) | Patrick Grillo (Fortinet) | Rob McGovern (LogRhythm) Recorded: Jun 6 2018 45 mins
    What are the lessons learned from the biggest ransomware attacks to date (Wannacry, NotPetya)? How are organizations preparing against the next big attack?

    Join top security experts for this interactive Q&A discussion on:
    - Trends in ransomware attacks
    - Backups, patches and other ways to protect your data
    - How to bolster your organization's security culture
    - Other threats on the horizon

    Speakers:
    - Nick Frost, Principal Consultant, Information Security Forum (ISF)
    - Raja Mukerji, Co-Founder and President, ExtraHop
    - Patrick Grillo, Senior Director Solutions Marketing, Fortinet
    - Rob McGovern, Technical Product Manager, LogRhythm

    The session will be streamed LIVE from London from the Infosecurity Europe conference.
  • Securing the banking industry: Detecting threats and mitigating cyberattacks
    Securing the banking industry: Detecting threats and mitigating cyberattacks Amardeep Sachdev, LogRhythm & Tony Masse, LogRhythm Recorded: May 22 2018 43 mins
    The banking industry is a lucrative target for cybercriminals and the increase in attacks is a huge concern for CISOs in the industry. Threats are evolving, getting more sophisticated and insider threats are increasing. In particular, payment fraud is key concern for the industry and pressure is mounting on security teams to avoid breaches as well as complying with more and more regulations and frameworks.

    With attackers more determined and sophisticated, we must be able to detect anomalous activity, such as fraud, quickly to reduce the risk of suffering a damaging consequence/breach. This is especially true within the SWIFT environment and its security controls framework aims to establish a security baseline for the SWIFT community to help maintain a secure environment for all its users.

    In this presentation, LogRhythm experts will focus on specific security controls from the framework and outline how SIEM and UEBA can be used to detect anomalous activity in a user’s local environment and how it can be stopped with the right response and mitigation approach. We will also outline how to automate compliance and other processes to help free up time to focus on real, higher risk alerts.

    Join this session to:
    •Understand what a typical cyberattack on a user’s local environment would look like with a real use case.
    •Discover how the SWIFT security controls can be supported by SIEM solutions.
    •How compliance automation can enable your organisation to meet regulatory and compliance demands efficiently.
  • Detecting dangerous user behaviour: Use cases from SANS & LogRhythm
    Detecting dangerous user behaviour: Use cases from SANS & LogRhythm Dave Shackleford, analyst and instructor, SANS | Seth Goldhammer, senior director of product management, LogRhythm Recorded: May 3 2018 51 mins
    When threats occur, underesourced security operations centres (SOCs) lack sufficient access to contextual information. This lack of visibility is a key problem that LogRhythm CloudAI for User and Entity Behaviour Analytics (UEBA) are designed to solve.

    In this product-related webcast, Dave Shackleford, senior SANS instructor and analyst, joins Seth Goldhammer from LogRhythm, to explore how CloudAI uses supervised and unsupervised learning to establish baselines and monitor user behaviour.

    Shackleford reviews the product openely during this webcast and runs through various use cases, such as insider threat, account compromise, and admin abuse.

    Discover how LogRhythm CloudAI:

    - Detects malicious user behaviour
    - Scores user activities, provides recommendations and takes automated actions
    - Supports threat hunting and incident response capabilities
    - Improves the machine learning experience through supervised and unsupervised learning

    Join us to understand how LogRhythm CloudAI can help you detect anomalous user behaviour and rapidly mitigate threats.
  • Understanding ransomware: Insights from threat research
    Understanding ransomware: Insights from threat research Erika Noerenberg | Senior Malware Analyst | LogRhythm Recorded: Apr 5 2018 42 mins
    Ransomware has dominated recent cybersecurity news and made mainstream headlines throughout 2017. While there are ways to protect organisations against ransomware, cybercriminals are constantly evolving their tactics to stay ahead of security teams.

    In this webinar, Erika Noerenberg, senior malware analyst, will discuss the ransomware threat and the biggest ransomware events to date, including WanaCry and NotPetya. She’ll also provide valuable threat intelligence and key defensive strategies to help you protect your organisation from ransomware.

    You’ll discover:
    • An introduction to ransomware
    • Notable ransomware threats
    • Ransomware threat research
    • Key mitigation and defensive strategies

    Register now to hear about the rise of ransomware and tips to defend your organisation.
  • Optimise phishing detection and response with LogRhythm and Office 365
    Optimise phishing detection and response with LogRhythm and Office 365 Randy Franklin Smith (UWS) | Greg Foss (LogRhythm) Recorded: Apr 3 2018 78 mins
    Today’s hackers often favour the phishing email as their weapon of choice. Phishing attacks are not only common, but are also very difficult to defend against. What if you could detect and mitigate a phishing attack before its intended target clicks on that fatal link or opens that malicious attachment?

    When your Exchange server is in the Office 365 cloud, solutions such as constant inbox scanning or relying on synchronous mail flow aren’t viable options. Instead, you can find a strong defence against phishing emails in the Message Tracking log in Exchange.

    The Message Tracking log is available in both on-prem Exchange and Office 365 Cloud’s Exchange Online. Message Tracking logs include valuable information about the client, servers, sender, recipients, message subject, and more. If you can access this information and know how to mine it, you can detect likely phishing emails.

    In this webinar, you’ll learn how to:

    - Recognise the format of message tracking logs
    - Pull message tracking logs from Office 365 using PowerShell’s Get-MessageTrackingLog cmdlet
    - Work through a list of checks to perform against message tracking events to detect phishing emails
    - Move suspect emails to a sandbox where you can use analysis tools like PhishTank, ThreatGRID, or OpenDNS
    - Remove copies of phishing emails from other recipients
    - Automatically detect and respond to phishing attacks with no analyst intervention
    - To optimise your phishing response efficiency, LogRhythm has introduced a new open-source Phishing Intelligence Engine (PIE). PIE is a PowerShell framework focused on phishing attack detection and response.

    Register for the webinar now to discover how you can use LogRhythm’s PIE and Office 365 to better detect and respond to phishing attacks.
  • Hunting Rogue Elements: Fighting the Insider Threat
    Hunting Rogue Elements: Fighting the Insider Threat Kevin Eley, LogRhythm & Jonathan Zulberg, LogRhythm Recorded: Mar 22 2018 42 mins
    Customer data falling into the hands of cybercriminals. It’s the stuff of nightmares for any organisation. Today the insider threat has the potential to pose a bigger risk to cybersecurity than external hackers.

    In this webinar, LogRhythm experts will take you through a real use case in which data worth millions of pounds was stolen. And they will explain how the incident could have been stopped with the right response and mitigation approach.

    Join the webinar to:

    • Learn how cybercrime has evolved so much that insider threats now rival external threats
    • See a live display of activity generated by an insider threat
    • Discover cybersecurity innovations that can detect and respond to insider threats in real time

    Join us to get a better understanding of the insider threat – and how to combat rogue elements in your organisation.
  • Going on the offensive: Incorporating threat hunting into your security
    Going on the offensive: Incorporating threat hunting into your security Andrew Costis, threat research engineer, LogRhythm Recorded: Mar 20 2018 60 mins
    Threat hunting is the latest strategy to keep networks secure. Put simply, it refers to the process of proactively searching for advanced threats that may have eluded security systems. In other words, going after the ones that slipped through the net.

    It’s important to know that threat hunting is more than industry hype. It provides security professionals with a powerful weapon with which to combat threat actors. So, is time to go on the offensive?

    •Learn why threat hunting should be on your security mandate for 2018
    •Discover some of the core requirements for getting started with threat hunting
    •Hear how you can you jump start your threat hunting mindset
    •Learn how a simple threat hunt can unravel a more sophisticated attack

    Join our webinar to hear Andrew Costis, threat research engineer at LogRhythm Labs, outline how a simple hunt uncovered a malicious insider attack by a privileged user.

Embed in website or blog