Hi [[ session.user.profile.firstName ]]

Security Analytics by ExtraHop

  • Date
  • Rating
  • Views
  • 72-Hours-to-Disclose Survival Guide
    72-Hours-to-Disclose Survival Guide
    John Pescatore (SANS) and John Matthews (ExtraHop Networks) Recorded: Feb 26 2019 58 mins
    72-Hours-to-Disclose Survival Guide: Accurate Scoping and Impact Assessment of Breaches

    With data breach reporting requirements tightening, there even greater pressure on incident response teams to understand the scope and impact of an incident. This webinar will discuss the role that network traffic analysis can play in speeding up incident response. You will learn how network traffic analysis can provide the context needed to empower your analysts to quickly investigate incidents and get definitive answers.
  • Rise Above Complex Workflows: Practical Ways to Accelerate Incident Response
    Rise Above Complex Workflows: Practical Ways to Accelerate Incident Response
    Matt Cauthorn, ExtraHop Networks; Paul Asadoorian. Security Weekly; Matt Alderman, Security Weekly Recorded: Feb 15 2019 61 mins
    Does your security investigation and incident response workflow "spark joy," or does it just leave you with more questions that are tough to answer? How do you improve your current data collection, tools, and workflows? In this session, ExtraHop’s VP of Cyber Security Engineering, Matt Cauthorn, will provide practical advice for how to identify areas for improvement in your incident response practice. Learn how Network Traffic Analysis can provide the visibility and data access needed to take investigations from many hours to just a few clicks.
  • ExtraHop #2: Case Study: Proactive Security Hygiene in a Hybrid Enterprise
    ExtraHop #2: Case Study: Proactive Security Hygiene in a Hybrid Enterprise
    Mike Sheward, Senior Director of Information Security, Accolade; Brandon Dunlap, Moderator Recorded: Feb 14 2019 56 mins
    Ever wonder how network traffic analysis (NTA) can reduce and harden an organization’s attack surface? In this webcast, the Director of Information Security at Accolade present a case study on how they use NTA to audit their security hygiene in real time, assuring that current standards for handling regulated data are being followed, and that all apps, services, and devices follow established security protocols to proactively reduce the chances of a data breach.
  • ExtraHop #1: Getting More Value from SecOps Frameworks
    ExtraHop #1: Getting More Value from SecOps Frameworks
    John Matthews, CIO, ExtraHop, Brandon Dunlap (Moderator) Recorded: Feb 12 2019 53 mins
    Attack and Control frameworks provided by such organizations like NIST, CIS and MITRE can help enterprises to improve, understand their capabilities and build better security. Join ExtraHop and (ISC)2 for a webcast on how to leverage these frameworks to better understand how network traffic analysis can provide the visibility and actionable insights to accelerate an enterprise's success at increasing security maturity.
  • ExtraHop #3: How to Succeed at Threat Hunting & IR: Think Differently about Data
    ExtraHop #3: How to Succeed at Threat Hunting & IR: Think Differently about Data
    Matt Cauthorn, VP of Cyber Security Engineering, ExtraHop; Brandon Dunlap, Moderator Recorded: Feb 11 2019 1 min
    Two pillars of a successful and proactive SOC are threat hunting and incident response. The use of network traffic analysis can help improve performance in these two areas. This webcast will examine threat hunting and incident response and how network traffic analysis can make Tier 1 and Tier 3 analysts faster and more effective at validating, investigating, and responding to threats and security incidents.
  • How IT Security Teams Can Use Machine Learning to Improve Data Defense
    How IT Security Teams Can Use Machine Learning to Improve Data Defense
    Jeff Costlow, ExtraHop Networks; Lisa O'Connor, Accenture Labs; and Malek Ben Salem, Accenture. Recorded: Jan 31 2019 63 mins
    A new wave of machine learning technology promises to help IT security operations teams detect cyber threats sooner and respond to them more quickly. But machine learning is used in a wide variety of ways, and not all machine learning-based products work in the same fashion.

    In this webinar, experts will discuss the ways that machine learning can help in security operations, how it can speed threat analysis, and how to evaluate and choose technologies that will work in your organization.

    Attend this webinar to:
    - Finally learn the differences between machine learning and artificial intelligence
    - Get a tour of the ways machine learning can -- and can't -- enhance your security operations
    - Feel confident planning how and where to incorporate machine learning tools and techniques into your cyber defense strategy
  • NetOps and SecOps: Better Together
    NetOps and SecOps: Better Together
    Ryan Davis, Sr. Product Marketing Manager, ExtraHop Networks and Scott Register, VP of Product Management, Ixia Recorded: Jan 22 2019 38 mins
    Things used to be simple. The Networking team focused on network performance and availability while Security teams dealt with threats to performance. Today, the growth of cloud, virtualization, and everything-as-a-service has changed all this, blurring the lines between NetOps and SecOps and creating a need for better alignment and sharing of data.

    The experts from ExtraHop and Ixia will reveal new insights into best practices for alignment and delivering the right data—even if it’s the same data—to each team. They’ll cover:
    - Changing focus and emerging challenges for networking, security, and cloud teams
    - Actions to take to streamline operations
    - Tips for improving performance and security
  • Dark Reading Panel: The Next-Generation Security Operations Center
    Dark Reading Panel: The Next-Generation Security Operations Center
    Kelly Jackson Higgins, Dark Reading; Roselle Safran, President, Rosint Labs; Jeff Costlow, Deputy CISO, ExtraHop Recorded: Dec 18 2018 48 mins
    In the past, the IT security department focused most of its efforts on building and managing a secure "perimeter" and spent most of its time managing passwords and access control lists. Today, however, the security operations center (SOC) has become a place for not only building a strong defense against the latest attacks, but for analyzing and responding to new attacks that have evaded traditional defenses. Hear war stories and recommendations in SOC operations –including how to prepare.
  • 2019 and Beyond: Incident Detection and Response at Wire Speed
    2019 and Beyond: Incident Detection and Response at Wire Speed
    Chris Kissel, IDC, and Barbara Kay, ExtraHop Recorded: Dec 5 2018 54 mins
    While some innovations deliver material benefit, many aren’t worth your POC time. In this webinar, featured speaker Chris Kissel, Research Director, Security Products and head of the IDC security analytics and orchestration practice, will present new research on what will disrupt, what will innovate, and what will merely evolve in the security analytics market over the next several years. Futurescape trends provide insights on the best ideas enhancing incident detection and response and provide a look at the ideal use cases for the most beneficial new technologies.
  • 3 Ways to Use Your Network as a Force Multiplier for Incident Response
    3 Ways to Use Your Network as a Force Multiplier for Incident Response
    David Monahan, Senior Analyst, EMA and John Matthews, CIO, ExtraHop Recorded: Nov 28 2018 56 mins
    The shortage of skilled security professionals won’t end anytime soon, but you can improve your incident response (IR) capabilities now by taking advantage of your network traffic for early detection and more investigation. In this webinar, EMA Managing research Director David Monahan will join ExtraHop CIO John Matthews to explain how you can make your staff more productive by automatically prioritizing your most critical assets, providing context to alerts, and putting full transaction details at the fingertips of analysts during investigations.

    In this webinar, you’ll learn how to:
    - Use your network as a force multiplier for SecOps
    - Equip junior security staff to do more by providing them with greater context and analysis
    - Reduce your attack surface and prioritize response on your most critical assets

Embed in website or blog