Hi [[ session.user.profile.firstName ]]

LogRhythm APJ | NextGen SIEM Platform

  • Date
  • Rating
  • Views
  • The role of  SIEM: Combating todays cybersecurity risks
    The role of SIEM: Combating todays cybersecurity risks
    Erik Bartholomy (LogRhythm) and Eric Parent (Sonepar) Recorded: Mar 26 2019 47 mins
    Building a Cybersecurity Architecture to Combat Today’s Risks:
    Foundations, Visions, Testing and the Role of SIEM

    The rapid development and adoption of cloud infrastructure, mobile workforces, IoT and other susceptible environments has mandated a reappraisal of security architecture. Modern organisations are recognising their security posture may not be keeping up with the threat landscape, and this leads to frightening discoveries around the safety of their data and networks.

    Join Erik Bartholomy – a Security Architect at LogRhythm – and Eric Parent – CISO at Sonepar – to discover how security architecture is developing to face the current threat landscape. Failures in past layered approaches are frequent, and serve as valuable learning lessons on the importance of proactive monitoring and response.

    During the webinar you will learn:

    • How LogRhythm’s POC enabled Sonepar’s team to efficiently expedite threat detection, and improve their SOC and analyst efficiency

    • The guiding principles and technology behind modern security frameworks and architecture, including the rise in popularity and value of the Zero Trust Framework

    • How security architecture helps align IT security with business strategy and current threats

    • Adapting architecture to accommodate different environments, including on-premises, cloud, and hybrid cloud
  • Measure and Mature: Security Operations under the spotlight
    Measure and Mature: Security Operations under the spotlight
    Andrew Hollister, Chief Architect and Product Manager, LogRhythm Labs Recorded: Mar 21 2019 46 mins
    Effective security operations are the first line of defence when it comes to preventing cyberattacks. In order to accomplish this, organisations need a mature security program that leverages people, process, and technology to enable rapid detection and response.

    Yet some organisations struggle with the overall effectiveness of their security operations. They lack a model for maturing their capabilities. A mature security operation enables threats to be detected earlier in the cyberattack lifecycle which is critical.

    Join this webinar to discover LogRhythm's Security Operations Maturity Model (SOMM) which was developed to help organisations assess their level of maturity and plan for making improvements over time.

    Organisations can use this model to evaluate their current security operations and develop a roadmap to achieve the level that is appropriate in the light of their resources, budget, and risk tolerance. You will also hear about the critical measures of security operations effectiveness.
  • NextGen SIEM: SANS Evaluator's Guide
    NextGen SIEM: SANS Evaluator's Guide
    Christopher Crowley (SANS) and Sara Kingsley, (LogRhythm) Recorded: Mar 7 2019 58 mins
    Is your security team struggling with blind spots? Inundated with false negative alarms? You’re not alone. Legacy SIEMs hinder your ability to achieve your security objectives. Traditional solutions are limited and often lack the flexibility to scale and grow as your security needs increase. To combat today’s threats, you need a next-gen SIEM that leverages the architecture and security capabilities that are best suited to detect both known and unknown threats within your environment.

    In this on-demand webcast, Christopher Crowley, senior instructor at SANS, and Barbara Filkins, senior analyst at SANS, join Sara Kingsley, senior product marketing manager at LogRhythm, to explain what comprises a modern SIEM solution and share tips for evaluating a next-gen SIEM platform.

    In this webcast, you’ll learn:
    - What makes a SIEM “next-generation”
    - How to evaluate a next-generation SIEM
    - The requirements that should guide your next-generation SIEM POC

    Watch the webinar to discover the tools you need to evaluate and choose a next-gen SIEM that fits the requirements of your organisation.
  • Dabble or deep dive: Threat hunting you can do with available resources
    Dabble or deep dive: Threat hunting you can do with available resources
    Nathan "Q" Quist (LogRhythm) and Randy Franklin Smith (UWS) Recorded: Feb 25 2019 97 mins
    In this real training for free session, we will discuss the minimum toolset and data requirements (and not necessarily volume) you need for successful threat hunting. We will take into account that while some of you can devote most of your time to threat hunting, most of us have limited time and resources for this activity. The good news is that threat hunting is flexible and anyone can do it, ranging from a few hours a week to full-time.

    As an example, a great type of threat hunting is to look for unrecognised/suspicious executables running on your network. You can dip your toe in the water with this type of hunt with a small commitment of time and resources or you can dive in deep with a major data collection and analysis effort. Starting out simple means you just focus on EXE names; baseline the EXE names being executed on your network, and then perform a daily review of new EXE names showing up for the first time. You can get this information from event ID 4688 and the query capabilities are very light. But I think you’ll be surprised what you are able to learn and catch.

    We will take the same approach with a total of 7 types of threat hunting:

    Recognising suspicious software
    Scripting abuse
    AV follow-up
    Lateral movement
    Persistence
    DNS abuse
    Bait-the-bad-guy
  • Defending the enterprise using open source tools
    Defending the enterprise using open source tools
    Steve Kaufman (LogRhythm) and Paul Asadoorian (Security Weekly) Recorded: Jan 31 2019 57 mins
    Budget constraints is a common complaint from security professionals. However many of the tools that can solve problems in the enterprise are free. You don’t have to buy commercial products to secure your entire enterprise. Of course, there are some areas that do require a PO, however, there are also several areas of your security program that can be implemented using free and/or open source tools.

    In this webinar we look at which aspects of your security program can benefit the most from these tools, and how to configure and use them.

    Discover:
    • Lightweight threat intelligence: pi-hole in the cloud (+TacyonNet)
    • Vulnerability profiling: Integration with vFeed
    • Patching your systems with Ansible
    • Network monitoring with Bro
    • High-performance firewalls with OpnSense
    • The best free training resources

    Steve Kaufman, Technical Product Manager from LogRhythm, will be joining the webinar to cover how security technology vendors are aligning with open source tools. He’ll explore how LogRhythm’s architecture, including elasticsearch, enables the product to integrate with open source tools.
  • Automate security with integration between SIEM and IAM
    Automate security with integration between SIEM and IAM
    Greg Foss (LogRhythm) and Randy Franklin Smith (UWS) Recorded: Jan 21 2019 80 mins
    In this webinar Randy Franklin Smith (UWS) and Greg Foss (LogRhythm) take a real-world example of a SIEM, in this case LogRhythm, and an IAM, Okta, and demonstrate how their integration matures an organisation’s security posture.

    We’ll dive into how Security Analysts can make more informed decisions and perform better investigations when they have a full picture of IAM events spanning on-prem and cloud-based activity and how organisations can respond rapidly to security alarms with automatic protective measures.

    In this webcast, discover how to:
    • Visualise and analyse data from Okta in your SIEM
    • Identify accounts that have compromised credentials by monitoring for successful authentications paired with failed multifactor logins
    • Utilise the Okta API to automate security tasks
    • Build upon identity monitoring to work towards a “Zero Trust” architecture
  • Securing the IoT: Keeping planes in the air and the lights on at home
    Securing the IoT: Keeping planes in the air and the lights on at home
    Adam Brady & Mark Baker, LogRhythm Recorded: Dec 18 2018 48 mins
    The Internet of Things (IoT) will generate, process and share more data than ever before. Data that needs to be secured.

    The data generated by non-traditional sensors and systems can help detect anomalous behaviour and maintain the uptime we expect from the new wave of connected devices.

    In this webinar, LogRhythm’s security experts will explain how this data can be used, with examples from a range of industries – from jet turbine manufacturers to in-home automation providers.

    Join the webinar to discover:
    1. How IoT devices blur the boundaries between IT security, operational technology and security in the physical world
    2. How to gain visibility into the data generated by these devices – and what it really means
    3. What customers have experienced through real-life use cases
  • An Inside Look: Top Windows Logs for User Behavior Analysis
    An Inside Look: Top Windows Logs for User Behavior Analysis
    Randy Franklin Smith, Windows Security Expert (UWS); Matt Willems, Technical Product Manager (LogRhythm) Recorded: Nov 7 2018 105 mins
    User and entity behavior analytics (UEBA) and security information and event management (SIEM) are separate security solutions that can work together to detect shifts in behavior that indicate a compromise is occurring. UEBA is enhanced by leveraging the data collected and enriched by a SIEM, and SIEM capabilities are expanded by ingesting UEBA events for further correlation.

    One of the best ways to understand this symbiotic relationship is to take an actual source of security events and apply UEBA to it. In this on-demand webcast, Matt Willems, LogRhythm’s technical product manager, joins Ultimate Window Security’s Randy Franklin Smith to uncover the relationship between UEBA and SIEM — giving you an inside view of user behavior analysis in action.

    In this webcast, you’ll learn how to apply UEBA and SIEM using data from the Windows Security Log to track:

    - When a user normally logs on
    - The computer from which the user authenticates
    - Additional computers the user accesses

    The webcast identifies the most important events from the Windows Security Log for UEBA and the roles that generate them, as well as challenges in correlation. In addition, you’ll learn about alternative logs that augment user behavior analysis.

    Presenters will also cover:

    -Examples of identity construction from user identifiers such as Active Directory credentials and email addresses (both corporate and personal)
    -Dynamic baselining (i.e., what is normal in your environment vs. a threshold/whitelist/blacklist)
    -Two UEBA use cases: one that focuses on authentication from an abnormal location and another that highlights an unusual time/blacklisted location

    Watch the webcast to learn how to successfully apply UEBA to security events.
  • Technical Demo: Detecting and Insider Threat with LogRhythm UEBA
    Technical Demo: Detecting and Insider Threat with LogRhythm UEBA
    Chris Ford, enterprise sales engineer | LogRhythm Recorded: Oct 24 2018 23 mins
    Last year, 69 percent of surveyed organizations reported incidents that resulted in data theft — but not from external attacks. These threats came from inside the organization. User and Entity Behavior Analytics (UEBA) plays a crucial role in detecting the user behavior that can put your company at risk

    LogRhythm UEBA solutions uncover user-based threats with diverse analytical methods, including scenario- and behavior-based techniques, which deliver comprehensive visibility across the full spectrum of attacks.

    LogRhythm can help maximize efficiency and minimize risk, to help you solve security use cases such as insider threats, account compromise, privileged account abuse, and more.

    Watch our on-demand technical demo highlighting the power of our UEBA solutions.
  • Why Insider Actions Matter: SANS Reviews LogRhythm CloudAI for UEBA
    Why Insider Actions Matter: SANS Reviews LogRhythm CloudAI for UEBA
    Dave Shackleford, analyst and instructor (SANS) | Seth Goldhammer, senior director of product management (LogRhythm) Recorded: Oct 10 2018 51 mins
    When threats occur, understaffed security operations centers (SOCs) lack sufficient access to contextual information. This lack of visibility is a key problem that LogRhythm CloudAI for User and Entity Behavior Analytics (UEBA) are designed to solve.

    In this webcast, Dave Shackleford, senior SANS instructor, and analyst, joins Seth Goldhammer, LogRhythm senior director of product management, to explore how CloudAI uses supervised and unsupervised learning to establish baselines and monitor user behavior.

    Shackleford reviews LogRhythm CloudAI and he runs through various use cases, such as insider threat, account compromise, and admin abuse.

    You’ll learn how LogRhythm CloudAI:

    - Detects malicious user activities
    - Scores user activities, provides recommendations and takes automated actions
    - Supports threat hunting and incident response capabilities
    - Improves the machine learning experience through supervised and unsupervised learning

    Watch the webcast now to understand how LogRhythm CloudAI can help you detect dangerous user behavior and rapidly mitigate threats.

Embed in website or blog