Hi [[ session.user.profile.firstName ]]

Securonix

  • Date
  • Rating
  • Views
  • Threat Research: Detecting Cloud Infrastructure Attacks.
    Threat Research: Detecting Cloud Infrastructure Attacks.
    Oleg Kolesnikov, VP Threat Research, Securonix Threat Research Labs Recorded: Feb 26 2019 30 mins
    As organizations have adopted cloud-first IT strategies, the cyberthreat landscape has shifted as well. In recent months, the Securonix Threat Research team has been observing an increase in the number of automated attacks targeting exposed cloud infrastructure, Hadoop and YARN instances.

    In this live webinar, we will:

    - describe the attacks we have been tracking, including Moanacroner which is a single vector attack
    - dive into more sophisticated, multivector attacks that combine cryptomining, ransomware and botnets
    - understand the predictive indicators and artifacts that can help protect your cloud IT resources

    This session will be led by Oleg Kolesnikov, VP Threat Research at Securonix Threat Research (STR) Labs.

    Link to Report: https://www.securonix.com/securonix-threat-research-detecting-persistent-cloud-infrastructure-hadoop-yarn-attacks-using-security-analytics-moanacroner-xbash-and-others/
  • Looking Ahead - Cybersecurity Predictions for 2019
    Looking Ahead - Cybersecurity Predictions for 2019
    Eric Ogren, 451 Group. Patrick Gorman, Former CISO Bank of America Recorded: Jan 29 2019 59 mins
    2018 was a landmark year from a cybersecurity perspective. We saw another set of very large and high profile cybersecurity incidents. Financial organizations and systems were hit with attacks such as KRONOS/Osiris banking trojan, millions of dollars siphoned off through the SWIFT network, and form grabbing Magecart attacks. Ransomware continued to wreak havoc across industries, and hundreds of millions of sensitive records were compromised in the Marriott, Quora, Facebook/Cambridge Analytica and other breaches.

    The job of cybersecurity teams seems harder than ever as they look ahead to another year of vulnerabilities and data theft. But how should you prioritize your effort in the face of limited resources and increasing alert volume?

    Join an expert panel of cybersecurity professionals for our 2019 predictions. We will discuss

    - What are the top cybersecurity threats you should watch for in 2019
    - What broader IT infrastructure trends mean for your cybersecurity strategies
    - Which industries are most at risk of suffering major security breaches and why
    - What SOC, CSIRT and compliance teams can do to prevent becoming another cybersecurity statistic
  • Cloud Risk-Based Authentication To Prevent Password Based Attacks
    Cloud Risk-Based Authentication To Prevent Password Based Attacks
    Sujay Doshi, Sr. SIEM Solution Engineer Recorded: Nov 15 2018 51 mins
    Gaining unauthorized access to internal systems is one of the top mechanisms employed by hackers. Access control systems, however, are not yet equipped with the advanced analytics needed to detect the sophisticated techniques used by hackers. By integrating your SIEM with your SSO/IDM solution, SOC analysts can gain the visibility needed to prevent these access based attacks.

    Attend this webinar to hear about:

    - Why password access based attacks in cloud environments?
    - Threat detection and threat hunting use cases for password-based attacks
    - User account based orchestration and incident response actions
    - Walkthrough of Securonix - Okta integration with a live demo
  • Kerberoasting Attack Detection For SOC Analysts
    Kerberoasting Attack Detection For SOC Analysts
    Oleg Kolesnikov, Director of Threat Research, Securonix Recorded: Nov 12 2018 54 mins
    "Kerberoasting" is one of the advanced techniques currently in use by hackers to compromise weak service accounts in an Active Directory environment. This webinar by the Securonix Threat Research team will take a deep dive into this attack. We will also show blue teams in a Security Operations Center how to configure their SIEM to quickly find this activity in the monitored environment.

    Join this session by Securonix Threat Research to gain insights into:

    - Kerberoasting 101: How it works
    - A complete attack demo showing Kerberoasting
    - Kerberoasting Attack Activity Detection

    Register now.
  • Under The Hood: Effective Threat Hunting For The SOC Analyst
    Under The Hood: Effective Threat Hunting For The SOC Analyst
    Aditya Sundaram, Director Cyber Threat Analytics, Aarij Khan, VP Marketing Recorded: Aug 22 2018 52 mins
    The Modern SOC cannot afford to rely just on cyber threat detection to stay ahead of sophisticated hackers and advanced attacks. Threat hunting - the proactive approach to root out attacks coming from within is an extremely valuable complement to even the most advanced cybersecurity detection technologies. Securonix includes the Securonix Spotter threat hunting platform for exactly this reason.

    Attend this live webinar to hear about:

    - The most prevalent cyber threats hidden in your environment (that you are unaware of)
    - What threat hunting in the SOC is and how it reduces your cyber risk
    - The different types of information available to you
    - Free resources that can root out the most nefarious threats
    - Example scenario - threat hunting using Securonix Spotter
  • Incremente la eficiencia del SOC mientras reduce el costo de operaciones
    Incremente la eficiencia del SOC mientras reduce el costo de operaciones
    Luis Guzman, Security Engineer, Securonix Recorded: Jul 19 2018 55 mins
    Más del 60% de las alertas en su SOC demandan tiempo de investigación y no constituyen un riesgo alto para su organización. SIEM 2.0 puede automatizar sus procesos de investigación para que los analistas se enfoquen en lo que realmente es una amenaza. Lo invitamos a un webinar donde nuestros expertos en UEBA de Securonix presentarán las ventajas técnicas y económicas al tener una solución de Seguridad Analítica Avanzada en su SOC
  • No permitas que personas malintencionadas violen la seguridad de tus datos
    No permitas que personas malintencionadas violen la seguridad de tus datos
    Luis Guzman, Security Engineer, Securonix Recorded: Jul 12 2018 59 mins
    Todo lo que necesita saber de Amenazas internas: hasta el evento más sutil puede convertirse en fraude y un SIEM tradicional no puede darle una vista completa incluso antes de que las consecuencias sean fatales para su compañía. Lo invitamos a nuestro webinar donde expertos en seguridad Analítica de Securonix le contarán como SIEM 2.0 se constituye en la herramienta esencial para atender los casos de Insider threat
  • Monitoreo de seguridad en la nube para un nueva era digital
    Monitoreo de seguridad en la nube para un nueva era digital
    Luis Guzman, Security Engineer, Securonix Recorded: Jul 5 2018 53 mins
    Usted ya superó todas las inquietudes para mover sus aplicaciones hacia el Cloud, el siguiente paso es resguardarse frente a las Ciber-amenazas y amenazas internas, lo único que necesitamos son sus logs!! Acompáñenos en un webinar donde expertos en Seguridad Analítica y UEBA de Securonix le contarán como minimizar el riesgo en su entorno Cloud para seguir avanzando con tranquilidad.
  • Aumente a eficiência do seu SOC, reduzindo custos operacionais.
    Aumente a eficiência do seu SOC, reduzindo custos operacionais.
    Marcelo Jackson, Security Engineer, Securonix Recorded: Jul 5 2018 62 mins
    Mais de 60% dos alertas do seu SOC demandam tempo de investigação e não representam um alto risco para a sua organização. O SIEM 2.0 pode automatizar seus processos de investigação, permitindo que os analistas foquem no que realmente representa uma ameaça. Convidamos você para um webinar onde nossos especialistas de segurança de UEBA da Securonix irão apresentar as vantagens técnicas e econômicas de possuir uma solução de segurança analítica avançada no seu SOC.
  • Não deixe que a segurança da sua empresa seja comprometida por usuários internos
    Não deixe que a segurança da sua empresa seja comprometida por usuários internos
    Marcelo Jackson, Security Engineer, Securonix Recorded: Jun 28 2018 61 mins
    Tudo o que você precisa saber sobre ameaças internas: a atividade mais simples pode se torna uma fraude com o passar do tempo. Um SIEM tradicional não pode proporcionar uma visão completa, inclusive antes que as consequências se tornem fatais para a sua empresa. Convidamos vocês para o nosso webinar onde especialistas em segurança analítica da Securonix irão falar sobre como o SIEM 2.0 se constitui como a ferramenta essencial para atender os casos de Insider Threat.

Embed in website or blog