Hi [[ session.user.profile.firstName ]]


  • Date
  • Rating
  • Views
  • Apache Struts: Don't Be The Next Equifax
    Apache Struts: Don't Be The Next Equifax Oleg Kolesnikov, Director of Threat Research Recorded: Oct 5 2017 47 mins
    The cybersecurity world was shaken last week when it heard about Equifax which will likely turn into the largest data breach in history. Equifax has now officially confirmed that the vulnerability used to exploit the company’s Web server enabling malicious threat actor to steal data from over 143 million customers was the critical Apache Struts 2 Jakarta Multipart Parser Vulnerability (CVE-2017-5638).

    We will show you the actual attack that was used to breach Equifax in action. You will also learn how you can leverage user and big data security analytics to increase the chances of detecting such cyber attacks/data breaches at an early stage.

    We’ll cover:

    - A deep dive into the exact mechanisms that lead to the Equifax breach
    - How security analytics can help increase chances of early detection of such attacks
    - A simulation of the attack that was used attack Equifax
  • Securing Sensitive Data Against Insider-Based Attacks
    Securing Sensitive Data Against Insider-Based Attacks Shareth Ben, Director Insider Threat, Securonix & Eric Ogren, Senior Analyst, 451 Group Recorded: Oct 3 2017 65 mins
    Advanced cyber threats continue to grab headlines despite the plethora of security tools implemented by corporations. The reason is these attacks leverage insider threats - the often overlooked area that hackers use to get to sensitive data repositories. Detecting insider threat is a challenging proposition with the security tools currently deployed by most organizations, as these tools are unable to find attacks like misuse of credentials, privilege escalation, anomalous behavior and account compromise. Find out what is required to effectively detect insider attacks.

    In this webinar you will learn:
    - Why insider threat must be a C-level priority
    - What are the common indicators of an insider threat
    - How to deploy a UEBA solution to detect and prevent insider threats
    - Demo of real-world use case scenarios

    Presented by
    Shareth Ben,
    Director Insider Threat, Securonix

    Guest Speaker
    Eric Ogren,
    Senior Analyst, 451 Group
  • Equifax Breach and Managing Your Vulnerabilities
    Equifax Breach and Managing Your Vulnerabilities Carl Wright (AttackIQ), Igor Baikalov (Securonix), Chris Petersen (LogRhythm), Sam Abadir (LockPath) Recorded: Sep 20 2017 62 mins
    With 143 million personally identifiable records stolen, the recent Equifax data breach is one of the largest and most damaging cyber-attacks to date. Hackers may have accessed highly valuable information, including our social security numbers, addresses, birth dates and credit card information.

    What can we do do contain the damage as consumers, as well as organizations? How can we move on from this breach?

    Join this interactive panel discussion with cyber security experts across the spectrum to hear their thoughts on:
    - The key takeaways consumers and enterprises should act on to protect against cyber scams and attacks related to this breach
    - Managing IT risk and vulnerabilities
    - How to improve breach prevention, detection and response
    - What to expect in the future

    - Igor Baikalov, Chief Scientist, Securonix
    - Chris Petersen, CTO, SVP of R&D & Co-Founder, LogRhythm
    - Sam Abadir, Director of Product Management, LockPath

    - Carl Wright, CRO, AttackIQ
  • Protecting Patient Privacy with Securonix User Behavior Analytics
    Protecting Patient Privacy with Securonix User Behavior Analytics Ryan McDaniel, VP Security & Tech, HCI and Vidit Arora - Director Technology Enablement, Securonix Recorded: Aug 23 2017 64 mins
    Healthcare organizations today are struggling with manual audit and reporting of patient data access records. The process is time-consuming, and although it helps meeting compliance needs, it is ineffective in identifying real-threats. Securonix Patient Data Analytics solution offers a machine learning based solution to help organizations automatically establish a baseline for normal patient and employee activities and identify malicious patterns. The tool reduces manual effort, helps identify real threats, and assists with compliance reporting.

    We will cover:

    - Applying identity context and behavior analytics to EMR audit logs
    - Visualization, search and dashboard capabilities for investigation and reporting
    - Real world customer case studies highlighting improved threat detection and audit efficiency
    - Demo of the Securonix Patient data solution
  • SPARK On Hadoop Is The Next Gen SIEM
    SPARK On Hadoop Is The Next Gen SIEM Tanuj Gulati, CTO Securonix & David Monahan, Research Director EMA Recorded: Jul 12 2017 64 mins
    Today, 79% of security teams are overwhelmed with the volume of threat alerts they are receiving. Many of these SOC teams are forced into using decades old SIEM architectures to monitor their environments. The large alert volumes combined with the all too often requirement to manually prioritize alerts means 64% of critical tickets generated per day are not being worked leading to missed attacks, long incident response cycles and data breaches.

    In this webinar, you will learn
    · How Spark on Hadoop alleviates the security issues today
    · How a big data architecture enables distributed in-memory analytics on streaming data sets (up to 100x)
    · How Securonix SNYPR harnesses this revolutionary technology alongside industry standard Lambda architecture
    · The benefits of this architecture including real-time behavior & signature-less threat detection, powerful threat hunting capabilities
  • Transforming Advanced Cyber Threat Detection Using Machine Learning
    Transforming Advanced Cyber Threat Detection Using Machine Learning Darsh Balakrishnan & Joey Miller. Data Science Analysts Recorded: Jun 21 2017 57 mins
    The use of data science, machine learning, and autonomous behavior analysis is dramatically enhancing security teams' ability to detect and prevent advanced cyber threats today.

    In this webinar, you will go under the hood of the most sophisticated machine learning security analytics platform. Watch this webinar to learn:

    - How machine learning, active learning, and behavior profiling works
    - Application of data science to detect advanced cyber threats
    - Future directions for machine learning and security analytics
  • Webinar: Don't Let The Next WannaCry Surprise You
    Webinar: Don't Let The Next WannaCry Surprise You Oleg Kolesnikov, Director of Threat Research Recorded: Jun 1 2017 64 mins
    Ransomware has quickly become the leading form of cyber attack targeting individuals and large organizations alike. WannaCry is the largest ransomware attack in history, given that ransomware attacks spiked over 6000% in 2016, not likely the last one we'll see.

    Join this webinar with Oleg Kolesnikov, Director of Threat Research at Securonix Threat Research Labs to take a deep dive into the mechanics of a ransomware attack. You will also understand how big data security analytics can be leveraged to predict a ransomware attack like WannaCry, and see a hands-on demo of Securonix SNYPR, the leading security analytics platform.

    We’ll cover:
    - Ransomware explained - the technical mechanics of a ransomware attack
    - How security analytics can predict, detect and respond to ransomware
    - A demo of Securonix SNYPR in a ransomware attack scenario
  • Big Data Security Analytics: Evolution of Next-Gen SIEM
    Big Data Security Analytics: Evolution of Next-Gen SIEM Joseph Blankenship, Senior Analyst, Forrester; Sachin Nayyar, CEO, Securonix Recorded: May 12 2017 61 mins
    Many companies have invested heavily in SIEMs that are ill-equipped to protect organizations from the sophisticated cyberattacks and insider threats that pose a critical threat to their organizations. Big data security analytics are emerging as a smarter, faster, more economical solution that can enhance or even replace the event monitoring capabilities of a legacy SIEM with behavior analytics, machine learning and threat modeling. Join this webinar to learn how the next-gen of SIEM delivers unprecedented threat prediction, detection and response capabilities more accurately and automatically, in real-time.
  • 5 Steps to GDPR Compliance
    5 Steps to GDPR Compliance Nitin Agale, SVP Products, Securonix; Alex Rodrigues, CTO, Big Data International; Jonathan Jacob Recorded: May 4 2017 59 mins
    Experts in data security, security analytics and GDPR compliance outline the steps your organisation should take to become GDPR compliant, avoid costly penalties and how an analytics-based approach can help. We will provide ample time for questions and answers in this hour-long session. Thursday, 27, April 2017 at 4:00 pm GMT Summer time.

Embed in website or blog