Hi [[ session.user.profile.firstName ]]

LogicHub

  • Date
  • Rating
  • Views
  • Build an AI Analyst to Eliminate Phishing Burden
    Build an AI Analyst to Eliminate Phishing Burden
    Evan Gaustad - Principal Engineer, Threat Detection Recorded: Aug 1 2018 62 mins
    Organizations commonly have a security mailbox, enabling vigilant staff to report suspicious emails they receive. This process may be the last opportunity for defenders to detect phishing that slipped by their controls and prevent a possible breach. Unfortunately, the security mailbox can require a significant amount of staff resources to triage.

    Join us to see how custom AI and automation can be your advantage.

    We'll discuss how to:
    - Bring human attention to critical events with custom AI you control
    - Save time by automating human analysis tasks
    - Perform automated actions, freeing staff time and increasing consistency
    - Increase employee retention by eliminating tedious tasks
  • SOC Automation Case Study - Maricopa Community Colleges
    SOC Automation Case Study - Maricopa Community Colleges
    Rich Lang, Technical Director of IT Security, Maricopa Community Colleges Recorded: Jun 14 2018 45 mins
    Maricopa Community Colleges faced a common challenge - receiving too many suspicious login alerts from their G Suite. It was tedious and difficult to investigate every alert and they did not have the resources to manually follow up with every user to determine whether this was an actual attack on their systems.

    Faced with limited resources, the security team implemented advanced security automation to help them better detect and respond to attacks and alerts. Automation helped them improve their security posture, protect other applications and accounts from being compromised, and quickly notify the security team and users of malicious activity without having to add expensive additional headcount to their staff.

    Rich Lang, Technical Director of Information Technology Security will discuss how Maricopa Community Colleges used SOC automation to:
    * Automate analysis of each G Suite login alert
    * Incorporate end users into process to directly effect change
    * Send and receive automated SMS notifications from users
    * Protect against phishing attacks and secure user accounts
    * Prevent future breaches
    * Save the time equivalent of an entire FTE
  • Beyond Security Orchestration - The Urgent Need for Intelligent Automation
    Beyond Security Orchestration - The Urgent Need for Intelligent Automation
    Tom D'Aquino, Director of Security Solutions, LogicHub Recorded: May 17 2018 49 mins
    When it comes to security automation, you’re not limited to simple orchestration. Intelligent Automation can deliver the most value by removing the decision fatigue plaguing security analysts, allowing them to focus more effectively at stopping and resolving advanced threats.

    Join this webinar to see Intelligent Automation in action and gain insights into:
    * What is Intelligent Automation
    * Why Orchestration alone doesn’t solve analyst fatigue
    * Key capabilities of Intelligent Automation
    * Demos of working examples
    * Implementation best practices

    Go beyond simple orchestration. Prepare yourself for the future of security automation.
  • How to Secure GitHub with Automated Threat Detection
    How to Secure GitHub with Automated Threat Detection
    Kumar Saurabh, CEO and Co-founder, LogicHub Recorded: Apr 11 2018 51 mins
    Your developers love managing their source code in GitHub. Whether this is crucial Intellectual Property, or critical applications that run your business, how do you ensure this source code isn’t being accessed by unauthorized actors?

    Introducing ThreatGPS for GitHub, a breakthrough in threat detection automation that starts providing a high quality alert feed in just a few clicks.

    Join this webinar to learn how you can easily automate threat detection for all GitHub repositories.

    We will cover the following:
    * Potential data leaks with GitHub, what to watch out for
    * Gaining 360 degree view of all GitHub audit events
    * Automating suspicious pattern detection
    * Finding repos left open to public by mistake
    * Creating automation that learns and improves over time

    This webinar will be led by Kumar Saurabh, CEO and Co-founder of LogicHub.
  • How to Automate Threat Hunting
    How to Automate Threat Hunting
    Kumar Saurabh, CEO and Co-founder, LogicHub Recorded: Mar 29 2018 48 mins
    Do you have security event data but not enough threat visibility?

    Learn how to use automation to turn your events into really high quality alerts.

    Join this webinar to gain insights into:

    * What is threat hunting automation
    * Prerequisites to get started
    * How to systematically explore events to build a decision engine
    * How to accurately determine suspicious bad, known bad, etc.
    * Examples of threat hunting automation playbooks

    Come learn how you can quickly reduce Dwell Times, False Positives, and False Negatives with security automation.
  • How to Automate Phishing Investigations
    How to Automate Phishing Investigations
    Tom D’Aquino, Director of Security Solutions at LogicHub Recorded: Mar 21 2018 40 mins
    Get to Inbox Zero everyday with Automated Threat Ranking

    Do you struggle with getting too many phishing alerts? Does it take a long time to investigate and respond effectively?

    Join us for a special presentation to see how some of the most sophisticated security teams are applying automated threat ranking to phishing reports from their users and detection tools, helping them get to inbox zero every single day.

    Timely analysis and response is key to combating phishing threats while tracking and rewarding submissions helps keep submitters engaged and participating.

    Join this webinar to gain insight into:
    * The basics of Phishing investigations
    * What automation can and cannot accomplish
    * How to build the automation steps easily
    * Best practices from industry experts

    Learn how you can help make your phishing reporting initiative an asset that drives other security capabilities rather than a burden that exhausts your team!

    Speaker: Tom D’Aquino, Director of Security Solutions at LogicHub
  • How to get started with Security Automation and Orchestration
    How to get started with Security Automation and Orchestration
    Kumar Saurabh, CEO & Co-founder of LogicHub Recorded: Feb 27 2018 47 mins
    Security Automation can significantly improve investigations, reduce tedious busy work, and strengthen defenses. However, it is not always clear where to start, and which use cases to apply automation to.

    In this webinar, we will provide a primer and discuss best practices. Topics discussed will include:
    - What is security automation and orchestration?
    - Different automation models
    - Examples of how automation has helped others
    - Assessing your automation readiness
    - Steps to get started - picking your first use cases

    The discussion will be led by Kumar Saurabh, a 15 year veteran of Security Operations, and CEO & Co-founder of LogicHub.

Embed in website or blog