Hi [[ session.user.profile.firstName ]]

LogicHub

  • Date
  • Rating
  • Views
  • How to Secure GitHub with Automated Threat Detection
    How to Secure GitHub with Automated Threat Detection Kumar Saurabh, CEO and Co-founder, LogicHub Recorded: Apr 11 2018 51 mins
    Your developers love managing their source code in GitHub. Whether this is crucial Intellectual Property, or critical applications that run your business, how do you ensure this source code isn’t being accessed by unauthorized actors?

    Introducing ThreatGPS for GitHub, a breakthrough in threat detection automation that starts providing a high quality alert feed in just a few clicks.

    Join this webinar to learn how you can easily automate threat detection for all GitHub repositories.

    We will cover the following:
    * Potential data leaks with GitHub, what to watch out for
    * Gaining 360 degree view of all GitHub audit events
    * Automating suspicious pattern detection
    * Finding repos left open to public by mistake
    * Creating automation that learns and improves over time

    This webinar will be led by Kumar Saurabh, CEO and Co-founder of LogicHub.
  • How to Automate Threat Hunting
    How to Automate Threat Hunting Kumar Saurabh, CEO and Co-founder, LogicHub Recorded: Mar 29 2018 48 mins
    Do you have security event data but not enough threat visibility?

    Learn how to use automation to turn your events into really high quality alerts.

    Join this webinar to gain insights into:

    * What is threat hunting automation
    * Prerequisites to get started
    * How to systematically explore events to build a decision engine
    * How to accurately determine suspicious bad, known bad, etc.
    * Examples of threat hunting automation playbooks

    Come learn how you can quickly reduce Dwell Times, False Positives, and False Negatives with security automation.
  • How to Automate Phishing Investigations
    How to Automate Phishing Investigations Tom D’Aquino, Director of Security Solutions at LogicHub Recorded: Mar 21 2018 40 mins
    Get to Inbox Zero everyday with Automated Threat Ranking

    Do you struggle with getting too many phishing alerts? Does it take a long time to investigate and respond effectively?

    Join us for a special presentation to see how some of the most sophisticated security teams are applying automated threat ranking to phishing reports from their users and detection tools, helping them get to inbox zero every single day.

    Timely analysis and response is key to combating phishing threats while tracking and rewarding submissions helps keep submitters engaged and participating.

    Join this webinar to gain insight into:
    * The basics of Phishing investigations
    * What automation can and cannot accomplish
    * How to build the automation steps easily
    * Best practices from industry experts

    Learn how you can help make your phishing reporting initiative an asset that drives other security capabilities rather than a burden that exhausts your team!

    Speaker: Tom D’Aquino, Director of Security Solutions at LogicHub
  • How to get started with Security Automation and Orchestration
    How to get started with Security Automation and Orchestration Kumar Saurabh, CEO & Co-founder of LogicHub Recorded: Feb 27 2018 47 mins
    Security Automation can significantly improve investigations, reduce tedious busy work, and strengthen defenses. However, it is not always clear where to start, and which use cases to apply automation to.

    In this webinar, we will provide a primer and discuss best practices. Topics discussed will include:
    - What is security automation and orchestration?
    - Different automation models
    - Examples of how automation has helped others
    - Assessing your automation readiness
    - Steps to get started - picking your first use cases

    The discussion will be led by Kumar Saurabh, a 15 year veteran of Security Operations, and CEO & Co-founder of LogicHub.

Embed in website or blog