Hi [[ session.user.profile.firstName ]]

AT&T Cybersecurity

  • Date
  • Rating
  • Views
  • The Practitioner’s Guide to Security Monitoring in the Cloud
    The Practitioner’s Guide to Security Monitoring in the Cloud
    Danielle Russell Group Product Marketing Manager, Brian Bledsoe Sr. Technical Manager, Sales Enablement for North America Recorded: Apr 18 2019 58 mins
    Cloud computing continues to transform the way organizations use, store, and share data, applications, and workloads, but has also introduced a host of new security threats and challenges. With so much data going into the cloud—and into public cloud services in particular—these resources become natural targets for bad actors. And, contrary to what you may think, the primary responsibility for protecting corporate data in the cloud lies with the cloud customer, not with the service provider.

    AlienVault is at the leading edge of cloud security with AlienVault USM Anywhere. Whether you are looking to secure your AWS & Azure cloud environments, cloud applications like Office 365 and G Suite or on-premises assets, USM Anywhere delivers essential security capabilities in a single SaaS platform.

    Join this webcast to learn more about cloud security challenges and how to address them with USM Anywhere. You'll learn:

    - What the shared responsibility model means for the security of your cloud assets
    - Challenges with trying to use traditional on-prem security monitoring tools in your cloud environments
    - How USM Anywhere gives you visibility into all assets across your cloud and on-premises environments
    - Benefits of an all-in-one security solution for threat detection, incident response and compliance management
  • Building Blocks for Your 2019 IT Security Program
    Building Blocks for Your 2019 IT Security Program
    Danielle Russell, Group Product Marketing Manager, AlienVault; Amy Pace, Principal Product Marketing Manager, AlienVault Recorded: Mar 14 2019 51 mins
    Is one of your New Year's resolutions to reduce your cyber risk in 2019? If so, do you know where to start? Join us for this special session webcast, in which we'll discuss the building blocks that make for an effective security and compliance program for organizations of any size.

    Join this webcast and demo of the AlienVault Unified Security Management (USM) platform to learn how solutions from AlienVault, an AT&T Company, can help you to:

    - Determine your current security posture and make a prioritized plan for improvement
    - Centralize security monitoring across multi-cloud and on-premises environments
    - Automate threat detection and incident response activities for improved efficiency
    - Consolidate your regulatory compliance requirements to help accelerate audit readiness
    - Maintain continuous security monitoring all year long

    Register today to reserve your seat. Here's to a secure 2019!
  • How to Detect Fileless Attacks with Host-Based IDS in USM Anywhere
    How to Detect Fileless Attacks with Host-Based IDS in USM Anywhere
    Danielle Russell, Group Product Marketing Manager; Aaron Genereaux, Sr. Sales Engineer Recorded: Feb 14 2019 56 mins
    Attackers have figured out how to bypass traditional antivirus software with fileless attacks designed to hide within sanctioned applications and even within the OS itself. Host-based intrusion detection systems (HIDS), which work by monitoring activity that is occurring internally on a host, are an effective way to detect these advanced attacks before they spread.

    Join this webcast to learn:

    - How fileless attacks work and how they evade detection by most traditional antivirus software
    - The types of endpoint activity that can be detected and logged by HIDS to catch threats like fileless attacks
    - Why HIDS is an essential security control for threat detection and compliance
    - How correlation of HIDS data with IP reputation data, vulnerability scans, and more can boost threat detection and response

    Speakers:
    Danielle Russell
    Group Product Marketing Manager
    Aaron Genereaux
    Sr. Sales Engineer
  • How to Simplify PCI DSS Compliance with a Unified Approach to Security
    How to Simplify PCI DSS Compliance with a Unified Approach to Security
    Sanjay Ramnath, AlienVault; Jacques Lucas, Terra Verde; Zuri Cortez, AlienVault Recorded: Jan 17 2019 60 mins
    Demonstrating compliance with PCI DSS is far from a trivial exercise. The 12 requirements of PCI DSS often translate into a lot of time and effort to access the necessary data and reports from many different systems and tools. And, after an audit is complete many teams struggle to maintain compliance.

    In this webcast, you'll hear from Jacques Lucas, a Qualified Security Assessor (QSA) with Terra Verde, and Sanjay Ramnath, VP of Product Marketing at AlienVault, sharing best practices to help you simplify implementation of PCI DSS security controls and reporting.

    Join us for this webcast to learn:

    - The most common challenges in meeting and maintaining compliance with PCI DSS
    - Best practices to help you plan and prepare for an audit
    - The core security capabilities you need to demonstrate compliance
    - How AlienVault Unified Security Management can simplify the compliance process

    Hosted By
    Sanjay Ramnath
    VP of Product Marketing at AlienVault
    Jacques Lucas
    Qualified Security Assessor (QSA) with Terra Verde
    Zuri Cortez
    Sales Engineer at AlienVault
  • How to Prepare for the Inevitable Security Incident with Digital Forensics
    How to Prepare for the Inevitable Security Incident with Digital Forensics
    Danielle Russell, Group Product Marketing Manager & Carlos Garcia, Solutions Architect | AlienVault Recorded: Nov 1 2018 59 mins
    As soon as you detect a security incident or breach in your environment, things move fast. You need to be able to quickly ascertain what happened and how as well as which assets were involved, so that you can decide how to respond, mitigate impact, and report the incident to the business and any affected parties. In this critical time between detection and remediation, your digital forensics and incident response (DFIR) readiness is key to success.

    What does it take to be forensics-ready? Join AlienVault for a special session webcast on DFIR readiness. We’ll address the following questions:

    - What does DFIR readiness include? What frameworks exist?
    - What security tools and technologies are essential for DFIR?
    - How does an effective DFIR program leverage security orchestration and automation reduce time to response (TTR)?
    - How can AlienVault Unified Security Management (USM) accelerate and simplify your DFIR?

    Speakers: Danielle Russell, Group Product Marketing Manager
    Carlos Garcia, Solutions Architect, AlienVault
  • How to Detect Cryptomining in your Environment with AlienVault
    How to Detect Cryptomining in your Environment with AlienVault
    Danielle Russell, Group Product Marketing Manager & Amy Pace, Principal Product Marketing Manager | AlienVault Recorded: Oct 18 2018 60 mins
    Cryptominers are built to turn computing power into revenue. To make cryptomining a profitable venture, cyber criminals are writing and distributing malware to steal computing resources to mine for cryptocurrencies like Bitcoin and Monero by attacking victims' endpoints, public cloud accounts, and websites. Through various attack vectors, cyber attackers can turn compromised systems into a silent zombie army of cryptocurrency miners. Unless you have advanced threat detection capabilities to detect crypto-mining activities on your endpoints, in the cloud and on premises, you might be unknowingly sharing your valuable computing resources with cryptomining criminals.

    Join this webcast to learn:

    - The what, why and how of cryptomining
    - How cryptomining can evade traditional antivirus and other security controls
    - Best practices and essential tools for detecting cryptomining quickly
    - How AlienVault Unified Security Management (USM) can alert you immediately of cryptomining activity

    Speakers: Danielle Russell, Group Product Marketing Manager
    Amy Pace, Principal Product Marketing Manager
  • SIEM 2.0 - How Unified Security Management SIEMplifies Threat Detection
    SIEM 2.0 - How Unified Security Management SIEMplifies Threat Detection
    Sacha Dawes, Principal Product Marketing Manager, AlienVault Recorded: Oct 11 2018 61 mins
    SIEM solutions have been widely adopted to help IT teams collect and correlate data from a variety of security point products. However, traditional SIEM deployments require a great deal of time, money & expertise to properly normalize data feeds, create correlation rules to detect threats & continuously tune those rules to limit false positives. And, after all that work is done, it has to be continuously re-done as the network & threat landscape changes.

    AlienVault takes a different approach to SIEM. Join this webcast to learn how AlienVault Unified Security Management (USM) overcomes the most common SIEM challenges with:
    - Built-in capabilities like asset discovery, vulnerability assessment, intrusion detection, orchestrated incident response, and log management
    - Continuously updated correlation directives, vulnerability signatures, incident response guidance, and more
    - Fully integrated, real-time threat intelligence from the AlienVault Labs Security Research Team and the AlienVault Open Threat Exchange (OTX)
    - The ability to monitor on-premises and cloud environments including AWS and Azure, as well as cloud applications like Office 365
  • How to Solve your Top IT Security Reporting Challenges
    How to Solve your Top IT Security Reporting Challenges
    Sacha Dawes Principal Product Marketing Manager, AlienVault Recorded: Sep 27 2018 56 mins
    If you needed to provide reports to management or an auditor to prove that your IT security controls are in place and working, how long would it take you to do that? And, how many different tools would you need to consult? The AlienVault Unified Security Management (USM) platform integrates many of the core security capabilities you need along with built-in reports to help you implement IT security best practice frameworks like the NIST Cybersecurity Framework (CSF), as well as demonstrate compliance with PCI DSS, HIPAA and other regulations.

    Join this webcast to see how the USM platform makes it easy to:
    - Automate log collection, analysis and event correlation in a single console
    - Continuously scan for new assets and vulnerabilities
    - Get alerted of suspicious behavior like privilege escalations, account changes, malware and ransomware threats, and more
    - Simplify compliance with pre-built and customizable reports mapped to numerous regulatory requirements
  • CISO Perspective: How using the NIST Cyber Security Framework improves security
    CISO Perspective: How using the NIST Cyber Security Framework improves security
    John McLeod, CISO, AlienVault Recorded: Sep 6 2018 63 mins
    The National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF) is widely recognized as an effective roadmap for improving threat detection and compliance. However, many smaller IT security teams with limited resources have trouble implementing and maintaining the recommended security controls and processes. That's where AlienVault can help.

    In this webcast, AlienVault CISO John McLeod will provide insights into how AlienVault approached implementation of NIST CSF and accelerated the process using their own Unified Security Management (USM) platform.

    Join this webcast for:
    - An overview of security controls recommended by NIST CSF
    - Best practices for approaching adoption of NIST CSF
    - How a unified security toolset can greatly simplify this process
    - A demo of the AlienVault Unified Security Management (USM) platform
  • Adding the S to MSP: Making Money in a Competitive Market
    Adding the S to MSP: Making Money in a Competitive Market
    Mike LaPeters, VP Global Channel Sales & Mike Calonica, VP American Sales Recorded: Aug 9 2018 35 mins
    Anybody can deliver technology, but these days Managed Service Providers (MSPs) also need to protect their customers’ networks and data. Cyber threats are a growing concern, and if you can’t provide security, your customers will find a provider who can. That’s why adding security to an MSP’s palette of services isn’t just an option; it’s a must.

    In this webcast, experts from Penton and AlienVault will discuss how to turn your MSP into a profitable MSSP by adding security for customers to protect their business from the scourge of cybercrime. Join this session to learn more about:
    - Current threats and how they are evolving
    - Comprehensive threat protection for the cloud
    - Unified security for detecting threats and responding to incidents

Embed in website or blog