Your Resource for Information Security Trends & Education
With over 280,000 members, the Information Security Community is the largest community of cybersecurity professionals in the industry. Let's build a network that connects people, opportunities, and ideas. If you are involved in purchasing, selling, designing, marketing ... or using information security solutions - this group is for you. Covered topics include compliance, encryption, anti-virus, malware, cloud security, data protection, hacking, network security, virtualization, and more.
Randy Franklin Smith (Windows Security expert), Chris Martin (Security Engineer), Caitlin NoePayne (LogRhythm Sr. TPM)
Over time, any given computer on your network will establish a pattern of systems it does and doesn’t talk to. If you can properly baseline that behaviour and detect when the computer deviates from normal activity you can produce critical early warnings of a potential incident.
In this webcast, LogRhythm’s senior technical product manager, Caitlin NoePayne, and principal sales engineer, Chris Martin, join Randy Franklin Smith, Windows Security subject matter expert, to discuss detecting computers on your network talking for the first time using Windows Security Events. They will also demonstrate LogRhythm behavioural analytics rules and case management features that help analysts follow up on suspicious activity alerts.
Learn how to:
• Configure your audit policy to generate relevant security events
• Establish baseline behaviour of the machines on your environment
• Monitor and detect traffic patterns to detect an attacker embedded in your network using Windows Security Events
• Speed up investigation and response with Security Automation and Orchestration
Watch now to learn how to use Windows Security Events and LogRhythm to detect when two computers on your network talk to each other for the first time.
Would a hack on one Internet connected thermostat stop a nation? Maybe not, but imagine hundreds of connected devices being meddled with in order to cause havoc?
Join our IOT experts to discuss the real impact of an IOT device hack. Wieland Alge, GM EMEA at Barracuda Networks and Mark Harrison, Consultant at Pen Test Partners, will look into why cyber criminals are interested in hacking IOT devices and the true impact of such an attack to organisations. Join this webinar to learn:
• The true impact of an IOT hack
• Methods used by hackers
• Demos of IOT devices being hacked
• Major challenges in protecting smart cities
• How to mitigate these threats
BrightTALK caught up with Giovanni Vigna from University of Santa Barbara & Lastline for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.
Topics up for discussion:
- The difference between traditional AI & Machine Learning and the tools when applied to cyber security
- Whether the buzz surrounding the tools is legitimate
- How the human still needs to fit into the picture when using machine learning based security techniques
- How AI & Machine learning can be used for threat hunting purposes
- The WannaCry virus and what it means for the ransomware landscape and how we protect ourselves from attacks
- The value of security culture in an organisation
- Trends in the techniques used in cyber warfare
- The exponential growth of the IoT and what it means for securing the connected devices
Bad things happen, but the potential of IoT will be limited if those in any connected system of devices cannot share data of adverse incidents more effectively. This webcast introduces 5 keys to doing so successfully, all toward improving security across those systems.
The Internet of Everything affects everyone from multi-nationals to private citizens. The universal adoption of machine to machine communications in every aspect of our lives offers criminals a hugely expanded attack surface. How do we defend ourselves without undermining the benefits of the IoE?
The perils of security breaches are widely publicised, but do you know exactly how an attack or breach would affect your business?
In this webinar John Pironti, president of IP Architects, and Michael Dalgleish, director of sales engineering at LogRhythm, will discuss the costs of recent data breaches and illustrate the best ways to determine your organisation’s cyber risk profile. The duo will also teach you about the security tools and processes you can implement to strengthen your security operations.
Watch now to learn how to take your security operations to the next level.
The rapid growth of the Internet of Things (IoT) has led to a major increase in threats to network security. The proliferation of weakly secured connected devices has enabled recent DDoS attacks to become some of the largest and most destructive on record. They have significantly compromised network services, disrupted the quality of experience for millions of users, and threatened data security.
Existing network security solutions have not proved effective enough to mitigate such large and aggressive attacks. Operators need to fight this phenomenon with a new, comprehensive, multi-layered solution. So join us to learn:
•The impact of massive IoT-driven attacks
•How service providers can protect their assets and their users
•How multi-layered solutions provide networks with the strongest defense
•The opportunities for operators to sell security as a services to customers
According to the latest Verizon Data Breach Investigations Report, 93% of compromises occur within minutes. Traditional security tools do not have the "shutter speed" to detect and remediate these threats fast enough. By analyzing network behavior on the wire as it happens, correlating it with threat intelligence, and then orchestrating remediation actions, organisations gain the capabilities needed to conduct "hand-to-hand" combat against cyber adversaries.