Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date [APAC] Get to know LogRhythm UEBA (CloudAI) Melissa Ruzzi With the dramatic increase in the number of cyberattacks related to users' advanced complexity and sophistication, it becomes more and more important ... 3 days ago | 36 mins Revolutionize SOC Operations with Improved Efficiencies and Automation Sanjay Raja, VP Product Marketing, Gurucul | Guest Speaker: Joseph Blankenship, VP, Research Director, Forrester The evolving hybrid workforce, continued adoption of cloud-native applications and business at a global scale has introduced several security gaps wit... 2 days ago | 62 mins Align to Memorandum 21-31 Out-of-The-Box With LogRhythm Eric Serrano & Josh King OMB 21-31 is top of mind for federal government agencies. The biggest challenge that federal agencies are facing is how to align their current SIEM so... June 2, 2022 3:00pm Get to know LogRhythm’s Advanced Analytics UEBA Melissa Ruzzi With the dramatic increase in the number of cyberattacks related to users' advanced complexity and sophistication, it becomes more and more important ... 1 month ago | 36 mins Best Practices for Implementing an Insider Threat Program Craig Cooper, COO & SVP of Customer Success, Gurucul Insider threats are a serious concern, and they are on the rise. Detecting them and mitigating the risk requires a specialized technology platform and... 1 month ago | 37 mins Insider Risk Ecosystem—Completing the Puzzle Rajan Koo, Chief Customer Officer, DTEX Systems and others No one wins alone. Isn’t that how the saying goes? The same is true for mitigating insider-born risks and thwarting malicious internal actors. Unfortu... 2 months ago | 26 mins Embracing the Human Firewall—The Convergence of UEBA, DLP, and UAM Rajan Koo, Chief Customer Success Officer, DTEX Systems and Q&A Moderator: Andy London, DTEX Systems Here’s what we’ve learned in the last 20 months as the Remote Age of work has taken a firm grip on each and every one of our organizations: Humans are... 4 months ago | 34 mins All Organizations Should Pursue Autonomic Security Operations… Iman Ghanizada, Google Cloud & Anton Chuvakin, Google Cloud & Robert Herjavec, Herjavec Group & Eric Foster, CYDERES SIEM, XDR, TI, SOAR, UEBA, you-name-it… Adapting to the exponential signal volume and complex nature of the evolving technology landscape will require... 2 months ago | 36 mins Behavioral DLP ~ The Knockout Punch to Trigger-based Endpoint DLP and UEBA? Andy London, Customer Solutions Architect, DTEX Systems The reality has set in. First-generation Endpoint DLP solutions focused on data-centric rules, policies and ‘time-of-exfiltration’ triggers have faile... 6 months ago | 32 mins UEBA Explained: Using User & Entity Behavior Analytics to Stop Advanced Threats Mike Parkin, Technical Marketing Engineer, Gurucul UEBA is the scientific process of transforming user and entity behavior data into risk-prioritized intelligence, for the purpose of driving business a... 2 years ago | 32 mins Load more