Hi [[ session.user.profile.firstName ]]
Sort by:
    • Get a Clue About IT Security Analysis - SIEM 101
      Get a Clue About IT Security Analysis - SIEM 101 Joe Schreiber & Garrett Gross Recorded: Nov 12 2014 11:05 pm UTC 43 mins
    • Everyone in IT knows that security is a big deal, but did you know that SIEM (security information and event management) can help protect your network from data breaches, even when traditional defenses fail?

      If SIEM a mystery to you, lets grab Colonel Mustard, the candlestick and head to the library because this mystery is about to be solved. We'll be giving out more than just clues in this webinar: you'll discover explanations of security concepts, tools, tips and tricks as we unravel the mystery of how to better protect your network. Bring your magnifying glass, because you’ll also learn about event correlation, EPS, normalization and other things that will surely impress your friends.

      Learn from our chief gumshoe and noted SIEM Enthusiast Joe Schreiber. He’ll explain the reasons that SIEM exists, how it works, and most importantly - what you can do with it.


      Read more >
    • Seeing Over the Horizon: Predictive and Preventive Security Based on the Kill-Ch
      Seeing Over the Horizon: Predictive and Preventive Security Based on the Kill-Ch Tim Helming and Mike Cloppert Recorded: Nov 7 2016 5:45 pm UTC 62 mins
    • The Kill Chain model is a useful way to understand how adversaries are able to compromise their victims. During the earliest stages of preparation for an attack, the reconnaissance phase, attackers have not yet breached the victim environment, but they are, in fact, leaving subtle clues behind. These clues can be detected and enriched to help an organization prepare defenses ahead of the first directly invasive move by the adversary.

      In this recorded webinar, you will learn:

      -The 7 steps of the cyber kill chain
      -Prepare defenses ahead of the first directly invasive move by the adversary
      -How DomainTools data and tools enable you to apply this strategy to your own organization

      Guest Speaker - Mike Cloppert

      Michael has worked as a security analyst in various sectors including the Financial, Federal Government, and Defense industries. He has an undergraduate degree in Computer Engineering from the University of Dayton, an MS in Computer Science from The George Washington University, has received a variety of industry certifications including SANS GCIA, GREM, and GCFA, and is a SANS Forensics and IR blog contributor. Michael's past speaking engagements include the DC3 Cybercrime Conference, IEEE, and SANS amongst various others.

      Read more >
    • Becoming a Threat Hunter in Your Enterprise
      Becoming a Threat Hunter in Your Enterprise John H Sawyer, Senior Security Analyst at InGuardians and Chris Pace, Technology Advocate at Recorded Future Recorded: Apr 14 2017 12:45 pm UTC 63 mins
    • You’re tired of waiting. Tired of waiting for your technology to alert you that there’s already a problem. You want to be more proactive, sink your hands into those threat intelligence feeds, dig into those behavioral analytics reports, follow one clue after another after another, until it leads you to a would-be attacker, before they finish carrying out their grand plan. What you want is to be a threat hunter.

      And why not? Organizations who use threat hunting find it reduces their attack surface and enhances their incident response speed and accuracy. Yet few have formal programs in place with clear methodologies and repeatable processes. Attend this webinar and you’ll learn:

      • How threat hunting works
      • What a formal threat hunting program looks like
      • What skills any threat hunter should have
      • The threat hunter’s essential tricks and techniques of the trade

      Read more >
    • Threat intelligence and predictions for 2017 with Kaspersky Lab
      Threat intelligence and predictions for 2017 with Kaspersky Lab Amar Singh Recorded: Jan 6 2017 3:15 pm UTC 60 mins
    • Join us to learn about the top predictions for 2017, as identified by Kaspersky Lab's Global Research & Analysis Team (GReAT). Gain the latest intelligence on the threat landscape and our predictions for 2017

      We face a future of increasingly subtle and sophisticated threat factors; a world where traditional clues and indicators are no longer enough on their own to identify and block attacks; where information is wielded as a weapon, misdirection is king, and global networks of connected devices can be used to paralyse the Internet. What does this mean for business in 2017?

      Kaspersky Lab UK's Principal Security Researcher, David Emm, shall present the Who, What, How and Why in Kaspersky Lab's predictions for 2017 and explain how they will affect the cyber-security landscape throughout the year.

      - Who: The business sectors we predict will be particularly targeted in 2017 and who will attack them.

      - What: The data, behaviour and habits that will expose businesses to increasingly sophisticated threat factors.

      - How: The technical methods through which businesses will be targeted.

      - Why: What Kaspersky predict to be the endgame of 2017's cyber-criminals.

      Hosted by Amar Singh

      Read more >
    • The CSI Imperative
      The CSI Imperative Jeff Rumburg, Managing Partner at MetricNet Recorded: Feb 7 2017 7:00 pm UTC 63 mins
    • The CSI Imperative – How Successful Support Organizations Institutionalize Continual Service Improvement

      The advent of Chief Service Officers and Chief Improvement Officers offer telling clues about why some support organizations succeed at institutionalizing continual service improvement while most others fail. For these pioneering companies, CSI is not a mere slogan, project or program, but rather a core discipline that is carefully developed, nurtured, and managed over time.

      In this presentation, Mr. Rumburg, who has been retained as an IT service and support expert by some of the world’s largest corporations, will present case studies of support organizations that have successfully built a culture and discipline of continual service improvement. Additionally, he will provide a sample CSI timeline and an empirical model for Continual Service Improvement.

      Attendees will learn about the core discipline of CSI, the role of chief service and chief improvement officers, common pitfalls of implementing CSI, and the five success factors for effective CSI.

      Read more >
    • B2B Marketing in 2016: New Roles and Trends You Need to Know About
      B2B Marketing in 2016: New Roles and Trends You Need to Know About MATHEW SWEEZEY, Principal of Marketing Insights - Salesforce Recorded: Feb 18 2016 6:00 pm UTC 43 mins
    • Purpose, value, trust - these words that are the foundation of the new world of B2B marketing. Incredibly telling, they provide critical clues to the 2016 buyer. Your buyer’s expectations, discovery paths, and mindset are all quite different from just a few years ago. But, how and why are they different?

      Unlocking these mysteries holds the key to discovering our new roles as marketers, success in marketing and sales, pipeline, lifecycle for 2016 and beyond. Join Mathew Sweezey, Principal of Marketing Insights at Salesforce, as he shares with us valuable information on the ever-evolving B2B marketing world. You will:

      - Explore how today’s buyer is different, and why identifying these differences is crucial to a B2B marketer’s success
      - Discover how and why a CMO’s understanding of the new B2B marketing landscape and technology can spell success (or otherwise) for both marketing teams and buyers
      - Learn why the future of demand is undeniably now the new “middle” and how this effort is fueling new marketing roles and relationships

      Fair Warning: Be prepared to be inspired!

      Read more >