Hi [[ session.user.profile.firstName ]]

SOC Stories: Inside the Front Lines of Cyber Defense

A Security Operations Center (SOC) provides proactive threat monitoring, threat detection, and advice to stop threats quickly. But you may be surprised at what goes on behind the scenes to keep you safe.

Hear first-hand how our SOC team works tirelessly to thwart attackers — from the analysts themselves. We’ll also discuss Alert Logic’s new cybersecurity report which shows how broad, continuous assaults of massive scale dominate today’s attacks.

Real cyber threat experts will share:
• The critical role a SOC plays in a defensive cybersecurity strategy across any platform
• Techniques used to defend against attempted attacks and breaches
• Strategies to help you proactively identify and address high risk areas

Our SOC gives you the edge over cyber adversaries. Join us and learn how.
Recorded Oct 11 2018 51 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ben Nguyen, Roy Bray, and Mobeen Khan, Security Analysts at Alert Logic
Presentation preview: SOC Stories: Inside the Front Lines of Cyber Defense

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Security Maturity: Bridging the Talent and Skills Gap Nov 28 2019 4:00 pm UTC 43 mins
    Chris Noell, Senior Vice President, Product, and Joey Peloquin, Director, Product Management
    Companies of every size and across every industry need to have appropriate resources and solutions to defend against cyber attacks. For many organizations, the myriad of security technologies and solutions, and the volume and tenacity of cyber threats, can make the challenge seem overwhelming to manage on their own. Budgets are tight — it can be a struggle to keep security solutions current, let alone maintain an appropriate number of qualified staff or incorporate critical up-to-date threat research and intelligence in day-to-day operations.

    Join this webinar to hear security experts speak plainly about the challenge of maturing security programs in the age of the talent and skills gap, and alternative solutions that don’t involve the implementation of disparate tools or onboarding of expensive outsourcing providers. SIEMless Threat Management from Alert Logic provides the right level of coverage for the right resources, designed to fit your security needs, without breaking the bank.
  • Five Recommendations to Strengthen Your Security Program Nov 21 2019 4:00 pm UTC 57 mins
    Jack Danahy - SVP, Security
    Cyber attack methods have evolved aggressively to become more targeted, more sophisticated, and more frequent. For this webinar we have distilled 5 of the most common and urgent problems that enterprises face, and will share our analysis of the issues and practical recommendations for addressing them within your own security program.

    Join Jack Danahy, SVP, Security, as he outlines steps to:

    •Track and combat the evolving threat landscape
    •Increase visibility and resistance at the attack surface
    •Battle alert fatigue and the security talent shortage
    •Define a cyber-risk baseline and process for your security program

    Attendees will receive a Security Workbook with steps to take within the next 30 days to assess and improve their enterprise security program.
  • Beyond AV: Adding Protection for Fileless Techniques Recorded: Oct 23 2019 33 mins
    Tony Bailey, Director of Product Marketing, and John Pirc, Director, Product Management
    Over 90% of breaches begin with a compromise initiated by an end user. And, IT teams spend significant time chasing false positives and negatives with over 55% of alerts resulting in false-positives.

    One recent survey uncovered that 62% of attacks in 2019 would be file-based while 38% would be fileless attacks. Alert logic understands the need for an endpoint solution that isn’t reliant on signatures as they do not scale with the current threat surface today and tomorrow.

    In this webinar we will share how Alert Logic Essentials extended endpoint protection uniquely addresses these challenges and walk through some of the product features.

    Alert Logic’s endpoint protection intelligently blocks attacks through a combination of machine-learning attribute analysis and real-time behavior analysis and provides deep CPU-level visibility without impacting performance.

    2018 Verizon Data Breach Investigations Report (DBIR)

    2018 Ponemon Institute State of Endpoint Security Risk
  • SOC Analysts in Action Recorded: Sep 19 2019 58 mins
    Dan Pitman, Principal Security Architect - Ben Nguyen, Security Analyst - Roy Bray, Security Analyst
    SOC analysts watch your back 24x7 – and they’ve seen it all. Hear what goes on on the front lines of cybersecurity.

    A Security Operations Center (SOC) provides proactive threat monitoring, threat detection, and advice to stop threats quickly. But you may be surprised at what goes on behind the scenes to keep you safe. Our SOC analysts monitor for malicious activity 24/7 to separate the needles you need to care about from the rest of the stack of needles. With cybersecurity experts watching over your business, you have the freedom to focus on what’s important —developing innovative solutions and growing your business.

    Hear first-hand how our SOC team works tirelessly to thwart attackers – from the analysts who understand security, technology and the business, and who’ve seen it all.

    You’ll hear:

    • Real-world experiences and techniques used to defend against attempted attacks and breaches
    • Strategies to help you proactively identify and address high risk areas
    • The critical role a SOC plays in a 24/7 defensive cybersecurity strategy

    Having fully managed, around-the-clock, expert threat monitoring and detection is critical for any business. But it doesn’t have to be complex or costly – join us to learn how.
  • Addressing Vulnerabilities and Threats from Dark Web Attacks Recorded: Sep 18 2019 34 mins
    Jack Danahy, SVP, Security of Alert Logic and Jeffrey Pearl, CEO of OTG Consulting
    Ever wonder how cheap it is to purchase malware or ransomware on the dark web? A recent study by a security firm, published the following dark web pricing:
    - Hacking a site and gaining full control over a web application costs only $150
    - Average cost of ransomware is $270 (In 2017, ransomware including WannaCry, NotPeyta, BadRabbit, Locky, and Cerber epidemics racked up attacks in excess of $1.5 billion)

    As the costs go down and the cyber threats go up using dark web technologies to infiltrate, you need an innovative security partner that stays ahead of the evolving threat landscape.

    Join us for 30 minutes on Wednesday, September 18 at 10:00 a.m. CT and learn how Alert Logic protects you against cyber-attacks. During this session, we will discuss:
    - Importance of threat monitoring and intrusion detection
    - Realities of SQL injection, DoS attacks, URL tampering, cross-site scripting attacks can have on your business
    - Advantages of detection capabilities including dark web scanning to spot and block malicious activity

    This is a session you don’t want to miss! Register today.
  • Why You Need Intelligence Driven Threat Detection to Stay Secure Recorded: Aug 8 2019 44 mins
    Jonny Milliken, Threat Research Manager and Kenny Lemmen, Security Analyst Team Lead
    The Importance of Integrating Threat Intelligence into Your Security Strategy to Counter Threats

    Any host exposed to the public internet is under constant bombardment from malicious actors, with a suite of attack tools which are growing in breadth and volume. This can make threat detection seem daunting, but it doesn’t have to be that way. By tethering your threat detection to an intelligence capability, you are able to identify and react to the most important threats as soon as attackers add them to their arsenal. In this webinar we will outline how Alert Logic approaches this problem and outline some of the recent successes which show its benefit.

    Topics Covered:

    • How the cyber threat landscape is evolving and driving new approaches to counter threats
    • A look under the hood of recent breaches
    • Why threat intelligence should be a key element of your security operations
  • AWS Security Reinforced Recorded: Jul 18 2019 53 mins
    Jeremy Breland, Principal Solution Architect and Dan Pitman, Principal Security Architect
    Key AWS RE:INFORCE Highlights and Security Guidance for Your AWS Workloads

    Join Alert Logic’s Jeremy Breland (Principal Solution Architect) and Dan Pitman (Principal Security Architect) as they discuss the news and goings on at the inaugural AWS RE:INFORCE conference focused on security, identity, and compliance. Learn about the conference, news you may have missed and Alert Logic’s take on the event as well as receive up to date guidance on how to approach security on your AWS Workloads.

    Key takeaways include:

    • Up-to-date security strategy and challenges in AWS
    • AWS Security Responsibilities
    • re:Inforce announcements and news
  • Critical New Insights About the SMB Threatscape Recorded: Jul 11 2019 43 mins
    Alert Logic
    Cybercriminals increasingly target small and midsized businesses with fewer security resources. With smaller budgets and real staff constraints, many organizations are seeking ways to be ‘security smart’ as they address risks and respond to attacks. And they need better help from security vendors — not just best practices and platitudes. As a result, SMBs are causing innovation in the security market by demanding new solutions like Managed Detection and Response (MDR) as they shift away from a DIY threat management model. The Critical Watch Report 2019: SMB Threatscape provides important insights based on security threat research, attack trends and findings from the Alert Logic Security Operations and Threat Intelligence teams.

    Attend this webinar to learn about the real threats and vulnerabilities facing your organization today and strategies to help you stay secure.

    Key takeaways include:

    - Overview of attacks, vulnerabilities & common attack pattern types seen in SMBs
    - Threat intelligence: Does your company need a partner?
    - What’s available on the Dark Web and what companies should do now
    - DIY Threat Intelligence: Analyzing the true costs
    - Avoiding “tool overload”: Tips to help SMBs address risk with clarity vs. confusion
  • Five Recommendations to Strengthen Your Security Program Recorded: Jul 1 2019 59 mins
    Jack Danahy - SVP, Security
    Cyber attack methods have evolved aggressively to become more targeted, more sophisticated, and more frequent. For this webinar we have distilled 5 of the most common and urgent problems that enterprises face, and will share our analysis of the issues and practical recommendations for addressing them within your own security program.

    Join Jack Danahy, SVP, Security, as he outlines steps to:

    •Track and combat the evolving threat landscape
    •Increase visibility and resistance at the attack surface
    •Battle alert fatigue and the security talent shortage
    •Define a cyber-risk baseline and process for your security program

    Attendees will receive a Security Workbook with steps to take within the next 30 days to assess and improve their enterprise security program.
  • Defending Against Cyber Threats: Hack Attack Recorded: Jun 27 2019 17 mins
    Graeme McMillan, Solutions Architect, Alert Logic
    Data breaches are now a common global occurrence, causing real economic damage to businesses. Lost revenue, damaged reputations, disrupted operations, and significant costs to recover, cyber attackers are adapting their techniques at a much faster pace than most businesses. These once less sophisticated cyber criminals now have easier access to automated exploits that were previously only available to highly skilled nation-state actors.

    Unfortunately protecting an organisation against a cyber threat becomes impossible if you don’t know that the threat exists. So how do you protect your organisations against known and unknown threats? Security is constantly changing. To stay ahead of cyber threats, you need to leverage software plus services to augment your security team and capabilities.

    Join this webinar to hear about emerging threats and the current state of web application vulnerabilities. Learn about the most impactful web app attacks as well as remediation strategies. And take away best practices on how to ensure secure continuity in the cloud.

    Highlights Include:
    • Cyber Hack Demo
    • Insights from Alert Logic's 2018 Critical Watch Report
    • Understand how today’s vulnerabilities are being exploited
    • Realities for scaling threat detection & response across on-prem to cloud environments

    An exciting and very important demonstration for anyone who develops applications, manages websites or is interested in security.
  • This is Security: Stories from the SOC Recorded: May 29 2019 49 mins
    Dan Pitman, Principal Security Architect, Alert Logic Steffan Jones, Manager, Security Operations Centre
    Security Operations Center (SOC) analysts are people who understand security, technology and the business – they watch your back 24/7 – and they’ve seen it all.. A SOC provides proactive threat monitoring, threat detection, and advice to stop cyber threats in their tracks.

    Staying continuously ahead of elusive assaults is a daily challenge security professionals face and you may be surprised at what goes on behind the scenes to keep you safe. To win, you need the capabilities of a modern, fully-staffed SOC. With the Alert Logic threat intelligence team, you get an army of researchers on your side, creating the cutting-edge security data necessary to protect your organisation against the latest cyber threats. 24/7 expert defense, with no added staff, and no more sleepless nights (not only in Seattle).

    In this webinar, our cyber threat experts will walk through:

    • The critical role a SOC plays in a defensive cybersecurity strategy across any platform
    • Techniques used to defend against attempted cyber attacks and breaches
    • Strategies to help you proactively identify and address high risk areas
    • Our SOC gives you the edge over cyber adversaries. Join us and learn how.
  • Five Recommendations to Strengthen Your Security Program Recorded: May 16 2019 58 mins
    Jack Danahy - SVP, Security
    Cyber attack methods have evolved aggressively to become more targeted, more sophisticated, and more frequent. For this webinar we have distilled 5 of the most common and urgent problems that enterprises face, and will share our analysis of the issues and practical recommendations for addressing them within your own security program.

    Join Jack Danahy, SVP, Security, as he outlines steps to:

    •Track and combat the evolving threat landscape
    •Increase visibility and resistance at the attack surface
    •Battle alert fatigue and the security talent shortage
    •Define a cyber-risk baseline and process for your security program

    Attendees will receive a Security Workbook with steps to take within the next 30 days to assess and improve their enterprise security program.
  • Another Bucket Bites the Dust... Simplifying AWS Cybersecurity Recorded: May 16 2019 54 mins
    Dan Pitman, Principal Security Architect, Alert Logic
    With the rapid rise of web application attacks, which is the number one source of data breaches, securing cloud-based web applications is a challenge. In order to fully protect your web applications in the cloud, it is important to know the risks, select the right security tool, and understand your role in the shared responsibility for security.

    Securing your AWS workload can mean many different things, ranging from locking down your environment via the AWS best practices list, to completely outsourcing the security management and responsibility to another company. While every company’s security journey is different, everyone can agree that the need to monitor and improve security posture is becoming increasingly important.

    Start here with Dan Pitman, Principal Security Architect, Alert Logic as he lists the top considerations to better protect your AWS workloads and applications. Learn the core fundamentals to a stronger AWS cloud security strategy.

    Register now and gain key security takeaways, including:
    • Guidelines to security risk: understanding your AWS environment and the exposures your web apps face
    • Learnings from top configuration vulnerabilities involving root, S3, IAM, security groups, and more
    • How security incidents differ on hybrid networks versus public-cloud installations
    • Threat detection capabilities and creating an effective incident response plan
  • Defending Against Cyber Threats: Hack Attack Recorded: May 16 2019 18 mins
    Graeme McMillan, Solutions Architect, Alert Logic
    Data breaches are now a common global occurrence, causing real economic damage to businesses. Lost revenue, damaged reputations, disrupted operations, and significant costs to recover, cyber attackers are adapting their techniques at a much faster pace than most businesses. These once less sophisticated cyber criminals now have easier access to automated exploits that were previously only available to highly skilled nation-state actors.

    Unfortunately protecting an organisation against a cyber threat becomes impossible if you don’t know that the threat exists. So how do you protect your organisations against known and unknown threats? Security is constantly changing. To stay ahead of cyber threats, you need to leverage software plus services to augment your security team and capabilities.

    Join this webinar to hear about emerging threats and the current state of web application vulnerabilities. Learn about the most impactful web app attacks as well as remediation strategies. And take away best practices on how to ensure secure continuity in the cloud.

    Highlights Include:
    • Cyber Hack Demo
    • Insights from Alert Logic's 2018 Critical Watch Report
    • Understand how today’s vulnerabilities are being exploited
    • Realities for scaling threat detection & response across on-prem to cloud environments

    An exciting and very important demonstration for anyone who develops applications, manages websites or is interested in security.
  • This is Security: Nothing is what it SIEMs Recorded: Apr 29 2019 48 mins
    Dan Pitman, Principal Security Architect, Alert Logic
    Companies of every size and across every industry need to have a solution to defend against cyber attacks. For medium-sized and budget-constrained companies especially – the array of security technologies and solution and the volume of cyber threats can make the challenge seem overwhelming.

    Organizations suffer trying to manage raw data, security events and false positive incidents with limited context, overworked staff, and a lack of threat landscape knowledge. There is a better way to improve your security without the time, effort, and cost of purchasing and integrating multiple tools, a traditional SIEM or expensive traditional security outsourcing vendors.

    A seamless combination of platform, threat intelligence, and expert services can provide a simpler, most cost-effective approach to security for all infrastructure and workloads across physical, virtual and cloud environments.

    Get the inside scoop on a new approach to threat management that gives you the right level of coverage for the right resources. Join our Principal Security Architect, Dan Pitman to learn more about this more effective approach to cybersecurity and threat management.

    Highlights Include:
    • Insights from Alert Logic's 2018 Critical Watch Report
    • Realities for scaling threat detection & response across on-prem to cloud environments
    • Understand how today’s vulnerabilities are being exploited
    • Find out how to achieve the right level of leverage for the optimal level of investment
  • Cybersecurity in Financial Services: No one can afford a cyberattack Recorded: Apr 25 2019 53 mins
    Dan Pitman, Principal Security Architect
    Financial organizations fall victim to cyberattacks more frequently than any other industries. The growth in volume and sophistication of cyber-threats, combined with regulatory changes, mean that financial institutions are having to improve their IT security postures notably.

    Facing modern cyber-threats head-on requires organizations to follow well-defined processes and mature IT security tools that need to be closely monitored and managed. Additionally, financial businesses handle highly confidential data that must be stored in a compliant manner and managed securely. A seamless combination of platform, threat intelligence, and expert services can provide a simpler, most cost-effective approach to security for all infrastructure and workloads across physical, virtual and cloud environments.

    Get the inside scoop on a new approach to threat management that gives financial organizations the right level of coverage for the right resources. Join our Principal Security Architect, Dan Pitman, to learn more about this more effective approach to cybersecurity and threat management in the financial world.

    Highlights Include:
    • The state of cybersecurity at financial institutions
    • Integrating security and compliance within Financial Services
    • Understand how today’s vulnerabilities are being exploited
    • Find out how to achieve the right level of leverage for the optimal level of investment
  • This is Security: Stories from the SOC Recorded: Apr 11 2019 50 mins
    Dan Pitman, Principal Security Architect, Alert Logic Steffan Jones, Manager, Security Operations Centre
    Security Operations Center (SOC) analysts are people who understand security, technology and the business – they watch your back 24/7 – and they’ve seen it all.. A SOC provides proactive threat monitoring, threat detection, and advice to stop cyber threats in their tracks.

    Staying continuously ahead of elusive assaults is a daily challenge security professionals face and you may be surprised at what goes on behind the scenes to keep you safe. To win, you need the capabilities of a modern, fully-staffed SOC. With the Alert Logic threat intelligence team, you get an army of researchers on your side, creating the cutting-edge security data necessary to protect your organisation against the latest cyber threats. 24/7 expert defense, with no added staff, and no more sleepless nights (not only in Seattle).

    In this webinar, our cyber threat experts will walk through:

    • The critical role a SOC plays in a defensive cybersecurity strategy across any platform
    • Techniques used to defend against attempted cyber attacks and breaches
    • Strategies to help you proactively identify and address high risk areas
    • Our SOC gives you the edge over cyber adversaries. Join us and learn how.
  • HIPAA Compliance – Are You Staying Healthy? Recorded: Apr 10 2019 35 mins
    Tony Bailey, Director, Product Marketing
    The medical/healthcare industry accounted for more than 23 percent of total cybersecurity breaches*.

    But, keeping up-to-date with HIPAA requirements to help protect data can be difficult. And selecting technologies so your organization can implement security controls to comply with HIPAA regulations can be overwhelming.

    We can help you break it down. In this webinar we will walk through:

    • The current state of HIPAA compliance, and how businesses are stacking up
    • Top reasons for HIPAA compliance failures and how to avoid them
    • A customer example that’s using Alert Logic for their HIPAA compliance project

    And, we’ll share how Alert Logic can help you stay healthy with your HIPAA compliance projects with low cost and effective threat management for achieving and maintain compliance over time with less effort and cost.

    *Identity Theft Resource Center
    https://www.idtheftcenter.org/images/breach/2017Breaches/2017AnnualDataBreachYearEndReview.pdf
  • Cybersecurity in Retail: A Necessity Recorded: Mar 28 2019 52 mins
    Dan Pitman, Principal Security Architect, Alert Logic
    The retail industry faces a challenging cyber threat environment. Retailers store more consumer data than ever before, across an increasing range of digital platforms, providing cybercriminals with more valuable data to target and more doorways to access it. As retailers invest in new technologies to collect and manage customer data, there is a corresponding rise in the need to navigate the regulatory issues unique to these technologies and to maintain effective system controls to ensure the security of the collected data.

    As hacker techniques are becoming more widespread and sophisticated, it is important to have a comprehensive cyber security strategy in place. The impact of these data breaches can be catastrophic, especially in retail where brand reputation and loyalty are the keys to success. For retailers, more detection capability is necessary. They need access to more diverse, detection-based security controls to give them broader visibility of malicious activity in their network.

    In this live webinar, Dan Pitman at Alert Logic, will analyse the current UK Retail cyber threat landscape and the new approach to threat management that gives you the right level of coverage for the right resources to help you overcome the challenges of retail cyber security.

    • Trends in UK Cyber Crime targeting the Retail and eCommerce Sector
    • Understand what cyber attackers are really after, why, and how they’re getting what they want
    • Realities for scaling threat detection & response across on-prem to cloud environments
  • Why You No Longer Need a SIEM Tool Recorded: Mar 26 2019 58 mins
    Matt Selheimer, Chief Strategist
    How to handle evolving threats and expanding compliance risks when you have resource constraints.

    For years, organizations have struggled with the high-cost and long time-to-value of implementing Security Information and Event Management (SIEM) tools. Even worse, you may have tried an expensive cybersecurity outsourcing vendor that failed to deliver little more than yet another alert stream.

    Join this webinar instead of being held back by the past. Because the good news is there’s a new approach that seamlessly combines an award-winning security platform, cutting-edge threat intelligence, and 24x7 expert defenders that doesn’t take months or years to implement – with starting costs far less than one FTE a year – yes, you read that right.

    It’s a risk-based approach that gives you the right level of security and compliance coverage for cloud, hybrid, and on-premises environments.

    You really should check it out, unless you want to keep trying to make that SIEM tool work…
Security. Compliance. Cloud.
Your company’s security depends on being able to detect threats and respond to attacks quickly. But most organizations investigate less than 4 percent of all events they receive.

Alert Logic has a better way.

A SIEMless connected solution that brings together an award-winning platform, cutting-edge threat intelligence, and expert defenders:
- Flexible coverage tailored to your individual business needs
24/7 SOC and expert remediation advice
- Simple pricing with a lower total cost than assembling your own solutions or traditional outsourcing
-Evolving threats, expanding compliance risks, and resource constraints require a new approach

For more information about Alert Logic, visit https://www.alertlogic.com or follow us on Twitter @alertlogic

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: SOC Stories: Inside the Front Lines of Cyber Defense
  • Live at: Oct 11 2018 3:00 pm
  • Presented by: Ben Nguyen, Roy Bray, and Mobeen Khan, Security Analysts at Alert Logic
  • From:
Your email has been sent.
or close