Hi [[ session.user.profile.firstName ]]

Introducing a Simpler Way to Effective Threat Management

How to Get the Right Security Coverage for the Right Resources

There’s a better way to improve your security without the time, effort, and cost of purchasing and integrating multiple tools, a traditional SIEM (security incident and event management), or expensive traditional security outsourcing vendors.

Get the inside scoop on a new approach to threat management that gives you the right level of coverage for the right resources. Learn how Alert Logic’s seamless combination of platform, threat intelligence, and expert services can provide a simpler, more cost-effective approach to security for all your infrastructure and workloads – including across physical, virtual and cloud environments. Learn also how our flexible packaging and pricing will help you get the right level of leverage for the optimal level of investment.

Join our experts in this webinar to learn more about this new approach to cybersecurity and see a demo of it in action.
Recorded Nov 15 2018 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Alert Logic
Presentation preview: Introducing a Simpler Way to Effective Threat Management

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Staying a Step Ahead: Security Predictions and Preparations for 2019 Dec 13 2018 4:00 pm UTC 60 mins
    Alert Logic
    Hear predictions from our security experts about the evolving threat landscape so you can get prepared with actionable recommendations to improve your cybersecurity posture for 2019.

    The attack landscape is shifting with increased automation and cunning new distribution methods. There’s no discrimination when it comes to a security breach any more: everyone is at risk. How are you preparing to stay ahead of attackers, and not just for their existing attack methods but new and emerging ones as well?

    Alert Logic security experts have a front row seat on current and emerging attacks across more than 4,000 clients. Join this webinar to hear their predictions for 2019 along with practical guidance on how you can stay a step ahead and better protect your business.
  • Introducing a Simpler Way to Effective Threat Management Recorded: Nov 15 2018 60 mins
    Alert Logic
    How to Get the Right Security Coverage for the Right Resources

    There’s a better way to improve your security without the time, effort, and cost of purchasing and integrating multiple tools, a traditional SIEM (security incident and event management), or expensive traditional security outsourcing vendors.

    Get the inside scoop on a new approach to threat management that gives you the right level of coverage for the right resources. Learn how Alert Logic’s seamless combination of platform, threat intelligence, and expert services can provide a simpler, more cost-effective approach to security for all your infrastructure and workloads – including across physical, virtual and cloud environments. Learn also how our flexible packaging and pricing will help you get the right level of leverage for the optimal level of investment.

    Join our experts in this webinar to learn more about this new approach to cybersecurity and see a demo of it in action.
  • Three Best Practices for Monitoring Your PCI Preparedness Recorded: Oct 25 2018 33 mins
    Tony Bradley, Senior Manager of Content Marketing, Alert Logic and Lee Ramsey, Co-Founder of Pre-Fi
    Maintaining and proving PCI DSS compliance can be a constant headache.

    Without the right tools and resources, monitoring your PCI compliance can be complex and involve lots of time and costs

    Join us as we share the three best practices for monitoring PCI compliance .. Alert Logic’s automated security controls streamline assessment and detection of vulnerabilities and suspicious behavior that could jeopardize your compliance status.

    We’ll discuss product features and show you:

    -What data to monitor for PCI compliance
    -How to look for issues related to PCI compliance
    -What logs to review and make available for auditors

    Hear from our experts about these capabilities and more in this ’staying ahead of PCI compliance webinar.

    Additionally, this webinar will feature a Q&A session with Alert Logic customer Lee Ramsey, Co-founder of Pre-Fi, a provider of pre-qualification tools for consumer loan approvals. Lee will share how Alert Logic solutions help with PCI compliance preparedness.
  • Wealth Wizards: Threat Detection with Amazon GuardDuty and Alert Logic Recorded: Oct 24 2018 50 mins
    Ryan Holland with AWS, Jeremy Breland with Alert Logic, Richard Marshall with Wealth Wizards
    Knowing where, why, and how to respond quickly to cyber threats is critical to protecting your Amazon Web Services (AWS) workloads. That’s where AWS Partner Network (APN) partners like Alert Logic come in. As part of its broader Managed Threat Detection and Response offering, Alert Logic provides an AWS-native security service that shows why, where, and how to respond to Amazon GuardDuty findings, while continuously assessing AWS configurations to find exposures and recommend actions that prevent future compromises.

    In this webinar, you'll learn how Wealth Wizards, a financial services company, utilizes AWS services such as Amazon GuardDuty and leverages Alert Logic to gain additional security context, actionable remediation steps, and protection. You will also learn how:

    •Alert Logic complements AWS security services to help you quickly attain complete visibility of your cloud environment
    •To identify unexpected and malicious activity through Amazon GuardDuty
    •To transform security findings into actionable insights

    Alert Logic gives you deeper insight into what GuardDuty findings mean and identifies common configuration errors – such as ports open to the public, or overly permissive identity and access management policies – and gives you a broader, more holistic view of your AWS environment and beyond.
  • The Current State of Cyber Security is a 24x7x365 Game Recorded: Oct 18 2018 45 mins
    Paul Le Page, Senior Solutions Architect, Alert Logic
    The lack of awareness around cyber threats and the risk that these pose to an organisation is a worrying state of affairs. Data breaches, hacks and various cyber-attacks dominate the headlines on a regular basis. Unfortunately protecting an organisation against a cyber threat becomes impossible if you don’t know that the threat exists. So how do you protect your organisations against known and unknown threats? Security is constantly changing. To stay ahead of threats, you need to leverage software plus services to augment your security team and capabilities.

    Join Paul Le Page, Senior Solutions Architect, as he shares insights from Alert Logic’s 2018 Critical Watch Report, based upon findings from verified security incidents from thousands of companies around world.

    Highlights Include:
    • Insights from Alert Logic's 2018 Critical Watch Report
    • Realities for scaling threat detection & response across on-prem to cloud environments
    • Understand how today’s vulnerabilities are being exploited
    • Learn how to augment your security team and capabilities without breaking the bank
  • SOC Stories: Inside the Front Lines of Cyber Defense Recorded: Oct 11 2018 51 mins
    Ben Nguyen, Roy Bray, and Mobeen Khan, Security Analysts at Alert Logic
    A Security Operations Center (SOC) provides proactive threat monitoring, threat detection, and advice to stop threats quickly. But you may be surprised at what goes on behind the scenes to keep you safe.

    Hear first-hand how our SOC team works tirelessly to thwart attackers — from the analysts themselves. We’ll also discuss Alert Logic’s new cybersecurity report which shows how broad, continuous assaults of massive scale dominate today’s attacks.

    Real cyber threat experts will share:
    • The critical role a SOC plays in a defensive cybersecurity strategy across any platform
    • Techniques used to defend against attempted attacks and breaches
    • Strategies to help you proactively identify and address high risk areas

    Our SOC gives you the edge over cyber adversaries. Join us and learn how.
  • Understanding the Attack Landscape – Your Best Cyber Security Defense Recorded: Sep 27 2018 33 mins
    Matt Downing and Carlos Castillo, Threat Intelligence Researchers, Alert Logic
    With smart attackers seeking the weakest spots in network defenses and retooling to understand the changing attack surface – you need to get, and stay, ahead of the game.

    As we reflect on the state of security this past year, it’s evident that cybercriminals continue to be successful with a trusted set of techniques proven effective against common vulnerabilities and misconfigurations. Attackers looking to make a buck prey on businesses of all sizes.

    Fortunately, by understanding what the attack landscape looks like, where the next attacks will be coming from, and what your attackers might be after, you can achieve top-strength security. Join this session to hear how attackers are infiltrating enterprise environments and how you can learn from them. We’ll dive into real case studies and provide actual code samples.

    We’ll discuss recent breaches and share:

    • An overview of the timeline announcement to public proof-of-concept release
    • Alert Logic’s immediate coverage with generalized web coverage on our threat manager appliances
    • The number of attacks over time
    • Categorizing attacker payloads to define their initial compromise goals and intentions
    • A look at understanding victim targeting
    • Common outcomes in incidents where the attacks were successful

    What you’ll take away:

    • An understanding of the critical timing to patch vulnerable systems
    • How Alert Logic’s SOC with Active Intelligence can carry the load for detection and response
    • Ways to detect common attacker goals and intentions

    Join us for these key take-aways and more, as we share critical insights for understanding today’s attack landscape.
  • Protect Your AWS Containers Recorded: Sep 18 2018 59 mins
    Dan Pitman, Senior Solutions Architect - Alert Logic and Richard Marshall, Head of Platforms - Wealth Wizards
    Protect against a wide array of cyberattacks that target your AWS containers with a solution designed for real-time detection of known and unknown exploits for AWS-deployed Docker, Kubernetes, Elastic Beanstalk, and Elastic Container Service (ECS).

    Container adoption is skyrocketing, growing 40% in the last year. Security concerns are also growing and the top roadblock to container deployment. Steps like process monitoring, vulnerability management, and configuration management are available to alleviate security concerns. But without the ability to inspect the network traffic that targets containers, security teams continue to struggle. This enables suspicious activity within your container environments to go undetected and leaves you susceptible to a container or base host compromise.
    Alert Logic recently announced the industry’s first network detection for containers allowing customers to inspect network traffic for malicious activity provide them with faster detection of compromises, and reduced risk of attacks to their cloud workloads on AWS.

    Learn more in this impactful webinar as Dan Pitman, Senior Solutions Architect at Alert Logic presents a timeline demonstrating what happens when a container threat is detected, and how Alert Logic prioritise it and proactively escalates it with visual context and remediation advice. Also, Richard Marshall from Wealth Wizards will share the best practices learnt from the past 18 months of working with Kubernetes and Containers.

    Highlights include:
    - A snapshot of the differences between Docker and Kubernetes containers
    - What you need to know to stay ahead of attacks on containers
    - Best practices to avoid compromising your containers and base hosts
    - Security hygiene for containers
    - Customer Case study: Life with Kubernetes and containers
  • AWS Security: Advanced Threat Detection and Response Recorded: Sep 6 2018 58 mins
    Paul Le Page, Solutions Architect at Alert Logic
    Security tools alone are not enough as your AWS environment becomes more complex, and the need for comprehensive security – including people, process, and technology – becomes apparent. Cyber threats continue to increase in volume and sophistication, so where do you start when incorporating advanced threat detection and response capabilities into your security strategy?

    Start here with Paul Le Page, Solutions Architect at Alert Logic as he lists the top considerations to better protect your AWS workloads and applications. Learn the core fundamentals to a stronger AWS cloud security strategy.

    Register now for this engaging webinar and gain key security insights including:
    - Understanding your AWS environment and the exposures your web apps face
    - Learnings from top configuration vulnerabilities involving root, S3, IAM, security groups, and more
    - The use of multiple data sources to attain a “defense in depth” security strategy
    - Threat detection capabilities and creating an effective incident response plan
  • AWS Security: Advanced Threat Detection and Response Recorded: Aug 23 2018 58 mins
    Paul Le Page, Solutions Architect at Alert Logic
    Security tools alone are not enough as your AWS environment becomes more complex, and the need for comprehensive security – including people, process, and technology – becomes apparent. Cyber threats continue to increase in volume and sophistication, so where do you start when incorporating advanced threat detection and response capabilities into your security strategy?

    Start here with Paul Le Page, Solutions Architect at Alert Logic as he lists the top considerations to better protect your AWS workloads and applications. Learn the core fundamentals to a stronger AWS cloud security strategy.

    Register now for this engaging webinar and gain key security insights including:
    - Understanding your AWS environment and the exposures your web apps face
    - Learnings from top configuration vulnerabilities involving root, S3, IAM, security groups, and more
    - The use of multiple data sources to attain a “defense in depth” security strategy
    - Threat detection capabilities and creating an effective incident response plan
  • Threat Hunting, the Difference Between Safe and Sorry Recorded: Aug 2 2018 46 mins
    Dr. Jonny Milliken, Threat Intelligence Manager, Alert Logic; Holger Schulze, CEO, Cybersecurity Insiders
    Think Threat Hunting is a nice-to-have, or just a buzz word? Think again. Threat hunting is critical for early detection of unknown threats and advanced attacks that turn into undetected breaches.

    In today’s complex cybersecurity landscape, threats are becoming more sophisticated, frequent, and elusive. It’s no longer enough to depend on traditional, reactive security to stay safe – incorporating threat hunting techniques in your cybersecurity strategy is a necessity.

    Threat hunting puts security on the offense. Rather than just waiting for an attack to trip an alarm, threat hunting takes a comprehensive, holistic approach to proactively monitor for and identify suspicious or potentially malicious activity, so you can take action earlier.

    Hear from experts on how and why threat hunting is critical for your cybersecurity strategy. In this webinar, we’ll cover:

    • How these advanced multi-step attacks work and go undetected
    • How to find evidence of emerging threats and preserve indicators of compromise
    • Logs, and why they are a threat hunter’s best friend
    • Using techniques like honey pots to draw out malicious insiders and would-be cyber attackers
  • Tales from the SOC: Live Simulated Hack Recorded: Jul 19 2018 26 mins
    Graeme McMillan, Solutions Architect, Alert Logic
    Watch this 3-stages Live Simulated Hack Demo from Alert Logic's Cloud Security Summit as we show you the impact of reconnaissance tactics to identify vulnerable systems. We also demonstrate how easy it is for cyber criminals to gain foothold in remote environments, the latest tricks attackers are using, and what you should focus on to keep data and systems secure. An exciting and very important demonstration for anyone who develops applications, manages websites or is interested in security.

    Join Graeme McMillan, Alert Logic’s Sales Engineer, as e demonstrated the importance of understanding the risk and your attack surface of your business-critical applications. Make sure to identify high risk areas, before the cyber criminals get there first.
  • Observation of Trifles - Sherlock Holmes' Lessons on Machine Learning & Security Recorded: Jul 19 2018 28 mins
    Ben Banks, Global Director of Cybersecurity, Ensono
    Join Ensono Global Director of Cybersecurity Ben Banks for a timely and informative session on machine learning and security.

    In this webinar you will learn:
    - Making correct inferences and deductions from small indicators combined with larger datasets (should we start to correlate data about our clients share prices and related news items).
    - The importance of the reveal (integrability) i.e. "Holmes....how the devil did you know?"
    - The importance of people-centric analysis and 'profiling' i.e. motive
    - Moriarty i.e. expect your enemy to be as good as - if not better - than you
  • To SIEM or not to SIEM: Protecting Applications in Cloud and Hybrid Environments Recorded: Jul 19 2018 16 mins
    Dan Pitman, Senior Solutions Architect, Alert Logic
    Today’s security information and event management (SIEM) solutions are powerful tools that promise to make use of your endpoint, network, and system log data while empowering you with direct control to configure what constitutes a real in your unique environment. However, their success and efficacy depend on the thought and effort that goes into how they are configured, deployed, used and maintained.

    When considering a SIEM for security, there a few factors that are often overlooked:
    * Challenges of aligning SIEM with today’s security challenges
    * Difficulty of improving outputs to be accurate, actionable and relevant
    * Underestimating total effort and cost required to meet objectives

    For most companies, desired outcomes circle around shrinking the attack surface, accurate threat detection, reducing dwell time and most importantly, addressing the current threat landscape. These goals are achievable at lower cost in terms of TCO, staff hours and infrastructure management burden. Simply put, there is a better way.
  • Best Practices for Threat Hunting Recorded: Jul 18 2018 39 mins
    Jonny Milliken, Threat Intelligence Manager, Alert Logic
    Cyber threats are increasing in both sophistication and frequency, often overwhelming Security Operation Center (SOC) staff. As a result, more organizations are moving away from traditional reactive security while incorporating threat hunting techniques in their cybersecurity strategy.

    Go threat hunting with Jonny Milliken, Threat Research Manager at Alert Logic and join this webinar – here you’ll learn why more organizations are adding threat hunting capabilities, and why it should be a top priority for you as well.


    Highlights include:
    - Should we fight automation with automation?
    - How to construct your security operations to build to scale and react quickly to new threats
    - Known and unknown threats
    - Threat detection vs. threat hunting
  • Lessons Learned from the Cyber Security Front Line Recorded: Jul 18 2018 16 mins
    Dan Pitman, Senior Solutions Architect, Alert Logic
    Cybersecurity is currently dominating the headlines – data breaches happen on a regular basis. Cybersecurity is a space that is undergoing significant transformation in trying to gain the upper hand on hackers, and is under a constant bombardment of scrutiny.

    Join this eye-opening webinar with Dan Pitman, Alert Logic’s Senior Solutions Architect, as he discusses the perils of the cyber security industry.

    During this webinar you will gain insight on:
    - What tactics are cyber criminals using to identify a vulnerable target
    - Attack methodologies and how vulnerable web apps can be leveraged by attackers to gain privileged access
    - How to effectively utilize your security tactics to better protect your web apps
    - Remediation strategies to help defend against cyber attacks
  • Managing Threat Detection and Response for Securing AWS Recorded: Jul 18 2018 28 mins
    Ryan Holland, Alert Logic and Orlando Scott-Cowley, AWS
    Security tools alone are not enough as your AWS environment becomes more complex, and the need for comprehensive security – including people, process, and technology – becomes apparent. Cyber threats continue to increase in volume and sophistication, so where do you start when incorporating advanced threat detection and response capabilities into your security strategy?

    Start here with Ryan Holland, Senior Director, Technology Services Group at Alert Logic and Orlando Scott-Cowley, Principal Evangelist at AWS as they list the top considerations to better protect your AWS workloads and applications.

    Learn the core fundamentals to a stronger AWS cloud security strategy:
    - Understanding your AWS environment and the exposures your web apps face
    - Learnings from top configuration vulnerabilities involving root, S3, IAM, security groups, and more
    - The use of multiple data sources to attain a “defense in depth” security strategy
    - Threat detection capabilities and creating an effective incident response plan
  • Integrating Security and Compliance within Fintech Recorded: Jul 17 2018 19 mins
    Lucian Morris, Chief Information Officer, LQID
    Join Chief Information Officer of LQID Lucian Morris for a timely and informative session on integrating security and compliance within the Financial Technology sector.
  • The Biggest Cloud Security Threats are Self-Inflicted Recorded: Jul 17 2018 21 mins
    Ryan Holland, Senior Director of Cloud Architecture, Alert Logic
    We are witnessing a vast wave of data breaches across the globe – these breaches are fruits of sophisticated cyber criminals, but also of the complexity that plagues IT security. Businesses are told to cover the basics of cybersecurity, but even the basics can be complex. The attack surface is larger than ever before, companies are being offered different security tools, new policies are being introduced and all of this has led to a gap that today’s cyber criminals are exploiting.

    Join Ryan Holland, Alert Logic’s Senior Director of Cloud Architecture, as he shares best practices for reducing the negative impact of IT sprawl, security sprawl and the ever-evolving attack surface.

    Highlights include:
    - Cloud security threats
    - The importance of understanding your cloud attack surface
    - Cyber breaches & vulnerabilities – real-life examples
    - CSP security services
    - Security sprawl – what you don’t know can hurt you

    This impactful webinar will help you to understand what key strategies you can adopt to increase security, manage risk and be compliant.
  • Case Study and Best Practices for Protecting Customer Data Recorded: Jul 16 2018 24 mins
    Daniel O'Neill, Director of Global Security, Rackspace
    People HR® helps companies manage their employees, which means handling high volumes of personal information – just the type of data criminals wants. They required support to protect critical customer data and reach an exceptional standard on compliance and security; a need emphasized with the introduction of the General Data Protection Regulation (GDPR).

    Given the sensitive nature of the data, People HR required effective security controls to be put in place to ensure adherence to regulatory requirements. Implementing new technologies can be costly and filling the cyber security skills gap has become increasingly difficult in today’s evolving threat landscape. The set and forget, controls-based strategy of the past will no longer adequately protect organisations against more sophisticated cyberattacks.

    In this session, Rackspace will discuss how the provision of proactive monitoring, intrusion detection and incident response in addition to data encryption enabled People HR to protect customer data and create clear policies around the data governance and protection regulation with an approach that is both platform agnostic and cloud-centric.
Security. Compliance. Cloud.
Alert Logic's channel is aimed at empowering IT Managers, CIOs, security analysts and business owners with the knowledge to make the right investment in IT security. Our channel will feature webcasts on compliance, cloud security and security-as-a-service.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Introducing a Simpler Way to Effective Threat Management
  • Live at: Nov 15 2018 4:00 pm
  • Presented by: Alert Logic
  • From:
Your email has been sent.
or close