Hi [[ session.user.profile.firstName ]]

Why Insider Actions Matter: SANS Reviews LogRhythm CloudAI for UEBA

When threats occur, understaffed security operations centers (SOCs) lack sufficient access to contextual information. This lack of visibility is a key problem that LogRhythm CloudAI for User and Entity Behavior Analytics (UEBA) are designed to solve.

In this webcast, Dave Shackleford, senior SANS instructor, and analyst, joins Seth Goldhammer, LogRhythm senior director of product management, to explore how CloudAI uses supervised and unsupervised learning to establish baselines and monitor user behavior.

Shackleford reviews LogRhythm CloudAI and he runs through various use cases, such as insider threat, account compromise, and admin abuse.

You’ll learn how LogRhythm CloudAI:

- Detects malicious user activities
- Scores user activities, provides recommendations and takes automated actions
- Supports threat hunting and incident response capabilities
- Improves the machine learning experience through supervised and unsupervised learning

Watch the webcast now to understand how LogRhythm CloudAI can help you detect dangerous user behavior and rapidly mitigate threats.
Recorded Dec 6 2018 51 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Dave Shackleford, Principal Consultant, Voodoo Security | Seth Goldhammer, Senior Director of Product Marketing, LogRhythm
Presentation preview: Why Insider Actions Matter: SANS Reviews LogRhythm CloudAI for UEBA

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • What security products do you need in the cloud? Nov 14 2019 10:00 am UTC 58 mins
    Paul Asadoorian, Founder, Security Weekly, Matt Alderman, CEO, Security Weekly, Stephen Smith, Senior DevOps Engineer, LogRhy
    We’ve been hearing it for years, everything is moving to the cloud. Maybe not fully true, but there is a good amount of cloud migration projects all around us. So, what does this mean for security and security products?

    In this webinar, Paul Asadoorian and Matt Alderman will discuss the evolution of cloud security products, including challenges, maturity, and latest trends. The pace and adoption of cloud security products have varied depending on the type of cloud you’re adopting (IaasS, PaaS, or SaaS).

    Stephen Smith and Jeff Braucher from LogRhythm, will discuss the migration of security services/products to the cloud, including topics such as:

    - What products should be heading for the cloud
    - Thoughts on cloud service providers entering the security market
    - Benefits/disadvantages to SaaS security products

    Register for this webinar and discover what security products your organisation needs in the cloud.
  • Kubernetes audit logging and container security Nov 5 2019 10:00 am UTC 84 mins
    Randy Franklin Smith, Ultimate Windows Security and Rich Bakos and Kyle Senescu, LogRhythm
    Applications are increasingly being containerised and when that happens, they invariably find their way to a Kubernetes cluster. The security relationship between containers and Kubernetes is the same as that between VMs, the hyper visor and extended virtualisation infrastructure they run on.

    The point is, containerised apps are only as safe as the Kubernetes cluster in which they run. Your Kubernetes cluster is probably hosted in the cloud, but that shouldn’t matter when it comes to security monitoring.

    To ensure a secure environment, you need to know what’s happening inside that cluster:

    • Who is creating new pods and what container images are they based on?
    • When are RBAC permissions and role bindings changed?
    • Which IP addresses are making API requests to the cluster?
    • Who is messing with persistent storage volumes?
    • Are DevOps admins storing secrets in configmaps?
    • Who attached to that pod or node and ran arbitrary commands?

    In this real training for free session, we will introduce you to Kubernetes audit logging. You will learn about Kubernetes audit policy and how to audit backends.

    In addition, we'll build on security considerations, including:

    • Ensuring an approved container image is created
    • Ensuring the API isn’t open to the outside world (only a list of approved IPs should be calling the API)
    • Tracking traffic inbound and outbound from the cluster & pods
    • Monitoring and visualising container log data, and what’s happening within the application itself

    Register now for this upcoming training webinar from UWS & LogRhythm.
  • How to simplify and streamline your SOC with SOAR Oct 22 2019 9:00 am UTC 60 mins
    Tom McVey, LogRhythm Enterprise Sales Engineer
    If your team is struggling with resource constraints or struggling to keep up with the endless manual task list, security orchestration, automation, and response (SOAR) can help. SOAR expedites and automates workflows and accelerates threat qualification, investigation, and response.

    Join us for an interactive how to webinar on SOAR and discover how LogRhythm’s embedded SOAR capabilities can simplify and streamline your security operations workflow.

    During this 60 minute educational session, we will:
    • Outline the components of SOAR
    • Offer the benefits of using SOAR in your SOC
    • Provide key SOAR use cases
    • Introduce LogRhythm SmartResponse™
    • Demo some of LogRhythm’s SOAR capabilities

    Register now to discover how you can automate incident response with SOAR and reduce the burden on your team.
  • An introduction to MITRE ATT&CK Recorded: Sep 24 2019 89 mins
    Randy Franklin Smith, Ultimate Windows Security and Brian Coulson, LogRhythm
    MITRE ATT&CK is a knowledge base and framework that lists and details adversary tactics and techniques within a common taxonomy. Having a taxonomy by itself has many valuable uses, such as providing a common vocabulary for exchanging information with others in the security community. But it also serves as a real technical framework for classifying your current detection efforts and identifying gaps where you are blind to certain types of attack behaviours.

    Join Randy Franklin Smith of Ultimate Windows Security and Brian Coulson of LogRhythm for an introduction to MITRE ATT&CK, as well as:

    - Share various ways to use ATT&CK, specifically in relation to designing, enhancing, assessing, and maintaining your security monitoring efforts.
    - Discuss LogRhythm Labs’ project that includes aligning the ATT&CK matrix with log sources.
    - Walk through an example of the MITRE attack process from start to finish while focusing on rule development and alignment in the LogRhythm NextGen SIEM Platform.

    Brian Coulson, from LogRhythm Labs, is leading an outstanding project at LogRhythm Labs where-in he will show you how they’re aligning the ATT&CK matrix with log sources, including windows event logs (XML – Security, XML Sysmon 8.0 and XML-System). While the matrix is wide spread in what it monitors, there are effective ways to filter around common and relevant detection techniques and logs.
  • Protect and Defend: Discover Malicious Traffic on Your Network Recorded: Sep 12 2019 91 mins
    Luis Rico, LogRhythm and Randy Franklin Smith, UWS
    Often, when looking for malicious network traffic you either search for known bad or investigate anomalous traffic that doesn’t look normal. That reactive approach is time consuming, and potentially over-reliant on searching for larger concerns. Fortunately, new solutions use advanced analytics to proactively identify, enrich and alert on malicious traffic.

    Why is this important?

    Detecting known bad traffic is great when it works, but it’s a lot like signature-based AV (which is rigid and unable to detect unknown threats):
    - Only really effective for widespread, generalised attacks – not so great for unique targeted attacks
    - There’s an indefinite amount of time before the malicious traffic signature, domain name or IP makes it into the pattern updates and threat intel feeds from your vendors
    - Detecting anomalous traffic can address the aforementioned weaknesses, but in practice it depends heavily on how – and how well – you define anomalous traffic, and how quickly (accurately) you can spot it.

    Security practitioners are getting better by the day at looking for anomalies. Here’s just a few:

    ** Protocols
    ** Unrecognised port protocol numbers
    ** Malformed/non-compliant traffic compared to protocol expected on known port
    ** Protocols you don’t want or at least don’t expect to see in the given context
    ** High bandwidth usage for that protocol
    ** Traffic patterns
    ** Disproportionate inbound/outbound bandwidth usage for a given endpoint
    ** Suspicious Destination/Source IP combinations

    In this real training for free webinar, we explore how to analyse your network so that you can learn and understand its traffic patterns and get a handle for what’s normal. You’ll then be able to take this information and look for anomalous traffic, build known-bad detections and make your network detection and response (NDR) technologies and efforts smarter.
  • Measure and Mature: Security Operations under the spotlight Recorded: Sep 3 2019 45 mins
    Andrew Hollister, Chief Architect and Product Manager, LogRhythm Labs
    Effective security operations are the first line of defence when it comes to preventing cyberattacks. In order to accomplish this, organisations need a mature security program that leverages people, process, and technology to enable rapid detection and response.

    Yet some organisations struggle with the overall effectiveness of their security operations. They lack a model for maturing their capabilities. A mature security operation enables threats to be detected earlier in the cyberattack lifecycle which is critical.

    Join this webinar to discover LogRhythm's Security Operations Maturity Model (SOMM) which was developed to help organisations assess their level of maturity and plan for making improvements over time.

    Organisations can use this model to evaluate their current security operations and develop a roadmap to achieve the level that is appropriate in the light of their resources, budget, and risk tolerance. You will also hear about the critical measures of security operations effectiveness.
  • The role of SIEM: Combating todays cybersecurity risks Recorded: Aug 20 2019 47 mins
    Erik Bartholomy (LogRhythm) and Eric Parent (Sonepar)
    Building a Cybersecurity Architecture to Combat Today’s Risks:
    Foundations, Visions, Testing and the Role of SIEM

    The rapid development and adoption of cloud infrastructure, mobile workforces, IoT and other susceptible environments has mandated a reappraisal of security architecture. Modern organisations are recognising their security posture may not be keeping up with the threat landscape, and this leads to frightening discoveries around the safety of their data and networks.

    Join Erik Bartholomy – a Security Architect at LogRhythm – and Eric Parent – CISO at Sonepar – to discover how security architecture is developing to face the current threat landscape. Failures in past layered approaches are frequent, and serve as valuable learning lessons on the importance of proactive monitoring and response.

    During the webinar our speakers will discuss:

    • How LogRhythm’s POC enabled Sonepar’s team to efficiently expedite threat detection, and improve their SOC and analyst efficiency

    • The guiding principles and technology behind modern security frameworks and architecture, including the rise in popularity and value of the Zero Trust Framework

    • How security architecture helps align IT security with business strategy and current threats

    • Adapting architecture to accommodate different environments, including on-premises, cloud, and hybrid cloud
  • NextGen SIEM: SANS Evaluator's Guide Recorded: Aug 8 2019 57 mins
    Christopher Crowley (SANS) and Sara Kingsley, (LogRhythm)
    Is your security team struggling with blind spots? Inundated with false negative alarms? You’re not alone. Legacy SIEMs hinder your ability to achieve your security objectives. Traditional solutions are limited and often lack the flexibility to scale and grow as your security needs increase. To combat today’s threats, you need a next-gen SIEM that leverages the architecture and security capabilities that are best suited to detect both known and unknown threats within your environment.

    In this on-demand webcast, Christopher Crowley, senior instructor at SANS, and Barbara Filkins, senior analyst at SANS, join Sara Kingsley, senior product marketing manager at LogRhythm, to explain what comprises a modern SIEM solution and share tips for evaluating a next-gen SIEM platform.

    In this webcast, you’ll learn:
    - What makes a SIEM “next-generation”
    - How to evaluate a next-generation SIEM
    - The requirements that should guide your next-generation SIEM POC

    Watch the webinar to discover the tools you need to evaluate and choose a next-gen SIEM that fits the requirements of your organisation.
  • Defending the enterprise using open source tools Recorded: Jul 30 2019 56 mins
    Steve Kaufman (LogRhythm) and Paul Asadoorian (Security Weekly)
    Budget constraints is a common complaint from security professionals. However many of the tools that can solve problems in the enterprise are free. You don’t have to buy commercial products to secure your entire enterprise. Of course, there are some areas that do require a PO, however, there are also several areas of your security program that can be implemented using free and/or open source tools.

    In this webinar we look at which aspects of your security program can benefit the most from these tools, and how to configure and use them.

    Discover:
    • Lightweight threat intelligence: pi-hole in the cloud (+TacyonNet)
    • Vulnerability profiling: Integration with vFeed
    • Patching your systems with Ansible
    • Network monitoring with Bro
    • High-performance firewalls with OpnSense
    • The best free training resources

    Steve Kaufman, Technical Product Manager from LogRhythm, will be joining the webinar to cover how security technology vendors are aligning with open source tools. He’ll explore how LogRhythm’s architecture, including elasticsearch, enables the product to integrate with open source tools.
  • Security automation & integration: A deep dive into recent SANS survey results Recorded: Jun 20 2019 61 mins
    Emily Laufer, LogRhythm
    If you're still heavily relying on manual processes or struggling with a lack of skilled resources, tools and budget, you can look to automation and integration to help you improve your security operations.

    Automation of everyday security operations will simplify and streamline your team's workflow and allow them to put their skills to better use on more complex tasks. Despite the benefits, 59 per cent of SANS survey respondents still use little to no automation of key security and incident response (IR) tasks.

    Why have organisations been slow to embrace automation?

    In this webinar, Emily Laufer, product marketing manager at LogRhythm, and several industry experts come together to discuss the new SANS survey findings on automation and integration. They’ll discuss what holds most organisations back from automating more security processes and provide advice on the step’s teams can take to overcome automation challenges and realise its benefits.

    In this webcast, you’ll learn:
    • What key activities respondents want to automate so you can identify gaps in your team’s processes
    • How to work through automation challenges while considering the potential risks of each
    • How to use security orchestration, automation, and response (SOAR) to make your teams’ job easier and more effective
    • Best practices for integration

    Register now to learn how automation can bring your team, process, and technology together to move your security operations forward.
  • Ask the Security Intelligence Expert: How to Defend your Enterprise in 2019 Recorded: Jun 5 2019 9 mins
    Seth Goldhammer, Senior Director - Solutions Marketing, LogRhythm
    Watch this interactive interview with Solutions Marketing Director, Seth Goldhammer at Infosecurity Europe 2019.


    LogRhythm is a world leader in NextGen SIEM, empowering organizations on six continents to successfully reduce risk by rapidly detecting, responding to and neutralizing damaging cyberthreats. The LogRhythm platform combines user and entity behavior analytics (UEBA), network traffic and behavior analytics (NTBA) and security automation & orchestration (SAO) in a single end-to-end solution. LogRhythm’s Threat Lifecycle Management (TLM) framework serves as the foundation for the AI-enabled Security Operations Center (SOC), helping customers measurably secure their cloud, physical and virtual infrastructures for both IT and OT environments. Built for security professionals by security professionals, the LogRhythm platform has won many accolades, including being positioned as a Leader in Gartner’s SIEM Magic Quadrant.
  • Livestream Video - Securing the IoT in the Age of Threats Recorded: Jun 4 2019 43 mins
    Wallace Sann, Forescout | Nigel Stanley, TÜV Rheinland Group | Andrew Hollister, LogRhythm | Jason Soroko, Sectigo
    The ever-growing Internet of Things continues to pose security and privacy threats. How are businesses managing the risks associated with IoT devices on their networks? What are the best strategies for achieving basic security and cyber hygiene?

    Join this interactive panel with IoT and security experts to learn more about:
    - Impact of IoT on enterprise security
    - How to assess the IoT risk
    - Most common IoT vulnerabilities and how to address them
    - Recommendations for improving IoT security

    Panellists
    Jason Soroko, CTO of IoT, Sectigo
    Andrew Hollister, Chief Architect & Product Manager, LogRhythm
    Wallace Sann, VP Global Systems Engineering, Forescout Technologies
    Nigel Stanley, CTO - Global OT & Industrial Cyber Security CoE, TÜV Rheinland Group

    Moderated by Yotam Gutman, Founder & Community Manager, Cybersecurity Marketing Community
  • Mature your Office 365 email security with LogRhythm’s NextGen SIEM and PIE Recorded: Apr 9 2019 44 mins
    Susana Hernansanz (LogRhythm, Technical Product Manager) and Sam Straka (LogRhythm, Technical Product Manager)
    As organisations advance their security posture and reduce risk, email security continues to be a critical concern. Between password leaks, brute force attacks and phishing, email credentials and actual email sends continue to be at jeopardy. Of further concern is that missing the initial compromise – often via email platforms – can enable the attacker to collect data and move laterally into more valuable environments.

    In this webinar, Susana Hernansanz and Sam Straka – LogRhythm Technical Product Managers – will highlight the value of ingesting and monitoring O365 logs via your NextGen SIEM. With LogRhythm the data will be enriched, normalised and contextualised for efficient use in threat hunting and alarms.

    Join the webinar to learn how:
    • LogRhythm’s Phishing Intelligence Engine (PIE) – an open source tool provides an Active Defence framework built around O365
    • Our platform ingests logs from the O365 Security & Compliance Centre
    • Detecting auto-forwarding (via O365 logs) can highlight potential phishing attacks and potential victims
  • The role of SIEM: Combating todays cybersecurity risks Recorded: Mar 26 2019 47 mins
    Erik Bartholomy (LogRhythm) and Eric Parent (Sonepar)
    Building a Cybersecurity Architecture to Combat Today’s Risks:
    Foundations, Visions, Testing and the Role of SIEM

    The rapid development and adoption of cloud infrastructure, mobile workforces, IoT and other susceptible environments has mandated a reappraisal of security architecture. Modern organisations are recognising their security posture may not be keeping up with the threat landscape, and this leads to frightening discoveries around the safety of their data and networks.

    Join Erik Bartholomy – a Security Architect at LogRhythm – and Eric Parent – CISO at Sonepar – to discover how security architecture is developing to face the current threat landscape. Failures in past layered approaches are frequent, and serve as valuable learning lessons on the importance of proactive monitoring and response.

    During the webinar you will learn:

    • How LogRhythm’s POC enabled Sonepar’s team to efficiently expedite threat detection, and improve their SOC and analyst efficiency

    • The guiding principles and technology behind modern security frameworks and architecture, including the rise in popularity and value of the Zero Trust Framework

    • How security architecture helps align IT security with business strategy and current threats

    • Adapting architecture to accommodate different environments, including on-premises, cloud, and hybrid cloud
  • Measure and Mature: Security Operations under the spotlight Recorded: Mar 21 2019 46 mins
    Andrew Hollister, Chief Architect and Product Manager, LogRhythm Labs
    Effective security operations are the first line of defence when it comes to preventing cyberattacks. In order to accomplish this, organisations need a mature security program that leverages people, process, and technology to enable rapid detection and response.

    Yet some organisations struggle with the overall effectiveness of their security operations. They lack a model for maturing their capabilities. A mature security operation enables threats to be detected earlier in the cyberattack lifecycle which is critical.

    Join this webinar to discover LogRhythm's Security Operations Maturity Model (SOMM) which was developed to help organisations assess their level of maturity and plan for making improvements over time.

    Organisations can use this model to evaluate their current security operations and develop a roadmap to achieve the level that is appropriate in the light of their resources, budget, and risk tolerance. You will also hear about the critical measures of security operations effectiveness.
  • NextGen SIEM: SANS Evaluator's Guide Recorded: Mar 7 2019 58 mins
    Christopher Crowley (SANS) and Sara Kingsley, (LogRhythm)
    Is your security team struggling with blind spots? Inundated with false negative alarms? You’re not alone. Legacy SIEMs hinder your ability to achieve your security objectives. Traditional solutions are limited and often lack the flexibility to scale and grow as your security needs increase. To combat today’s threats, you need a next-gen SIEM that leverages the architecture and security capabilities that are best suited to detect both known and unknown threats within your environment.

    In this on-demand webcast, Christopher Crowley, senior instructor at SANS, and Barbara Filkins, senior analyst at SANS, join Sara Kingsley, senior product marketing manager at LogRhythm, to explain what comprises a modern SIEM solution and share tips for evaluating a next-gen SIEM platform.

    In this webcast, you’ll learn:
    - What makes a SIEM “next-generation”
    - How to evaluate a next-generation SIEM
    - The requirements that should guide your next-generation SIEM POC

    Watch the webinar to discover the tools you need to evaluate and choose a next-gen SIEM that fits the requirements of your organisation.
  • Dabble or deep dive: Threat hunting you can do with available resources Recorded: Feb 25 2019 97 mins
    Nathan "Q" Quist (LogRhythm) and Randy Franklin Smith (UWS)
    In this real training for free session, we will discuss the minimum toolset and data requirements (and not necessarily volume) you need for successful threat hunting. We will take into account that while some of you can devote most of your time to threat hunting, most of us have limited time and resources for this activity. The good news is that threat hunting is flexible and anyone can do it, ranging from a few hours a week to full-time.

    As an example, a great type of threat hunting is to look for unrecognised/suspicious executables running on your network. You can dip your toe in the water with this type of hunt with a small commitment of time and resources or you can dive in deep with a major data collection and analysis effort. Starting out simple means you just focus on EXE names; baseline the EXE names being executed on your network, and then perform a daily review of new EXE names showing up for the first time. You can get this information from event ID 4688 and the query capabilities are very light. But I think you’ll be surprised what you are able to learn and catch.

    We will take the same approach with a total of 7 types of threat hunting:

    Recognising suspicious software
    Scripting abuse
    AV follow-up
    Lateral movement
    Persistence
    DNS abuse
    Bait-the-bad-guy
  • Smarter, faster security through LogRhythm and Cisco integrations Recorded: Feb 14 2019 57 mins
    Jake Reynolds (LogRhythm), Michael Eurerio (LogRhythm), Doug Hurd (Cisco) and Jessica Bair (Cisco)
    LogRhythm and Cisco are committed to helping you enhance your security operations through the seamless integration and powerful capabilities of the LogRhythm NextGen SIEM Platform and Cisco’s Threat Grid, Umbrella, Firepower and ISE.

    Currently integrating with over three dozen Cisco products, LogRhythm provides centralised visibility and advanced security analytics across the Cisco-enabled environment and makes security events actionable in the network. Stay ahead of cyber adversaries and proactively detect, respond to and remediate cyberthreats with this powerful integration.

    In this technical webinar, you’ll learn how to:

    - Gain immediate insight with Cisco and LogRhythm’s comprehensive visibility
    - Streamline investigations with Umbrella and Threat Grid
    - Accelerate and enable endpoint and perimeter remediation with ISE and ASA
  • Defending the enterprise using open source tools Recorded: Jan 31 2019 57 mins
    Steve Kaufman (LogRhythm) and Paul Asadoorian (Security Weekly)
    Budget constraints is a common complaint from security professionals. However many of the tools that can solve problems in the enterprise are free. You don’t have to buy commercial products to secure your entire enterprise. Of course, there are some areas that do require a PO, however, there are also several areas of your security program that can be implemented using free and/or open source tools.

    In this webinar we look at which aspects of your security program can benefit the most from these tools, and how to configure and use them.

    Discover:
    • Lightweight threat intelligence: pi-hole in the cloud (+TacyonNet)
    • Vulnerability profiling: Integration with vFeed
    • Patching your systems with Ansible
    • Network monitoring with Bro
    • High-performance firewalls with OpnSense
    • The best free training resources

    Steve Kaufman, Technical Product Manager from LogRhythm, will be joining the webinar to cover how security technology vendors are aligning with open source tools. He’ll explore how LogRhythm’s architecture, including elasticsearch, enables the product to integrate with open source tools.
  • Automate security with integration between SIEM and IAM Recorded: Jan 21 2019 80 mins
    Greg Foss (LogRhythm) and Randy Franklin Smith (UWS)
    In this webinar Randy Franklin Smith (UWS) and Greg Foss (LogRhythm) take a real-world example of a SIEM, in this case LogRhythm, and an IAM, Okta, and demonstrate how their integration matures an organisation’s security posture.

    We’ll dive into how Security Analysts can make more informed decisions and perform better investigations when they have a full picture of IAM events spanning on-prem and cloud-based activity and how organisations can respond rapidly to security alarms with automatic protective measures.

    In this webcast, discover how to:
    • Visualise and analyse data from Okta in your SIEM
    • Identify accounts that have compromised credentials by monitoring for successful authentications paired with failed multifactor logins
    • Utilise the Okta API to automate security tasks
    • Build upon identity monitoring to work towards a “Zero Trust” architecture
Unleash the power of your SOC
Threats are evolving. Is your security?

LogRhythm is a world leader in NextGen SIEM, empowering organisations to successfully reduce risk by rapidly detecting and responding to damaging cyberthreats.

The LogRhythm NextGen SIEM Platform combines user and entity behaviour analytics (UEBA), network detection and response (NDR) and security orchestration, automation & response (SOAR) in a single end-to-end solution.

Visit our website for more information:
http://www.logrhythm.com/

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Why Insider Actions Matter: SANS Reviews LogRhythm CloudAI for UEBA
  • Live at: Dec 6 2018 12:30 pm
  • Presented by: Dave Shackleford, Principal Consultant, Voodoo Security | Seth Goldhammer, Senior Director of Product Marketing, LogRhythm
  • From:
Your email has been sent.
or close