Andrew will provide an overview of how security professionals and the businesses that employ them can benefit from integrating the MITRE ATT&CK framework into their SIEM. He will also expand on how feeding data from a wide set of technologies including endpoint detection and response (EDR), antivirus/anti-malware, intrusion detection/prevention systems (IDS/IPS), and other products can help businesses get the most out of their SOCs.
Dan Crossley, SE CISSP, & Jake Anthony, SE, LogRhythm
The momentum behind the growth of cloud services is unstoppable, as businesses seek software, applications, and infrastructure that are more flexible and cost-effective. According
to analysts, nearly half of all application spend is now invested in cloud services, and this cloud-first trend is only going in one direction.
In this technical webinar LogRhythm’s Daniel Crossley and Jake Anthony will outline logging and threat detection strategies within cloud environments, including Amazon Web Services (AWS), Google Cloud Platform (GCP), Microsoft Azure and Office 365.
The session will cover:
• Logging: An overview of cloud logging mechanisms
• Log ingestion: Log collection from cloud environments
• Analytics: Threat detection use cases for cloud environments
The aim of this session is to give you a better understanding of logging and threat detection in cloud environments
If your team is struggling with resource constraints, you’re probably facing longer-than-ideal response times. This puts your organisation at risk. In this webinar Ed Carolan, Manager, Enterprise Sales Engineering, will outline how you can maximise the benefits of time optimisation and reduce the burden on your team with SOAR and UEBA.
Understand how you can:
• Leverage UEBA and SOAR to increase automation within the SOC
• Enable team collaboration and workflow automation
• Arm your analysts to be more effective in their work
• Increase the ROI from your SIEM
Moderater: Martin Smith MBE, (SASIG); James Carder, CISO LogRhythm; Craig Goodwin, CTRO Fujitsu; Michael Strong, CISO GCI
Join our QA panel session to gain insight into how James Carder, LogRhythm CISO and our guest speakers build and maintain a cybersecurity culture at their organisations, how they manage board-level reporting, exec-level relationships, and how they achieve their goals as a security leader, while appealing to the board’s mission and the core mission of their business.
Moderated by Martin Smith MBE, Chairman & Founder, The Security Awareness Special Interest Group (SASIG)
- Key metrics you can use to show the value of you security operations/program
- Actionable tips to get board-level support for your security program
- How to use a security maturity model to map your risk reduction over time
- How to achieve and present cost predictability
Andy Habibi-Parker, Director of Professional Services (EMEA) & Adam Thompson, LogRhythm
In this webinar Andrew Habibi-Parker, Director of Professional Services for EMEA & APJ and Adam Thompson, Principal Professional Services Consultant will walk you through how a good deployment methodology can pave the way to SIEM success.
Adam & Andrew will outline:
- Five tips to ensure your SIEM project is a success
- The LogRhythm value-focused methodology
- What to expect from a Professional Services engagement
- What you can do to prepare for a new SIEM project
Jonathan Zulberg, VP Field Engineering, UK, EMEA & APJ, LogRhythm
As a cybersecurity professional, your success rides on your ability to not only protect your organisation from damaging cyberattacks but demonstrate the meaningful business impact and value of your security program to your company’s board.
In this webinar, LogRhythm’s Jonathan Zulberg, will introduce the LogRhythm Security Operations Maturity Model (SOMM), which was developed to help cybersecurity professionals assess their organisation’s current level of security maturity and plan for making improvements over time.
You will also hear about the critical measures of security operations effectiveness and an outline of how to use the SOMM to prove the value of your security program to the board.
To avoid a data breach, your organisation must detect and respond quickly to anomalous activity. The Verizon Data Breach Investigations Report, 2017 states that user-based threats are on the rise:
•69% of organisations report incidents of attempted data theft — by internal threats.
•81% of breaches involve stolen or weak credentials.
•91% of firms report inadequate insider threat detection programs.
User and entity behaviour analytics (UEBA) can help you monitor for known threats and behavioural changes in user data, providing critical visibility to uncover user-based threats that might otherwise go undetected.
In this webinar, Mohan Raj and Ashok Chokalingam from our iMETA team at LogRhythm, will outline the various types of insider threats, the risk they pose to an organisation, the various contributors that may lead to this threat and how to identify and mitigate the risks.
Join this webinar if you are based in the UAE or you have a specific interest in this topic.
Jake Anthony, Systems Engineer and Simon Hamilton, Client Manager, LogRhythm
Without rapid and accurate threat detection, your mean time to detect and respond to damaging cyberattacks is compromised, allowing attackers time to steal your organisation’s sensitive data. From collecting security and log data to utilising machine analytics, your team can effectively reduce the time it takes to discover threats on your network.
In our webinar Jake Anthony and Simon Hamilton from LogRhythm will outline five practical use cases to enhance threat detection and response with your existing tools.
• Integrating endpoint detection for improved threat hunting capabilities
• Combining logical and physical authentication to spot anomalous access
• Automating detection and response to Phishing attacks
• Detecting possible indicators of bit-coin mining
• Improving incident response times through audio and visual alerting
Join this webinar: if you are a SOC manager, security analyst, security architect and you are responsible for managing your organisations cybersecurity.
Women are rising through the cybersecurity ranks to become recognised leaders, experts and mentors. The 2020 SANS Women in Cybersecurity Survey drew on the shared experiences of successful women in cybersecurity to provide practical advice on becoming leaders in their organisations.
Join this webinar to learn why opportunities for women in security have never been better, including survey data points such as:
- More than 70% of respondents feel respected by their teammates
- 64% report that they are sought out for their opinions on cybersecurity issues
- 37% are advancing rapidly, moving into a senior position within one to four years
In this webinar, we'll discuss gender bias, the effects of mentorship and practical advice on how to get ahead.
James Carder, Andrew Hollister, and Brian Emond (LogRhythm)
In light of COVID-19, we’ve seen businesses across industries implement remote work policies. This brings about new security concerns, many of which either weren’t considered or prioritised beforehand.
During this webinar LogRhythm experts including James Carder, CSO and VP of LogRhythm Labs, will review best practices for securing a remote workforce and what to expect when your employees make this kind of shift, whether it needs to happen now or in the future. Specific topics include:
- Getting started with log collection for remote systems
- Priority use cases you should employ, such as monitoring VPN access and collaboration tool security
- The types and levels of activity you should expect to see on your network, depending on your industry
We will also discuss the impacts we’ve seen from the rush to support remote work due to COVID-19. These reveal lessons that others can implement now or work into a future plan to support a rise in remote workers.
Kev Eley, Client Director, LogRhythm and Dan Crossley, SE CISSP, LogRhythm
As cyberattacks continue to make headlines worldwide, organisations that neglect the importance of fusing a pervasive security culture containing effective SecOps processes with skilled team players committed to do their very best are making a catastrophic error in judgement.
A proliferation of security technologies alone – even if they are correctly configured – will never stop cyberattacks or protect an organisation from a possible data breach, unless the correct playbooks are implemented and consistently operated by a skilled, motivated team with full backing of the board of directors.
Achieving a high-performing cybersecurity team requires recruiting and retaining talent, developing the right strategy and fostering a culture of success. All while managing critical relationships with the board and other fickle stakeholders.
In this webinar, LogRhythm's Dan Crossley and Kevin Eley are joined by guest industry speakers Michael Brown and Andy Johnson as they discuss the key attributes of a successful SOC.
Rex Young, LogRhythm CIO; Zack Rowland, LogRhythm Strategic Integration Engineer
As a result of recent events and the COVID-19 pandemic, most organisations are implementing work-at-home policies. Yet company-wide remote environments present unique challenges for IT and cybersecurity professionals.
In this on-demand webinar, Rex Young, chief information officer, and Zack Rowland, strategic integrations engineer, reveal how LogRhythm rapidly migrated employees from in-office to remote work.
They discuss the steps LogRhythm took to prepare for such an event and how they put that plan into action as remote work became necessary.
Topics covered during this webinar include:
- How LogRhythm prepared its IT and security operations to accommodate
a global work-from-home event
- How to balance business continuity with security measures
- IT and security implications to consider when implementing a work-at-home set-up
Randy Franklin Smith of Ultimate Windows Security | Eric Brown and Brian Coulson of LogRhythm
Many successful attacks begin with a phishing email that a user falls for. That’s why MITRE prominently features Spearphishing (T1192) as an Initial Access technique in ATT&CK.
In this webinar, LogRhythm and Ultimate Windows Security explore the latest phishing techniques used by attackers and how MITRE ATT&CK can help detect and remediate these threats.
In this webinar, we’ll show you actual examples of phishing attempts executed through:
- Legitimate file-sharing sites
- Fake Office 365 websites
- Spoofed executive emails
- The baseStriker vulnerability
Andrew Hollister, Director LogRhythm Labs EMEA, Kev Eley, Client Director, LogRhythm and Dan Crossley, SE CISSP, LogRhythm
Cloud computing has delivered on its promise. By moving operations online, organisations have become more agile and have accelerated time to market for innovations. The number of organisations migrating to the cloud continues to accelerate. Gartner predicts that 28 per cent of spending in key IT segments will shift to the cloud by 2022.
In this webinar, LogRhythm’s Andrew Hollister, Dan Crossley and Kevin Eley consider the cybersecurity implications for organisations that are seeking to embrace the cloud for doing business. And they explore the options available to organisations to ensure the risks from cloud-borne cyberattacks are adequately reduced and mitigated.
Attend this webinar: if you are a SOC manager, security analyst, security architect and you are responsible for stopping cyberattacks to protect your organisation. Also if you have cloud-first initiatives in your business.
Kev Eley, Client Director, LogRhythm and Dan Crossley, SE CISSP, LogRhythm
“If you know the enemy and know yourself you need not fear the results of a hundred battles” Sun Tzu. The MITRE ATT&CK knowledge base provides a mechanism to understand the tactics employed by adversaries to compromise systems and ultimately exfiltrate data.
In this webinar, Kev Eley and Dan Crossley outline genuine attack scenarios in the context of ATT&CK and discuss effective techniques for thwarting bad actors.
Watch this webinar: if you are a SOC manager, security analyst, security architect and you are responsible for stopping cyberattacks to protect your organisation.
Build your security operations centre on a strong foundation
We know your job isn’t easy. That’s why we combine log management, machine learning, SOAR, UEBA, and NDR to give you broad visibility across your environment so you can quickly uncover threats and minimise risk.
But a mature SOC doesn’t just stop threats. With LogRhythm, you’ll easily baseline your security operations program and track your gains — so you can easily report your successes to your board.
Hear best practices, see technology demos, listen to speaker panels on our European BrightTALK channel.
Visit our website for more information: