Hi [[ session.user.profile.firstName ]]

Combat Phishing Attacks Using Modern Machine Learning Algorithms

Phishing attacks are one of the most common techniques used to acquire sensitive information including passwords, credit card information or account details. While many technologies seek to detect phishing, it's effectiveness relies on circumventing those sensors. With social engineering tactics, hackers use terms like "Urgent! Attention required in order to keep your account active" to trick employees into clicking on bad links. The newest phishing scam today involves sending a fake invoice loaded with malware.

Modern machine learning algorithms can detect the change in a user's behavior from the moment the credentials are compromised. Detection can be tied to specific activities such as a series of failed login attempts, an atypical IP address or unusual activity in general.

Watch this webinar to:
- Learn how to combat phishing attacks using modern machine learning algorithms
- See a brief demo of Gurucul's solution
- Find out how this solution can benefit your organization
- Send us your questions: sales@gurucul.com
Recorded Jul 30 2020 29 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Peter Draper, Technical Director - EMEA, Gurucul
  • Channel
  • Channel profile
  • Take Security Beyond SIEM with Behavior Analytics Aug 19 2020 6:00 pm UTC 30 mins
    Craig Cooper, COO & SVP of Customer Success, Gurucul
    Taking security beyond SIEM capabilities requires thinking outside of the (black) box. Gurucul uses behavior-based security analytics powered by machine learning to detect risky behavior. Traditional SIEMs import data, normalize that data and provide minimal enrichment. Correlation rules specify a sequence of events that indicates an anomaly, or potential security threat. This technique is outdated because it generates significant number of false positives. Also, SIEMs are incapable of detecting new, and especially, unexpected threats.

    Correlation rules can only detect known patterns. So, unknowns go completely undetected. In today’s digital age, as cybercriminals become more advanced, any time that passes between a breach and an alert is money. You need to be able to detect both known and unknown threats.

    Attend this webinar to learn how machine learning based behavior analytics takes security beyond SIEM correlation rules and queries. By taking security beyond SIEM, you can identify risky changes in behavior patterns in real-time and automate corrective action. Get actionable intelligence with low false positives.
  • Practical Advice to Uplevel your Insider Threat Program Today Aug 13 2020 5:00 pm UTC 30 mins
    Peter Draper, Technical Director - EMEA, Gurucul
    Insider Threats are not new. In the old days, you'd just sit someone down and have "the talk". What's new are the threat vectors that have presented themselves in recent months. Work from home employees, staff reduction, reduced hours, or furloughed insiders; the unfortunate reality is that insider risk is certainly on the rise. The expansion of work from home policies means more employees accessing corporate networks and data over public networks using personal devices. Every organization needs to update its Insider Threat Program or at minimum, implement basic monitoring controls.

    Attend this webinar to learn from a security practitioner perspective: What should you be doing? Gurucul has spent the last decade helping organizations globally to deter, predict, detect, and remediate insider risk. We have excellent experience to share as well as a framework we have used with many large, global companies. We can help you get a mature insider threat program up and running.
  • Aligning Security Analytics with MITRE ATT&CK for Threat Detection Recorded: Aug 5 2020 30 mins
    Mike Parkin, Technical Marketing Engineer, Gurucul
    Organizations are using the MITRE ATT&CK Framework to identify holes in defenses, and to prioritize them based on risk. Gurucul has aligned its Unified Security and Risk Analytics platform with the MITRE ATT&CK to detect and enable automated responses to MITRE adversarial tactics and techniques. This provides organizations with unprecedented visibility to increase security coverage and automate controls in real-time.

    What’s the big deal? The big deal is machine learning and AI. The MITRE ATT&CK Framework is made up of rules and policies. You can greatly enhance the effectiveness of these known rules with behavior analytics to detect unknown threat patterns beyond MITRE tactics and techniques.

    Gurucul has out-of-the-box machine learning models to address risks and threats across the entire threat landscape resulting in actionable risk intelligence. Attend this webinar to learn how you can automate cyber defenses with machine learning models on big data.
  • Combat Phishing Attacks Using Modern Machine Learning Algorithms Recorded: Jul 30 2020 29 mins
    Peter Draper, Technical Director - EMEA, Gurucul
    Phishing attacks are one of the most common techniques used to acquire sensitive information including passwords, credit card information or account details. While many technologies seek to detect phishing, it's effectiveness relies on circumventing those sensors. With social engineering tactics, hackers use terms like "Urgent! Attention required in order to keep your account active" to trick employees into clicking on bad links. The newest phishing scam today involves sending a fake invoice loaded with malware.

    Modern machine learning algorithms can detect the change in a user's behavior from the moment the credentials are compromised. Detection can be tied to specific activities such as a series of failed login attempts, an atypical IP address or unusual activity in general.

    Watch this webinar to:
    - Learn how to combat phishing attacks using modern machine learning algorithms
    - See a brief demo of Gurucul's solution
    - Find out how this solution can benefit your organization
    - Send us your questions: sales@gurucul.com
  • Securing Data with a Remote Workforce Recorded: Jul 23 2020 31 mins
    Craig Cooper, COO & SVP of Customer Success, Gurucul
    With the full effects of COVID-19 still unknown, workers have been pushed out of secure offices and into their homes. Workers are logging into corporate networks from unsecure personal devices and networks. Gurucul has built a solution package to address threats related to the remote workforce, at a great price - FREE.

    This includes a dedicated dashboard and supervised models trained on the changes in behavior patterns seen over the last few weeks. It also provides unsupervised models pre-configured to use feature datasets for the most common and relevant data sources such as VPN, Office 365, AWS, Proxy and PAM.

    Attend this webinar to find out how this free service can help you put advanced threat detection controls in place to identify users who are at risk from phishing attacks, detect users whose accounts may have been compromised, prevent data exfiltration, and more.
  • Who Watches the Watchers? Recorded: Jul 16 2020 31 mins
    Mike Parkin, Technical Marketing Engineer, Gurucul
    Your Security Operations Center has visibility into much of the environment - considerably more than any normal user. You trust them to watch for anomalies, react to security events, and help remediate the mess when something goes wrong. They're trusted security professionals watching over your business. But what happens when one of them goes rogue? It's unlikely, but it can happen.

    Join us as we take a look at the Insider Threat problem from a different perspective. We'll explore where the SOC sits in the picture, what could cause an analyst to turn to the dark side, and how to mitigate the risk.

    Come along to see who is watching the watchers.
  • 3rd Party Risk: Secure Remote Contractors with Complimentary Monitoring Service Recorded: Jul 10 2020 33 mins
    Craig Cooper, COO & SVP of Customer Success, Gurucul
    The Novel Coronavirus (COVID-19) outbreak has forced many of our customers to act quickly to protect the health of their employees and the larger community by asking employees to work from home which introduces new security challenges. What about third party contractors? Large IT Service Providers are under the same work from home orders. Gurucul has recently made a free 30-day Remote Workforce Monitoring Service that helps customers manage the remote employees and contractors of Third Party Service Providers. Watch this webinar replay to find out how leveraging our unique offerings can radically change the way you secure third party contractors working remotely.
  • Global Security Operations with a Remote Workforce Recorded: Jul 9 2020 31 mins
    Mike Parkin, Technical Marketing Engineer, Gurucul
    The last few months have seen a drastic change in the way we work and access our data. This is especially true in organizations that rely heavily on their IT infrastructure. We went from most of our workforce on-premises accessing local and remote data to working from home and accessing resources through VPN’s or exclusively through SaaS applications.

    That change in our work environment has put a strain on the information security teams who shepherd assets and employees. That doesn’t mean the old threats haven’t gone away. It just means that some of them have been de-emphasized while the new threats, with a largely remote workforce, have made them all harder to manage.

    That’s where AI-based advanced analytics serves as a force multiplier. It can adapt seamlessly to the changing threat situation and empower the Security Operations team. It lets them stay in control, even in the face of a brand new “normal.”
  • Detecting Malicious Traffic on your Network Recorded: Jul 6 2020 19 mins
    Craig Cooper, COO & SVP of Customer Success, Gurucul
    One of the biggest pain points of most network and security analytics solutions is their inability to conclusively tie data generated by disparate sources including application / platform event logs, network flows, HR user profiles and access entitlements. Gurucul solves this problem by defining unique identities (users and/or entities) and linking all the data elements to those identities using linking algorithms or patterns.

    Gurucul combines identity and network-based alerting to give the SecOps and NetOps teams an end-to-end picture of the incident, enabling them to answer essential questions such as:

    - Which device triggered the incident?
    - What transactions were performed?
    - How much data was transferred?
    - Who is the owner of the device/subnet?
  • 5 Star Ingredients for a Successful Unified Security & Risk Analytics Program Recorded: Jul 2 2020 33 mins
    Nilesh Dherange, CTO and Craig Copper, COO & SVP at Gurucul
    Travel back in time with Gurucul and revisit Cinco de Mayo on Taco Tuesday. Pour yourself a margarita and unwind by learning ingredients for successful Unified Security and Risk Analytics programs.

    You have a lot of choice when it comes to cybersecurity solutions. Why should you care about Gurucul’s Unified Security & Risk Analytics? Give us 30 minutes of your time and we’ll give you:

    - 5 star ingredients for a successful security analytics program
    - Irrefutable evidence that explains why implementing machine learning powered security analytics is the most effective method for detecting unknown threats and protecting your IP/data in real-time
    - Information you can act on today to predict and stop insider threats, account compromise and data exfiltration
  • Discover & Manage Access Risks in This Global Pandemic Recorded: Jul 2 2020 34 mins
    Craig Cooper, COO & SVP of Customer Success, Gurucul
    In the midst of the COVID-19 pandemic, businesses are struggling to keep up with changes to employee and customer access. Dealing with remote workers, a surge in temporary workers, headcount reductions, and a staggering demand for staff in some industries has radically impacted access controls across the board.

    This unprecedented time has forced organizations to make overnight access changes to their borderless work environments, introducing a new set of identity and access issues, such as:

    New remote access for employees/contractors/third parties to support the “Stay at Home” order
    Privileged access being granted to employees or third party service providers so they can perform their jobs remotely
    Additional, atypical access for workers who have taken on new or added roles
    Access proliferation in the cloud
    Deprovisioning access or freezing accounts of furloughed workers
    And more…
  • 5 Indisputable Gaps in your Security Environment Recorded: Jul 2 2020 20 mins
    Mike Parkin, Technical Marketing Engineer, Gurucul
    Even the most advanced security solutions have gaps. DLP, Firewalls, network monitoring – no solution is complete on its own. By leveraging the data and information you already have and analyzing it to build a behavior profile and look for anomalies, Gurucul is able to detect and stop cyber threats like never before.

    Imagine being able to take all the activity and access logs from your existing point solutions and turn that data into risk prioritized intelligence. Gurucul does just that – in real-time, at scale. Our platform ingests massive amounts of data from virtually any source, including the network, IT systems, cloud platforms, applications, IoT, and more to give you a comprehensive, 360 degree view of your users’ and entities’ behaviors. It applies identity-centric, model-driven data science, machine learning, anomaly detection and predictive risk-scoring algorithms to identify abnormal behaviors and activities indicative of security threats. Based on that analysis, Gurucul Unified Security and Risk Analytics generates a single, dynamic risk score for every user and entity across all applications and devices.

    Gone are the days of simple security alerts. With risk-prioritized, contextual alerts, Gurucul automatically mitigates the most serious security threats in real-time before cyberattacks or insider threats can inflict damage.
  • Gurucul Customer Story: Aetna Model Driven Security Story Recorded: Jul 2 2020 4 mins
    Kurt Lieber, CISO, Aetna
    As a Fortune 100 Health Insurance Provider, Aetna is using Gurucul Risk Analytics to automate front line security controls. View this customer testimonial to learn more about Aetna’s success implementing Gurucul User and Entity Behavior Analytics (UEBA) and Identity Analytics.
  • The Gurucul Customer Experience Recorded: Jul 2 2020 3 mins
    Top CISOs from around the world
    Hear from Gurucul customers directly as they share their experiences working with Gurucul’s real-time behavior based security analytics and intelligence technology. Find out why they chose Gurucul, and how their companies have benefited from combining machine learning behavior profiling with predictive risk-scoring algorithms to predict, detect and prevent breaches, fraud and insider threats.
  • Infosys Gurucul Customer Story – Automating Real-time Threat Detection Recorded: Jul 2 2020 5 mins
    Lakshminarayanan Kaliyaperumal, Vice President & Head - Cyber Security Technology & Operations, Infosys Ltd
    Infosys is a large IT consulting services company with 200,000 employees in 100 locations across 50 countries. The company’s main challenge in providing IT services to global customers is keeping up with the rapid change in the threat environment. Watch the Infosys Gurucul customer story to learn how the company achieved the following objectives with Gurucul Behavior Based Security Analytics: insider threat detection, IP protection, detecting threats in real-time, reducing manual efforts, and reducing false positives.
  • How Allina Health Secured Medical Devices with Gurucul Recorded: Jul 2 2020 4 mins
    William Scandrett, CISO, Allina Health
    Allina Health needed to maintain the security of the medical devices throughout its hospital network. Gurucul’s security analytics platform allows the healthcare provider to establish baseline behavior profiles for its medical devices. These baselines help Allina Health detect activities that are outside the normal patterns, and which may indicate a device needs maintenance or has been compromised.

    This anomalous behavior triggers Gurucul’s risk-based alerts so that IT can intervene before a patient is at risk. With Gurucul, Allina is ensuring that patients are not placed in harm’s way due to a medical device’s faulty behavior.
  • Super Bowl LII: Protecting Players and VIP Data Recorded: Jan 22 2019 35 mins
    William Scandrett, CISO, Allina Health
    View this recorded webinar to learn how William Scandrett, CISO of Allina Health, quickly implemented Gurucul User and Entity Behavior Analytics (UEBA) for Super Bowl LII to drive and monitor privacy for players and VIPs:
    - Ensured players (active and retired) received care during Super Bowl week in a private and safe manner
    - Prevented unauthorized people from accessing patient records
    - Monitored authorized personnel to safeguard the data from exposure and exfiltration
  • Model Driven Security Orchestration Recorded: Oct 18 2018 45 mins
    Kurt Lieber, CISO, Aetna
    Many organizations have adopted machine learning and data analytics to help them identify security anomalies. However, mere identification isn’t good enough in a world where Petya and other modern attacks can take down 15,000 servers in a single organization in under two minutes. To combat these new types of malware, organizations need to be looking at Model-Driven Security Orchestration, where the security responses to emerging threats and attacks are automated and driven at machine speed. In this presentation, Kurt Lieber provides an overview of Aetna's security orchestration program.

    Watch the recorded webinar to learn:
    - Why behavior analytics provides the necessary context to predict risk
    - How Gurucul machine learning models automate front line security controls
    - Lessons learned from real-world deployments
Gurucul
Gurucul is transforming enterprise security with user behavior based machine learning and predictive analytics. Using identity to monitor for threats, Gurucul provides Actionable Risk Intelligence™ to protect against targeted and under-the-radar attacks. Gurucul is able to proactively detect, prevent, and deter advanced insider threats, fraud and external threats to system accounts and devices using self-learning, behavioral anomaly detection algorithms.

Gurucul is backed by an advisory board comprised of Fortune 500 CISOs, and world renowned-experts in government intelligence and cyber security. The company was founded by seasoned entrepreneurs with a proven track record of introducing industry changing enterprise security solutions. Our mission is to help organizations protect their intellectual property, regulated information, and brand reputation from insider threats and sophisticated external intrusions.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Combat Phishing Attacks Using Modern Machine Learning Algorithms
  • Live at: Jul 30 2020 5:00 pm
  • Presented by: Peter Draper, Technical Director - EMEA, Gurucul
  • From:
Your email has been sent.
or close