Hi [[ session.user.profile.firstName ]]

Security Analytics Makes Zero Trust Possible

A truly secure organization cannot trust anything either inside or outside of its environment. This is the essence of Zero Trust.

The key? Security Analytics makes Zero Trust possible. Monitoring the behaviors of everything and everyone connecting to systems on the network, and delivering continuous real-time access insights, can identify and stop new cyber threats.

Attend the Zero Trust Security Webinar for an expert analysis on the unique role that security analytics and security automation plays in achieving a genuine zero trust environment.
Recorded Aug 27 2020 33 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Craig Cooper, COO, Gurucul & Mike Parkin, Technical Marketing Engineer, Gurucul
Presentation preview: Security Analytics Makes Zero Trust Possible
  • Channel
  • Channel profile
  • Aligning Security Analytics with MITRE ATT&CK for Threat Detection Nov 24 2020 10:00 pm UTC 29 mins
    Mike Parkin, Technical Marketing Engineer, Gurucul
    Organizations are using the MITRE ATT&CK Framework to identify holes in defenses, and to prioritize them based on risk. Gurucul has aligned its Unified Security and Risk Analytics platform with the MITRE ATT&CK to detect and enable automated responses to MITRE adversarial tactics and techniques. This provides organizations with unprecedented visibility to increase security coverage and automate controls in real-time.

    What’s the big deal? The big deal is machine learning and AI. The MITRE ATT&CK Framework is made up of rules and policies. You can greatly enhance the effectiveness of these known rules with behavior analytics to detect unknown threat patterns beyond MITRE tactics and techniques.

    Gurucul has out-of-the-box machine learning models to address risks and threats across the entire threat landscape resulting in actionable risk intelligence. Attend this webinar to learn how you can automate cyber defenses with machine learning models on big data.
  • Revolutionizing IAM Architecture with Machine Learning Nov 19 2020 5:00 pm UTC 30 mins
    Peter Draper, Technical Director - EMEA, Gurucul
    To implement a risk-based approach to Identity and Access Management (IAM) you need advanced identity analytics powered by Machine Learning (ML). Best practices across the industry have proven that ML based identity analytics delivers significant improvements to IAM architecture and program management.

    Identity Analytics delivers the data science that improves IAM and Privileged Access Management (PAM), enriching existing identity management investments and accelerating deployments. Identity Analytics surpasses human capabilities by leveraging ML models to define, review and confirm accounts and entitlements for access. It uses dynamic risk scores and advanced analytics data as key indicators for provisioning, de-provisioning, authentication, and PAM.

    Attend this webinar to understand:
    • How machine learning improves IAM
    • How Identity Analytics reduces the attack surface by radically reducing accounts and entitlements
    • Top Identity Analytics use cases: Access Management, IAM, Identity Governance and Administration (IGA)
  • Risk Scoring - Bringing Meaning to Raw Data Nov 12 2020 7:00 pm UTC 30 mins
    Mike Parkin, Technical Marketing Engineer, Gurucul
    Gurucul's Unified Risk Analytics platform takes siloed, disparate, security data sources, analyzes them, and presents a unified risk score that Security Operations personnel can actually use. But how does Gurucul's platform consolidate various events to come to that score? Join us to find out how we contextualize a sea of data to deliver usable information.
  • Securing Internet-Connected Devices in Healthcare: Life Saving Technology Nov 5 2020 5:00 pm UTC 30 mins
    Peter Draper, Technical Director - EMEA, Gurucul
    There are many different types of medical devices such as infusion pumps, CT machines, scanners, bedside devices, and countless others. Many of these devices are utilizing old versions of operating systems, network protocol software and more.  Any medical device connected to the internet is at risk of a cyberattack, and devices that receive and transmit data are the most vulnerable.  Attend this webinar to understand how advanced behavior analytics detects anomalies associated with security risks that can threaten patient safety:

    - Creates a behavior baseline for all devices, and constantly monitors them for deviations in volume, activity, time, place, actions, etc.
    - Detects medical device anomalies indicative of unauthorized access, unintended changes and malfunctions before damage occurs
    - Discovers new medical devices on the hospital network which may not have been formally registered through the IT/security department
  • The Future of Connected Devices: IoT Security Oct 29 2020 5:00 pm UTC 30 mins
    Mike Parkin, Technical Marketing Engineer, Gurucul
    One of the biggest issues affecting IoT device security is that many IoT products don’t get regular updates. This exposes the devices to potential cyberattacks that target vulnerabilities in outdated hardware and software. In addition, most IoT devices come with default passwords that can be easily compromised via online password lists and automated searches for particular devices. To complicate matters, similar to BYOD, many IoT devices join the network without IT’s knowledge, where they remain undocumented and unmanaged. Gurucul's Behavior Analytics is a force multiplier for monitoring for IoT security threats at scale. IoT devices are not complicated equipment. But, connecting thousands or even millions of them to the network creates a massive and difficult to defend attack surface. Attend this webinar to learn how Gurucul can weed out IoT anomalies since these devices perform a narrow set of functions that allow abnormalities to pop out.
  • Insider Threats Deep Dive: Case Studies for Advanced Analytics Recorded: Oct 14 2020 30 mins
    Mike Parkin, Technical Marketing Engineer, Gurucul
    Insider Threats can come from multiple directions and can be after different targets, depending on who they are and what their agenda is. We've talked about these risks in the abstract, now join us for an in-depth look at a couple of Insider Threat cases studies and how Advanced Behavioral Analytics can address the challenges posed by these pernicious threats.
  • Insider Threats - Advanced Analytics and Top Use Cases Recorded: Oct 8 2020 33 mins
    Mike Parkin, Technical Marketing Engineer, Gurucul
    The malicious insider is one of the most pernicious and challenging threats. They are already inside the perimeter and have permissions that may give them access to the organization's crown jewels. Join us as we look at the main use cases in the Insider Threat space and how advanced analytics can help your organization mitigate the risk imposed by malicious insiders. Understand what the common risks are, and how you can deal with them.
  • Cloud-Native Analytics Driven XDR Drives Better Threat Detection & Response Recorded: Sep 30 2020 60 mins
    Jeff Pollard, VP and Principal Analyst Serving Security & Risk Professionals, Forrester & Nilesh Dherange, CTO, Gurucul
    Cyber attacks. Unauthorized access. Misuse. It's not a matter of if your infrastructure and data
    will be attacked – it's a matter of when. XDR delivers the extended detection and response capabilities you need to defend against the most advanced threats.

    Join Gurucul for a deep-dive into XDR. Nilesh Dherange, Gurucul's CTO will host guest speaker Jeff Pollard, VP and Principal Analyst Serving Security & Risk Professionals at Forrester.

    Nilesh and Jeff will discuss the key areas of XDR:
    • How XDR Changes Things for CISOs and Security Teams
    • Continuum of SIEM to Security Analytics to XDR
    • Detection & Response Overview
    • XDR – A Bottom Up Approach
    • The Impact to Workflow
    • Introducing the Gurucul Cloud-Native Analytics Driven XDR Platform

    Attend this webinar to understand how to integrate endpoint, network, and application telemetry for
    real-time threat detection. Automate detection logic with MITRE ATT&CK mapping across the entire killchain. Triage activity, access, and transaction data for a holistic view of threat indicators. Transform unified telemetry data into risk prioritized alerts. And automate response actions with risk-based triggers and orchestration playbooks. Attend this webinar to learn more about the converging space of XDR and Security Analytics.
  • How to Build a Risk Based Authentication Program Recorded: Sep 24 2020 32 mins
    Craig Cooper, COO & SVP of Customer Success, Gurucul
    CISOs are trying to deliver a frictionless user experience ease to support ongoing digital transformation initiatives while fending off cyberattacks and preventing data breaches. It is imperative to leverage cutting-edge technology with advanced cybersecurity capabilities to simplify secure user access to digital content.

    Gurucul offers machine learning behavior analytics and big data context to facilitate risk based authentication. As users access applications from any device, their behavior is continuously risk scored. Applications use this risk score to influence the user experience including authentication and authorization determinations.

    For example, low risk users accessing low risk assets are granted access automatically without having to enter passwords. Alternatively, high risk users accessing high risk assets will have to jump through flaming hoops - enter passwords, be challenged with MFA, request and obtain management approval, etc.

    Attend this webinar to learn how Gurucul's Risk Based Authentication can help you streamline, optimize, and personalize your user and customer authentication experience.
  • UEBA Explained: Using User & Entity Behavior Analytics to Stop Advanced Threats Recorded: Sep 16 2020 32 mins
    Mike Parkin, Technical Marketing Engineer, Gurucul
    UEBA is the scientific process of transforming user and entity behavior data into risk-prioritized intelligence, for the purpose of driving business action. It’s the application of data science to create user and entity behavior baselines from historical access and activity. Once behavior baselines are established, analytics is used to monitor user and entity behavior in real-time, for the purposes of predicting and detecting anomalous activity. Real-time is the key here: UEBA ingests massive amounts of data and provides insight into what’s actually going on with users and entities in your organization, as it’s happening.

    The more data analyzed, the better. The key is to look at every possible access and activity feed so you can connect the dots across applications, systems, groups, devices and more to effectively root out truly risky anomalous behavior. The output of behavior analytics is a single unified risk score for every user and entity. It is the risk score that provides actionable intelligence on potential risky situations in real-time so organizations can take corrective action. That action can be automated and orchestrated for optimum effect in environments where you are looking at millions of events (or activities) per second.

    Attend this webinar to learn how to manage risk and make risk-based decisions in a world where zero day threats can take down entire networks in seconds. Machine learning and advanced behavior analytics provide a way to analyze large volumes of data and predict anomalous behavior in order to prevent large scale fraud and detect unknown threats.
  • How to Leverage Automation for Security Policy Compliance Recorded: Sep 9 2020 29 mins
    Peter Draper, Technical Director - EMEA, Gurucul
    Security governance and compliance mandates require your organization be prepared to report on your cyber security posture at any time. Are you ready? Gurucul offers real-time visibility and reporting on compliance controls for data collection, review, archival, reporting and alerting including: PCI DSS, HIPAA, ISO 27001, NIST, FISMA, Sarbanes Oxley, NERC CIP, and other government regulations.

    Attend this webinar to understand how Gurucul Unified Security and Risk Analytics offers real-time updates into behaviors that impact governance and compliance controls:
    - Implement a risk-based approach to meet regulatory demands
    - Detect and remediate compliance violations automatically in real-time
    - Leverage out-of-the-box compliance reports for audit and management review
  • Drive Security Automation at Machine Speed Recorded: Sep 3 2020 28 mins
    Mike Parkin, Technical Marketing Engineer, Gurucul
    Automation has been a cornerstone of System and Security Administration for years. Admins have always written scripts and developed tools that let them be more efficient, working smarter rather than harder. But automation relies on knowing all the variables and all the steps and fitting them together into a coherent whole. While that's an easy concept to work with for a SysAdmin automating their patch cycles, it's harder in the security world where the variables and steps are often in flux.

    Advanced security analytics changes that, by applying artificial intelligence and machine learning to the problem. It lets the variables and steps be a little fuzzy around the edges, while still providing a hard edged reaction to security events. Rather than an administrator having to adapt their automation manually, the AI can adapt it seamlessly and almost instantly.

    Join us for a look at how Artificial Intelligence can drive security automation at Machine Speed.
  • Security Analytics Makes Zero Trust Possible Recorded: Aug 27 2020 33 mins
    Craig Cooper, COO, Gurucul & Mike Parkin, Technical Marketing Engineer, Gurucul
    A truly secure organization cannot trust anything either inside or outside of its environment. This is the essence of Zero Trust.

    The key? Security Analytics makes Zero Trust possible. Monitoring the behaviors of everything and everyone connecting to systems on the network, and delivering continuous real-time access insights, can identify and stop new cyber threats.

    Attend the Zero Trust Security Webinar for an expert analysis on the unique role that security analytics and security automation plays in achieving a genuine zero trust environment.
  • Take Security Beyond SIEM with Behavior Analytics Recorded: Aug 19 2020 30 mins
    Mike Parkin, Technical Marketing Engineer, Gurucul
    Taking security beyond SIEM capabilities requires thinking outside of the (black) box. Gurucul uses behavior-based security analytics powered by machine learning to detect risky behavior. Traditional SIEMs import data, normalize that data and provide minimal enrichment. Correlation rules specify a sequence of events that indicates an anomaly, or potential security threat. This technique is outdated because it generates significant number of false positives. Also, SIEMs are incapable of detecting new, and especially, unexpected threats.

    Correlation rules can only detect known patterns. So, unknowns go completely undetected. In today’s digital age, as cybercriminals become more advanced, any time that passes between a breach and an alert is money. You need to be able to detect both known and unknown threats.

    Attend this webinar to learn how machine learning based behavior analytics takes security beyond SIEM correlation rules and queries. By taking security beyond SIEM, you can identify risky changes in behavior patterns in real-time and automate corrective action. Get actionable intelligence with low false positives.
  • Practical Advice to Uplevel your Insider Threat Program Today Recorded: Aug 13 2020 31 mins
    Peter Draper, Technical Director - EMEA, Gurucul
    Insider Threats are not new. In the old days, you'd just sit someone down and have "the talk". What's new are the threat vectors that have presented themselves in recent months. Work from home employees, staff reduction, reduced hours, or furloughed insiders; the unfortunate reality is that insider risk is certainly on the rise. The expansion of work from home policies means more employees accessing corporate networks and data over public networks using personal devices. Every organization needs to update its Insider Threat Program or at minimum, implement basic monitoring controls.

    Attend this webinar to learn from a security practitioner perspective: What should you be doing? Gurucul has spent the last decade helping organizations globally to deter, predict, detect, and remediate insider risk. We have excellent experience to share as well as a framework we have used with many large, global companies. We can help you get a mature insider threat program up and running.
  • Aligning Security Analytics with MITRE ATT&CK for Threat Detection Recorded: Aug 5 2020 30 mins
    Mike Parkin, Technical Marketing Engineer, Gurucul
    Organizations are using the MITRE ATT&CK Framework to identify holes in defenses, and to prioritize them based on risk. Gurucul has aligned its Unified Security and Risk Analytics platform with the MITRE ATT&CK to detect and enable automated responses to MITRE adversarial tactics and techniques. This provides organizations with unprecedented visibility to increase security coverage and automate controls in real-time.

    What’s the big deal? The big deal is machine learning and AI. The MITRE ATT&CK Framework is made up of rules and policies. You can greatly enhance the effectiveness of these known rules with behavior analytics to detect unknown threat patterns beyond MITRE tactics and techniques.

    Gurucul has out-of-the-box machine learning models to address risks and threats across the entire threat landscape resulting in actionable risk intelligence. Attend this webinar to learn how you can automate cyber defenses with machine learning models on big data.
  • Combat Phishing Attacks Using Modern Machine Learning Algorithms Recorded: Jul 30 2020 29 mins
    Peter Draper, Technical Director - EMEA, Gurucul
    Phishing attacks are one of the most common techniques used to acquire sensitive information including passwords, credit card information or account details. While many technologies seek to detect phishing, it's effectiveness relies on circumventing those sensors. With social engineering tactics, hackers use terms like "Urgent! Attention required in order to keep your account active" to trick employees into clicking on bad links. The newest phishing scam today involves sending a fake invoice loaded with malware.

    Modern machine learning algorithms can detect the change in a user's behavior from the moment the credentials are compromised. Detection can be tied to specific activities such as a series of failed login attempts, an atypical IP address or unusual activity in general.

    Watch this webinar to:
    - Learn how to combat phishing attacks using modern machine learning algorithms
    - Find out how this solution can benefit your organization
  • Securing Data with a Remote Workforce Recorded: Jul 23 2020 31 mins
    Craig Cooper, COO & SVP of Customer Success, Gurucul
    With the full effects of COVID-19 still unknown, workers have been pushed out of secure offices and into their homes. Workers are logging into corporate networks from unsecure personal devices and networks. Gurucul has built a solution package to address threats related to the remote workforce, at a great price - FREE.

    This includes a dedicated dashboard and supervised models trained on the changes in behavior patterns seen over the last few weeks. It also provides unsupervised models pre-configured to use feature datasets for the most common and relevant data sources such as VPN, Office 365, AWS, Proxy and PAM.

    Attend this webinar to find out how this free service can help you put advanced threat detection controls in place to identify users who are at risk from phishing attacks, detect users whose accounts may have been compromised, prevent data exfiltration, and more.
  • Who Watches the Watchers? Recorded: Jul 16 2020 31 mins
    Mike Parkin, Technical Marketing Engineer, Gurucul
    Your Security Operations Center has visibility into much of the environment - considerably more than any normal user. You trust them to watch for anomalies, react to security events, and help remediate the mess when something goes wrong. They're trusted security professionals watching over your business. But what happens when one of them goes rogue? It's unlikely, but it can happen.

    Join us as we take a look at the Insider Threat problem from a different perspective. We'll explore where the SOC sits in the picture, what could cause an analyst to turn to the dark side, and how to mitigate the risk.

    Come along to see who is watching the watchers.
  • 3rd Party Risk: Secure Remote Contractors with Complimentary Monitoring Service Recorded: Jul 10 2020 33 mins
    Craig Cooper, COO & SVP of Customer Success, Gurucul
    The Novel Coronavirus (COVID-19) outbreak has forced many of our customers to act quickly to protect the health of their employees and the larger community by asking employees to work from home which introduces new security challenges. What about third party contractors? Large IT Service Providers are under the same work from home orders. Gurucul has recently made a free 30-day Remote Workforce Monitoring Service that helps customers manage the remote employees and contractors of Third Party Service Providers. Watch this webinar replay to find out how leveraging our unique offerings can radically change the way you secure third party contractors working remotely.
Gurucul
Gurucul is transforming enterprise security with user behavior based machine learning and predictive analytics. Using identity to monitor for threats, Gurucul provides Actionable Risk Intelligence™ to protect against targeted and under-the-radar attacks. Gurucul is able to proactively detect, prevent, and deter advanced insider threats, fraud and external threats to system accounts and devices using self-learning, behavioral anomaly detection algorithms.

Gurucul is backed by an advisory board comprised of Fortune 500 CISOs, and world renowned-experts in government intelligence and cyber security. The company was founded by seasoned entrepreneurs with a proven track record of introducing industry changing enterprise security solutions. Our mission is to help organizations protect their intellectual property, regulated information, and brand reputation from insider threats and sophisticated external intrusions.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Security Analytics Makes Zero Trust Possible
  • Live at: Aug 27 2020 6:00 pm
  • Presented by: Craig Cooper, COO, Gurucul & Mike Parkin, Technical Marketing Engineer, Gurucul
  • From:
Your email has been sent.
or close