Hi [[ session.user.profile.firstName ]]

Applied Machine Learning 101

Join Gurucul for a conversation with our top data scientist about applied machine learning. This will be a talk about how we apply machine learning to the cybersecurity space. What models do we use? How do they work? What are the gotchas? What are the big wins? We'll talk about how cluster analysis works and how it can be applied. We'll discuss how and why machine learning algorithms can identify cyberattacks and malicious insider activity you don't even know about. Bring your questions and we'll provide answers! This will be an interactive session.
Recorded Jun 10 2021 31 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Pete Gajria, Analytics Director, Gurucul
Presentation preview: Applied Machine Learning 101
  • Channel
  • Channel profile
  • Saving Dollars By Saving Hours Jun 24 2021 5:00 pm UTC 30 mins
    Craig Cooper, COO & SVP Customer Success, Gurucul
    Automating Security Operations Center (SOC) tasks is critical to saving analyst time. Your security analysts can dedicate more time analyzing high priority threats and less time on tedious tasks, improving threat detection and analyst productivity. Gurucul automates the entire SOC lifecycle from advanced threat detection to AI powered threat hunting, to machine learning enabled investigation, to orchestration and response. Attend this session for details:

    • Gurucul Advanced Analytics automates real-time threat detection with out-of-the-box machine learning algorithms that learn anomalous behaviors immediately upon deployment. Models are pre-tuned to predict and detect threats aligned with specific use cases and vertical industries.
    • Automate incident investigation using AI techniques to identify any additional users / entities impacted which are similar to the threats detected, eliminating the need for analysts to manually piece evidence together into incident timelines.
    • Publish threat hunting queries as models to automate future detections and risk scoring.
    • Leverage out-of-the-box integrations with popular security solutions to enable analysts of all levels to run automated response playbooks that replace manual, error prone processes to ensure timely, consistent results and improve response times.
  • New Year, Same Breaches Jun 17 2021 6:00 pm UTC 30 mins
    Jane Grafton, VP of Marketing
    In this webinar we’ll review the top data breaches that occurred during the first quarter of 2021. Perhaps predictably, attackers are using the same tactics to breach corporate networks they've been using for years: phishing, social engineering, ransomware attacks, third party vectors, unpatched systems, unintentional misconfigurations, and more.

    In parallel, cyber crime has evolved in the underground to the level of a commodity business that follows the same Something-as-a-Service model we see across the commercial software space. Attackers have become increasingly sophisticated and tenacious. Recent attacks against major vendors and government agencies have shown just how capable some of these well-resourced attackers can be.

    Join us for a deep dive into the types of cyberattacks we're seeing, how they are evolving, who is being targeted, and what you can do to detect and prevent them. It's a constant game of cat and mouse and our hope is that companies can be victorious against cybercriminals once and for all! It is possible... with the right cyber defenses.
  • Applied Machine Learning 101 Recorded: Jun 10 2021 31 mins
    Pete Gajria, Analytics Director, Gurucul
    Join Gurucul for a conversation with our top data scientist about applied machine learning. This will be a talk about how we apply machine learning to the cybersecurity space. What models do we use? How do they work? What are the gotchas? What are the big wins? We'll talk about how cluster analysis works and how it can be applied. We'll discuss how and why machine learning algorithms can identify cyberattacks and malicious insider activity you don't even know about. Bring your questions and we'll provide answers! This will be an interactive session.
  • Get Laser Focused with a Modern Analytics-Driven and Cloud Native SOC Recorded: Jun 3 2021 18 mins
    Jane Grafton, VP Marketing, Gurucul
    Alert fatigue? Mired in disjointed investigations and response? Gurucul’s 10+ years R&D investment delivers AI-driven SOC Automation. Our cloud native analytics-driven SIEM and UEBA provide cutting-edge capabilities that reduce MTTD & MTTR. AI/ML contextual analytics deliver high efficacy real-time detection of unknown insider and external threats, paired with risk-based intelligent automated remediation.
  • Automating Incident Response with Machine Learning Recorded: May 27 2021 34 mins
    Mike Parkin, Director of Technical Marketing, Gurucul
    Incident Response is a key responsibility of any SecOps team whether they are sited locally, operating as a distributed group, or a function provided by an MSSP. With the sheer number of incidents they can face, it can be difficult for the team to stay ahead of the game. Fortunately, automation, based on AI-driven security analytics, can lighten the load and make the team more efficient, more effective, and better able to handle their workload. By applying artificial intelligence, the system can adapt and react to new threats even as they're developing. But beyond that, Machine Learning lets the system evolve over time, adjusting itself to the operational environment to optimize performance and efficacy.

    Join us as we explain how Gurucul's Unified Risk and Security Analytics platform uses machine learning and artificial intelligence to deliver advanced automated incident response.
  • Aligning Security Analytics with MITRE ATT&CK for Threat Detection Recorded: May 20 2021 30 mins
    Mike Parkin, Technical Marketing Engineer, Gurucul
    Organizations are using the MITRE ATT&CK Framework to identify holes in defenses, and to prioritize them based on risk. Gurucul has aligned its Unified Security and Risk Analytics platform with the MITRE ATT&CK to detect and enable automated responses to MITRE adversarial tactics and techniques. This provides organizations with unprecedented visibility to increase security coverage and automate controls in real-time.

    What’s the big deal? The big deal is machine learning and AI. The MITRE ATT&CK Framework is made up of rules and policies. You can greatly enhance the effectiveness of these known rules with behavior analytics to detect unknown threat patterns beyond MITRE tactics and techniques.

    Gurucul has out-of-the-box machine learning models to address risks and threats across the entire threat landscape resulting in actionable risk intelligence. Attend this webinar to learn how you can automate cyber defenses with machine learning models on big data.
  • New Year, Same Breaches Recorded: May 13 2021 30 mins
    Jane Grafton, VP of Marketing
    In this webinar we’ll review the top data breaches that occurred during the first quarter of 2021. Perhaps predictably, attackers are using the same tactics to breach corporate networks they've been using for years: phishing, social engineering, ransomware attacks, third party vectors, unpatched systems, unintentional misconfigurations, and more.

    In parallel, cyber crime has evolved in the underground to the level of a commodity business that follows the same Something-as-a-Service model we see across the commercial software space. Attackers have become increasingly sophisticated and tenacious. Recent attacks against major vendors and government agencies have shown just how capable some of these well-resourced attackers can be.

    Join us for a deep dive into the types of cyberattacks we're seeing, how they are evolving, who is being targeted, and what you can do to detect and prevent them. It's a constant game of cat and mouse and our hope is that companies can be victorious against cybercriminals once and for all! It is possible... with the right cyber defenses.
  • The Value of an Analytics-Driven SIEM Recorded: May 6 2021 34 mins
    Craig Cooper, COO & SVP of Customer Success, Gurucul
    Conventional SIEM technologies focus on Events, providing filtering, rules, and basic analytics to display events. Unfortunately, most SIEM products still deluge the Security Operations team with a flood of information, which makes it hard to prioritize events by their actual risk. The conventional SIEM paradigm is to present Events and Incidents, as identified by rules-based analytics, without context.

    An analytics-driven SIEM takes a different approach. Attend this webinar to understand how leveraging Artificial Intelligence and Machine Learning on massive volumes of data brings context to an otherwise siloed security picture and highlights risks in ways conventional SIEM’s can’t. Detect unknown attack chains via machine learning and advanced analytics:
    • Establish baselines of normal activity and detect anomalies with machine learning
    • Provide situational awareness with real-time analytics, identifying risks before they develop into incidents
    • Correlate and analyze events across the entire environment to deliver a consolidated view of the entire threat situation
    • Link events and related data into security incidents, threats, or forensic findings
    • Enrich the context of security alerts to make it easier to investigate and detect elusive threats
    • Prioritize incidents to understand which incidents are particularly abnormal or dangerous
  • Risk Scoring - Bringing Meaning to Raw Data Recorded: Apr 29 2021 32 mins
    Mike Parkin, Technical Marketing Engineer, Gurucul
    Gurucul's Unified Risk Analytics platform takes siloed, disparate, security data sources, analyzes them, and presents a unified risk score that Security Operations personnel can actually use. But how does Gurucul's platform consolidate various events to come to that score? Join us to find out how we contextualize a sea of data to deliver usable information.
  • Revolutionizing IAM Architecture with Machine Learning Recorded: Apr 22 2021 33 mins
    Peter Draper, Technical Director - EMEA, Gurucul
    To implement a risk-based approach to Identity and Access Management (IAM) you need advanced identity analytics powered by Machine Learning (ML). Best practices across the industry have proven that ML based identity analytics delivers significant improvements to IAM architecture and program management.

    Identity Analytics delivers the data science that improves IAM and Privileged Access Management (PAM), enriching existing identity management investments and accelerating deployments. Identity Analytics surpasses human capabilities by leveraging ML models to define, review and confirm accounts and entitlements for access. It uses dynamic risk scores and advanced analytics data as key indicators for provisioning, de-provisioning, authentication, and PAM.

    Attend this webinar to understand:
    • How machine learning improves IAM
    • How Identity Analytics reduces the attack surface by radically reducing accounts and entitlements
    • Top Identity Analytics use cases: Access Management, IAM, Identity Governance and Administration (IGA)
  • Cleaning House: Getting Rid of Malicious Insiders Recorded: Apr 15 2021 28 mins
    Jane Grafton, VP Marketing, Gurucul
    Insider Threats are a common concern for a lot of organizations, and Gurucul's Risk Analytics platform has a range of features that are specifically designed to handle the insider threat use case. The assumed challenge can be dealing with malicious insiders before they become an active threat, doing damage to the organization, its reputation, or it's customers.

    Machine Learning based security analytics can identify these malicious insiders by their behaviors and highlight the risk before they cross the line from a potential issue to an active threat. In many cases, malicious actors display telltale behaviors well before they act which means it's possible to identify the risk early enough to prevent an unhappy employee, or deliberate threat actor, from doing damage to the organization.

    Join us to explore how Gurucul's Machine Learning risk analytics platform can help you identify and remove malicious insiders before they generate a newsworthy incident.
  • The Three Pillars of Behavior: Identity, Access and Activity Recorded: Apr 8 2021 28 mins
    Craig Cooper, COO & SVP of Customer Success, Gurucul
    Behavior is the leading threat indicator. Detecting and stopping insider threats and cybercriminals involves monitoring and linking three pillars of behavior:

    - Identity: Who are you? What accounts are associated with your identity? Being able to link numerous accounts with a single identity is key to building a 360 degree view of a user.

    - Access: What are you accessing and with what entitlements? A core component of behavior is the ability to understand access rights at the entitlement level. How clean is the access plane? Understanding what users are doing with their access rights is critical.

    - Activity: What are you doing, when and where?

    Analyzing the access and activity of a user for their accounts and entitlements is ground zero for predictive risk scoring. Activity alone fails to provide enough context and visibility. The gap with access must be closed to evaluate risk. Attend this webinar to learn more.
  • SIEM Advanced Threat Detection Recorded: Apr 1 2021 30 mins
    Mike Parkin, Technical Marketing Engineer, Gurucul
    In this day and age, security analysts need SIEM products that support advanced threat detection to discover known and unknown threats in real-time. Organizations must continuously monitor infrastructure, applications, and cloud platforms to protect against attacks that bypass traditional security defenses. Firewalls, endpoint protection, intrusion prevention, antivirus, and the like are rules-based solutions that cannot uncover unknown threats. Advanced threat detection requires dynamic and proactive techniques powered by machine learning, artificial intelligence, and security analytics.

    Attend this webinar to learn how Gurucul’s beyond SIEM capabilities support advanced threat detection with:

    • Risk Prioritized Alerts
    • Model Driven Security
    • Open Analytics vs. Black Box Analytics
    • Linked Context vs. Siloed Context
    • Automated Intelligent Threat Hunting
    • Incident Timeline, Visualizations, and Reporting
    • Historical Real-Time Analysis vs. Short Term Analysis
  • AI Based Predictive Threat Hunting Recorded: Mar 11 2021 32 mins
    Mike Parkin, Director of Technical Marketing, Gurucul
    Gurucul provides a natural language and model driven threat hunting experience to minimize analyst time writing complex queries. Auto-recommended investigations, threat classifiers, security frameworks and cutting edge data models are used to represent the threat using modern visualizations, dynamic attribute summaries, and on-demand threat intelligence.

    A simple UI driven “point and shoot” experience gives investigation teams the ability to quickly build complex queries with inclusions, exclusions, functions, and operators. Artificial Intelligence (AI) techniques identify any additional users or entities impacted which are similar to the queries executed. This allows analysts to get insights into potential threats which do not completely satisfy the query criteria but demonstrate similar patterns. Analysts can also publish such threat hunting queries as models to automate any future detections and risk scoring.

    Attend this webinar to learn how:
    • Pre-packaged threat hunting analytics can be used for both active and passive threat hunting capabilities
    • Real-time contextual linking helps enrich threat hunting data
    • Automated responses for adversarial tactics and techniques defined by the MITRE ATT&CK™ Framework reduces security incident and risk MTTD/MTTR
  • Best Practices for Retiring your Legacy Kit Recorded: Mar 4 2021 32 mins
    Mike Parkin, Director of Technical Marketing, Gurucul
    Technology trends come and go, and (with them) so do the equipment that enabled or followed them. Before the mass migration to Cloud infrastructure, many organizations operated their own data centers with their own equipment. Many still do. Whether that kit was running applications on bare metal or playing host to the company's own virtualization farm, much of it remains in service and some of it has gotten well past it's "Best Before" date. As technology advances, equipment becomes more powerful, more efficient, and easier to maintain. Eventually, the old kit isn't worth keeping in service and it's time to say goodbye.

    Join us for a quick look at what's involved in retiring old equipment and migrating to it's replacement. We’ll also look at how security analytics can help show where the old iron may be adding unnecessary risk to the organization.
  • Context is King: Real World Examples on Preventing Data Breaches Recorded: Feb 25 2021 32 mins
    Mike Parkin, Director of Technical Marketing, Gurucul
    Cybersecurity solutions generate vast amounts of telemetry. The raw data gathered from sensors spread across the environment, detailing individual events as they happen. Some of those events represent an obvious attack, which is easy to identify and respond to. However, advanced attackers are skilled at hiding their presence, which means they don't leave an obvious trail. That is where context becomes vital. Seemingly innocent events, when seen together in context, become an indication that something is amiss. This is what makes context king in the world of cybersecurity. It's what brings attackers out of the shadows while helping to minimize false positives

    Join us for a review of some real world cases where contextual data was able to reveal an attack before it became a major data breach.
  • The Three Pillars of Behavior: Identity, Access and Activity Recorded: Feb 17 2021 29 mins
    Craig Cooper, COO & SVP of Customer Success, Gurucul
    Behavior is the leading threat indicator. Detecting and stopping insider threats and cybercriminals involves monitoring and linking three pillars of behavior:

    - Identity: Who are you? What accounts are associated with your identity? Being able to link numerous accounts with a single identity is key to building a 360 degree view of a user.

    - Access: What are you accessing and with what entitlements? A core component of behavior is the ability to understand access rights at the entitlement level. How clean is the access plane? Understanding what users are doing with their access rights is critical.

    - Activity: What are you doing, when and where?

    Analyzing the access and activity of a user for their accounts and entitlements is ground zero for predictive risk scoring. Activity alone fails to provide enough context and visibility. The gap with access must be closed to evaluate risk. Attend this webinar to learn more.
  • Cloud-Native Analytics Driven XDR Drives Better Threat Detection & Response Recorded: Feb 11 2021 59 mins
    Jeff Pollard, VP and Principal Analyst Serving Security & Risk Professionals, Forrester & Nilesh Dherange, CTO, Gurucul
    Cyber attacks. Unauthorized access. Misuse. It's not a matter of if your infrastructure and data
    will be attacked – it's a matter of when. XDR delivers the extended detection and response capabilities you need to defend against the most advanced threats.

    Join Gurucul for a deep-dive into XDR. Nilesh Dherange, Gurucul's CTO will host guest speaker Jeff Pollard, VP and Principal Analyst Serving Security & Risk Professionals at Forrester.

    Nilesh and Jeff will discuss the key areas of XDR:
    • How XDR Changes Things for CISOs and Security Teams
    • Continuum of SIEM to Security Analytics to XDR
    • Detection & Response Overview
    • XDR – A Bottom Up Approach
    • The Impact to Workflow
    • Introducing the Gurucul Cloud-Native Analytics Driven XDR Platform

    Attend this webinar to understand how to integrate endpoint, network, and application telemetry for
    real-time threat detection. Automate detection logic with MITRE ATT&CK mapping across the entire killchain. Triage activity, access, and transaction data for a holistic view of threat indicators. Transform unified telemetry data into risk prioritized alerts. And automate response actions with risk-based triggers and orchestration playbooks. Attend this webinar to learn more about the converging space of XDR and Security Analytics.
  • Using Data to Fuel Transformation Across the Business Recorded: Feb 4 2021 31 mins
    Mike Parkin, Director of Technical Marketing, Gurucul
    In the world of cybersecurity, it's more important than ever to make timely data-driven decisions. Data is the currency that fuels transformation. And data growth is exploding. We’re at the tip of a continually morphing and growing iceberg. The mind-numbing quantity and volume of log files and outputs from security tools are typically standalone and siloed sources of data. Rarely are these rich sources of intelligence correlated or linked with one another to achieve greater understanding of what access and activities have taken place.

    Machine learning based behavior analytics delivers the ability to aggregate, filter, correlate, link, and make sense of enormous volumes of disparate data feeds in real-time. Attend this webinar to get a better understanding of the importance of fueling your cybersecurity transformation with big data.
    - Turn data into risk prioritized intelligence
    - Make real-time, data-driven decisions
    - Mine big data to expedite threat hunting
  • Best Practices for Implementing an Insider Threat Program Recorded: Jan 28 2021 37 mins
    Craig Cooper, COO & SVP of Customer Success, Gurucul
    Insider threats are a serious concern, and they are on the rise. Detecting them and mitigating the risk requires a specialized technology platform and a set of best practices that differ from the usual approach of detecting external threats. Over the years, Gurucul has worked with many companies globally of all sizes, and in different verticals, to help them implement successful insider threat programs.

    Attend this session for details on our best practice recommendations based on our experience. With proven strategies and tactics, organizations can get to the point where they are able to remediate insider threats in real-time or at least before data is exfiltrated.
Gurucul
Gurucul is transforming enterprise security with user behavior based machine learning and predictive analytics. Using identity to monitor for threats, Gurucul provides Actionable Risk Intelligence™ to protect against targeted and under-the-radar attacks. Gurucul is able to proactively detect, prevent, and deter advanced insider threats, fraud and external threats to system accounts and devices using self-learning, behavioral anomaly detection algorithms.

Gurucul is backed by an advisory board comprised of Fortune 500 CISOs, and world renowned-experts in government intelligence and cyber security. The company was founded by seasoned entrepreneurs with a proven track record of introducing industry changing enterprise security solutions. Our mission is to help organizations protect their intellectual property, regulated information, and brand reputation from insider threats and sophisticated external intrusions.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Applied Machine Learning 101
  • Live at: Jun 10 2021 6:00 pm
  • Presented by: Pete Gajria, Analytics Director, Gurucul
  • From:
Your email has been sent.
or close