Hi [[ session.user.profile.firstName ]]

Cloud Risk-Based Authentication To Prevent Password Based Attacks

Gaining unauthorized access to internal systems is one of the top mechanisms employed by hackers. Access control systems, however, are not yet equipped with the advanced analytics needed to detect the sophisticated techniques used by hackers. By integrating your SIEM with your SSO/IDM solution, SOC analysts can gain the visibility needed to prevent these access based attacks.

Attend this webinar to hear about:

- Why password access based attacks in cloud environments?
- Threat detection and threat hunting use cases for password-based attacks
- User account based orchestration and incident response actions
- Walkthrough of Securonix - Okta integration with a live demo
Recorded Nov 15 2018 51 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Sujay Doshi, Sr. SIEM Solution Engineer
Presentation preview: Cloud Risk-Based Authentication To Prevent Password Based Attacks

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Cloud Risk-Based Authentication To Prevent Password Based Attacks Recorded: Nov 15 2018 51 mins
    Sujay Doshi, Sr. SIEM Solution Engineer
    Gaining unauthorized access to internal systems is one of the top mechanisms employed by hackers. Access control systems, however, are not yet equipped with the advanced analytics needed to detect the sophisticated techniques used by hackers. By integrating your SIEM with your SSO/IDM solution, SOC analysts can gain the visibility needed to prevent these access based attacks.

    Attend this webinar to hear about:

    - Why password access based attacks in cloud environments?
    - Threat detection and threat hunting use cases for password-based attacks
    - User account based orchestration and incident response actions
    - Walkthrough of Securonix - Okta integration with a live demo
  • Kerberoasting Attack Detection For SOC Analysts Recorded: Nov 12 2018 54 mins
    Oleg Kolesnikov, Director of Threat Research, Securonix
    "Kerberoasting" is one of the advanced techniques currently in use by hackers to compromise weak service accounts in an Active Directory environment. This webinar by the Securonix Threat Research team will take a deep dive into this attack. We will also show blue teams in a Security Operations Center how to configure their SIEM to quickly find this activity in the monitored environment.

    Join this session by Securonix Threat Research to gain insights into:

    - Kerberoasting 101: How it works
    - A complete attack demo showing Kerberoasting
    - Kerberoasting Attack Activity Detection

    Register now.
  • Under The Hood: Effective Threat Hunting For The SOC Analyst Recorded: Aug 22 2018 52 mins
    Aditya Sundaram, Director Cyber Threat Analytics, Aarij Khan, VP Marketing
    The Modern SOC cannot afford to rely just on cyber threat detection to stay ahead of sophisticated hackers and advanced attacks. Threat hunting - the proactive approach to root out attacks coming from within is an extremely valuable complement to even the most advanced cybersecurity detection technologies. Securonix includes the Securonix Spotter threat hunting platform for exactly this reason.

    Attend this live webinar to hear about:

    - The most prevalent cyber threats hidden in your environment (that you are unaware of)
    - What threat hunting in the SOC is and how it reduces your cyber risk
    - The different types of information available to you
    - Free resources that can root out the most nefarious threats
    - Example scenario - threat hunting using Securonix Spotter
  • Incremente la eficiencia del SOC mientras reduce el costo de operaciones Recorded: Jul 19 2018 55 mins
    Luis Guzman, Security Engineer, Securonix
    Más del 60% de las alertas en su SOC demandan tiempo de investigación y no constituyen un riesgo alto para su organización. SIEM 2.0 puede automatizar sus procesos de investigación para que los analistas se enfoquen en lo que realmente es una amenaza. Lo invitamos a un webinar donde nuestros expertos en UEBA de Securonix presentarán las ventajas técnicas y económicas al tener una solución de Seguridad Analítica Avanzada en su SOC
  • No permitas que personas malintencionadas violen la seguridad de tus datos Recorded: Jul 12 2018 59 mins
    Luis Guzman, Security Engineer, Securonix
    Todo lo que necesita saber de Amenazas internas: hasta el evento más sutil puede convertirse en fraude y un SIEM tradicional no puede darle una vista completa incluso antes de que las consecuencias sean fatales para su compañía. Lo invitamos a nuestro webinar donde expertos en seguridad Analítica de Securonix le contarán como SIEM 2.0 se constituye en la herramienta esencial para atender los casos de Insider threat
  • Monitoreo de seguridad en la nube para un nueva era digital Recorded: Jul 5 2018 53 mins
    Luis Guzman, Security Engineer, Securonix
    Usted ya superó todas las inquietudes para mover sus aplicaciones hacia el Cloud, el siguiente paso es resguardarse frente a las Ciber-amenazas y amenazas internas, lo único que necesitamos son sus logs!! Acompáñenos en un webinar donde expertos en Seguridad Analítica y UEBA de Securonix le contarán como minimizar el riesgo en su entorno Cloud para seguir avanzando con tranquilidad.
  • Aumente a eficiência do seu SOC, reduzindo custos operacionais. Recorded: Jul 5 2018 62 mins
    Marcelo Jackson, Security Engineer, Securonix
    Mais de 60% dos alertas do seu SOC demandam tempo de investigação e não representam um alto risco para a sua organização. O SIEM 2.0 pode automatizar seus processos de investigação, permitindo que os analistas foquem no que realmente representa uma ameaça. Convidamos você para um webinar onde nossos especialistas de segurança de UEBA da Securonix irão apresentar as vantagens técnicas e econômicas de possuir uma solução de segurança analítica avançada no seu SOC.
  • Não deixe que a segurança da sua empresa seja comprometida por usuários internos Recorded: Jun 28 2018 61 mins
    Marcelo Jackson, Security Engineer, Securonix
    Tudo o que você precisa saber sobre ameaças internas: a atividade mais simples pode se torna uma fraude com o passar do tempo. Um SIEM tradicional não pode proporcionar uma visão completa, inclusive antes que as consequências se tornem fatais para a sua empresa. Convidamos vocês para o nosso webinar onde especialistas em segurança analítica da Securonix irão falar sobre como o SIEM 2.0 se constitui como a ferramenta essencial para atender os casos de Insider Threat.
  • Security Threat Research: New Real-World Attacks Update Recorded: Jun 26 2018 44 mins
    Oleg Kolesnikov, Director of Threat Research, Securonix
    Join this webinar to learn about the latest threats and attack techniques that the Securonix Threat Research team is seeing in the wild. You will also learn how you can leverage user and big data security analytics to increase the chances of detecting such threats and techniques at an early stage.

    Topics we are planning to talk about include:
    - A persistent crypto jacking attack recently seen in the wild
    - One of the most virulent and prevalent mass-scale ransomware attacks seen so far this year
    - Techniques used by attackers to steal hashes without using mimikatz and without touching lsass
    - How security analytics can increase your chances of early detection of such attacks and techniques
  • Como monitorar e gerir a segurança do seu ambiente na nuvem? Recorded: Jun 26 2018 62 mins
    Marcelo Jackson, Security Engineer, Securonix
    Você já superou os desafios de levar as suas aplicações para a nuvem, o próximo passo é se proteger de ataques de cyber e ameaças internas. A única coisa que necessitamos são os seus logs. Nos acompanhem em um webinar no no dia 26 de Junho às 10h onde especialista em segurança analítica e UEBA da Securonix irão indicar como minimizar o risco no seu ambiente na nuvem.
  • Cloud Security Monitoring And Analytics for The New Age Recorded: May 16 2018 61 mins
    Nitin Agale, SVP of Products & Derrick Harcey, Chief Architect
    Organizations are adopting cloud first strategies motivated by strong business drivers that including cost efficiency, faster time to market, and increased agility to respond to market requirements.

    As this trend continues, the security of infrastructure and data in the cloud is becoming a top priority for organizations concerned about data loss, compliance violations, and malware infections. In this webinar, you will understand why traditional security products are not equipped for cloud IT architectures, and why a cloud-to-cloud security strategy provides the best monitoring, threat detection, and incident response.

    The webinar will cover:

    - Challenges in securing your cloud infrastructure
    - Securonix cloud-to-cloud monitoring capabilities
    - Live demo of the Securonix cloud use cases
  • Defining UEBA in 2018 Recorded: Mar 14 2018 61 mins
    Nitin Agale, SVP of Products, Securonix
    As advanced threats and data breaches continue to grow, many security vendors are claiming to have user and entity behavior (UEBA) capabilities to combat such threats. SOC analyst, IR teams, and security solution buyers are looking to cut through the noise and understand what to truly expect from an effective UEBA solution in 2018 and beyond.

    In this webinar you will learn:

    - Objectives and use cases
    - Key capabilities to expect in a UEBA solution
    - Cloud UEBA
    - Live demo of the Securonix UEBA 6.1 platform
  • Insider Threats: Best Practices For Detecting And Preventing An Attack Recorded: Feb 22 2018 50 mins
    Holger Schulze, CEO Cybersecurity Insiders & Aarij Khan, VP Securonix
    Insider Threats are the biggest cybersecurity threat vector in today's open environment. With organizational perimeters gone and sensitive digital data accessible across devices, personnel and geographies, ensuring a data breach does not occur is a formidable challenge.

    Join our panel of cybersecurity experts as we discuss best practices for protecting your organization against insider attacks and review the key findings from the 2018 Insider Threat Report, including:

    •Why 90% of organizations are vulnerable to insider attacks
    •How the use of behavior and data monitoring is accelerating to combat insider attacks
    •Proven technologies to detect, deter and prevent insider attacks
  • Seamlessly Replace Your Legacy SIEM Recorded: Nov 30 2017 64 mins
    Mel Shakir, VP Product Development
    There is a fundamental shift well underway in the SIEM/Security Management market. Legacy SIEM products designed, built and introduced 15-20 years ago are quickly falling out of favor. Replacing your legacy SIEM does not have to be daunting - let us show you why.

    Join Mel Shakir, VP of Product Development at Securonix on this webinar to understand:
    - The most common challenges with legacy SIEM
    - Ways in which Securonix SIEM is different
    - Why features such as threat hunting and automated incident response are critical today
    - How to seamlessly migrate from legacy SIEM to SNYPR Next Gen SIEM
  • Apache Struts: Don't Be The Next Equifax Recorded: Oct 5 2017 47 mins
    Oleg Kolesnikov, Director of Threat Research
    The cybersecurity world was shaken last week when it heard about Equifax which will likely turn into the largest data breach in history. Equifax has now officially confirmed that the vulnerability used to exploit the company’s Web server enabling malicious threat actor to steal data from over 143 million customers was the critical Apache Struts 2 Jakarta Multipart Parser Vulnerability (CVE-2017-5638).

    We will show you the actual attack that was used to breach Equifax in action. You will also learn how you can leverage user and big data security analytics to increase the chances of detecting such cyber attacks/data breaches at an early stage.

    We’ll cover:

    - A deep dive into the exact mechanisms that lead to the Equifax breach
    - How security analytics can help increase chances of early detection of such attacks
    - A simulation of the attack that was used attack Equifax
  • Securing Sensitive Data Against Insider-Based Attacks Recorded: Oct 3 2017 65 mins
    Shareth Ben, Director Insider Threat, Securonix & Eric Ogren, Senior Analyst, 451 Group
    Advanced cyber threats continue to grab headlines despite the plethora of security tools implemented by corporations. The reason is these attacks leverage insider threats - the often overlooked area that hackers use to get to sensitive data repositories. Detecting insider threat is a challenging proposition with the security tools currently deployed by most organizations, as these tools are unable to find attacks like misuse of credentials, privilege escalation, anomalous behavior and account compromise. Find out what is required to effectively detect insider attacks.

    In this webinar you will learn:
    - Why insider threat must be a C-level priority
    - What are the common indicators of an insider threat
    - How to deploy a UEBA solution to detect and prevent insider threats
    - Demo of real-world use case scenarios

    Presented by
    Shareth Ben,
    Director Insider Threat, Securonix

    Guest Speaker
    Eric Ogren,
    Senior Analyst, 451 Group
  • Equifax Breach and Managing Your Vulnerabilities Recorded: Sep 20 2017 62 mins
    Carl Wright (AttackIQ), Igor Baikalov (Securonix), Chris Petersen (LogRhythm), Sam Abadir (LockPath)
    With 143 million personally identifiable records stolen, the recent Equifax data breach is one of the largest and most damaging cyber-attacks to date. Hackers may have accessed highly valuable information, including our social security numbers, addresses, birth dates and credit card information.

    What can we do do contain the damage as consumers, as well as organizations? How can we move on from this breach?

    Join this interactive panel discussion with cyber security experts across the spectrum to hear their thoughts on:
    - The key takeaways consumers and enterprises should act on to protect against cyber scams and attacks related to this breach
    - Managing IT risk and vulnerabilities
    - How to improve breach prevention, detection and response
    - What to expect in the future

    Speakers:
    - Igor Baikalov, Chief Scientist, Securonix
    - Chris Petersen, CTO, SVP of R&D & Co-Founder, LogRhythm
    - Sam Abadir, Director of Product Management, LockPath

    Moderator:
    - Carl Wright, CRO, AttackIQ
  • Protecting Patient Privacy with Securonix User Behavior Analytics Recorded: Aug 23 2017 64 mins
    Ryan McDaniel, VP Security & Tech, HCI and Vidit Arora - Director Technology Enablement, Securonix
    Healthcare organizations today are struggling with manual audit and reporting of patient data access records. The process is time-consuming, and although it helps meeting compliance needs, it is ineffective in identifying real-threats. Securonix Patient Data Analytics solution offers a machine learning based solution to help organizations automatically establish a baseline for normal patient and employee activities and identify malicious patterns. The tool reduces manual effort, helps identify real threats, and assists with compliance reporting.

    We will cover:

    - Applying identity context and behavior analytics to EMR audit logs
    - Visualization, search and dashboard capabilities for investigation and reporting
    - Real world customer case studies highlighting improved threat detection and audit efficiency
    - Demo of the Securonix Patient data solution
  • SPARK On Hadoop Is The Next Gen SIEM Recorded: Jul 12 2017 64 mins
    Tanuj Gulati, CTO Securonix & David Monahan, Research Director EMA
    Today, 79% of security teams are overwhelmed with the volume of threat alerts they are receiving. Many of these SOC teams are forced into using decades old SIEM architectures to monitor their environments. The large alert volumes combined with the all too often requirement to manually prioritize alerts means 64% of critical tickets generated per day are not being worked leading to missed attacks, long incident response cycles and data breaches.

    In this webinar, you will learn
    · How Spark on Hadoop alleviates the security issues today
    · How a big data architecture enables distributed in-memory analytics on streaming data sets (up to 100x)
    · How Securonix SNYPR harnesses this revolutionary technology alongside industry standard Lambda architecture
    · The benefits of this architecture including real-time behavior & signature-less threat detection, powerful threat hunting capabilities
  • Transforming Advanced Cyber Threat Detection Using Machine Learning Recorded: Jun 21 2017 57 mins
    Darsh Balakrishnan & Joey Miller. Data Science Analysts
    The use of data science, machine learning, and autonomous behavior analysis is dramatically enhancing security teams' ability to detect and prevent advanced cyber threats today.

    In this webinar, you will go under the hood of the most sophisticated machine learning security analytics platform. Watch this webinar to learn:

    - How machine learning, active learning, and behavior profiling works
    - Application of data science to detect advanced cyber threats
    - Future directions for machine learning and security analytics
Security Analytics. Delivered
Securonix is your Next-Gen SIEM, leveraging a highly scalable open big data infrastructure stack to uncover sophisticated cyber-security threats to your organization.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Cloud Risk-Based Authentication To Prevent Password Based Attacks
  • Live at: Nov 15 2018 6:00 pm
  • Presented by: Sujay Doshi, Sr. SIEM Solution Engineer
  • From:
Your email has been sent.
or close