Hi [[ session.user.profile.firstName ]]

Build an AI Analyst to Eliminate Phishing Burden

Organizations commonly have a security mailbox, enabling vigilant staff to report suspicious emails they receive. This process may be the last opportunity for defenders to detect phishing that slipped by their controls and prevent a possible breach. Unfortunately, the security mailbox can require a significant amount of staff resources to triage.

Join us to see how custom AI and automation can be your advantage.

We'll discuss how to:
- Bring human attention to critical events with custom AI you control
- Save time by automating human analysis tasks
- Perform automated actions, freeing staff time and increasing consistency
- Increase employee retention by eliminating tedious tasks
Recorded Aug 1 2018 62 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Evan Gaustad - Principal Engineer, Threat Detection
Presentation preview: Build an AI Analyst to Eliminate Phishing Burden

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Intelligent Security Automation (SOAR) Demo Recorded: Dec 6 2018 48 mins
    Monty Yao, Principal Engineer, LogicHub
    Join this live webinar to witness first-hand how LogicHub's Intelligent Security Automation platform helps automate key SOC use cases around alert triage and more. Leveraging machine learning and decision automation, you will see how LogicHub can automatically prioritize alerts and orchestrate repetitive tasks.

    In this demo, you will see:
    * How to build an automation playbook
    * How to apply machine learning operations
    * How to auto prioritize alerts
    * How to integrate with Splunk and other security solutions

    There will be a live Q&A session at the end to answer any questions.
  • Build an AI Analyst to Eliminate Phishing Burden Recorded: Aug 1 2018 62 mins
    Evan Gaustad - Principal Engineer, Threat Detection
    Organizations commonly have a security mailbox, enabling vigilant staff to report suspicious emails they receive. This process may be the last opportunity for defenders to detect phishing that slipped by their controls and prevent a possible breach. Unfortunately, the security mailbox can require a significant amount of staff resources to triage.

    Join us to see how custom AI and automation can be your advantage.

    We'll discuss how to:
    - Bring human attention to critical events with custom AI you control
    - Save time by automating human analysis tasks
    - Perform automated actions, freeing staff time and increasing consistency
    - Increase employee retention by eliminating tedious tasks
  • SOC Automation Case Study - Maricopa Community Colleges Recorded: Jun 14 2018 45 mins
    Rich Lang, Technical Director of IT Security, Maricopa Community Colleges
    Maricopa Community Colleges faced a common challenge - receiving too many suspicious login alerts from their G Suite. It was tedious and difficult to investigate every alert and they did not have the resources to manually follow up with every user to determine whether this was an actual attack on their systems.

    Faced with limited resources, the security team implemented advanced security automation to help them better detect and respond to attacks and alerts. Automation helped them improve their security posture, protect other applications and accounts from being compromised, and quickly notify the security team and users of malicious activity without having to add expensive additional headcount to their staff.

    Rich Lang, Technical Director of Information Technology Security will discuss how Maricopa Community Colleges used SOC automation to:
    * Automate analysis of each G Suite login alert
    * Incorporate end users into process to directly effect change
    * Send and receive automated SMS notifications from users
    * Protect against phishing attacks and secure user accounts
    * Prevent future breaches
    * Save the time equivalent of an entire FTE
  • Beyond Security Orchestration - The Urgent Need for Intelligent Automation Recorded: May 17 2018 49 mins
    Tom D'Aquino, Director of Security Solutions, LogicHub
    When it comes to security automation, you’re not limited to simple orchestration. Intelligent Automation can deliver the most value by removing the decision fatigue plaguing security analysts, allowing them to focus more effectively at stopping and resolving advanced threats.

    Join this webinar to see Intelligent Automation in action and gain insights into:
    * What is Intelligent Automation
    * Why Orchestration alone doesn’t solve analyst fatigue
    * Key capabilities of Intelligent Automation
    * Demos of working examples
    * Implementation best practices

    Go beyond simple orchestration. Prepare yourself for the future of security automation.
  • How to Secure GitHub with Automated Threat Detection Recorded: Apr 11 2018 51 mins
    Kumar Saurabh, CEO and Co-founder, LogicHub
    Your developers love managing their source code in GitHub. Whether this is crucial Intellectual Property, or critical applications that run your business, how do you ensure this source code isn’t being accessed by unauthorized actors?

    Introducing ThreatGPS for GitHub, a breakthrough in threat detection automation that starts providing a high quality alert feed in just a few clicks.

    Join this webinar to learn how you can easily automate threat detection for all GitHub repositories.

    We will cover the following:
    * Potential data leaks with GitHub, what to watch out for
    * Gaining 360 degree view of all GitHub audit events
    * Automating suspicious pattern detection
    * Finding repos left open to public by mistake
    * Creating automation that learns and improves over time

    This webinar will be led by Kumar Saurabh, CEO and Co-founder of LogicHub.
  • How to Automate Threat Hunting Recorded: Mar 29 2018 48 mins
    Kumar Saurabh, CEO and Co-founder, LogicHub
    Do you have security event data but not enough threat visibility?

    Learn how to use automation to turn your events into really high quality alerts.

    Join this webinar to gain insights into:

    * What is threat hunting automation
    * Prerequisites to get started
    * How to systematically explore events to build a decision engine
    * How to accurately determine suspicious bad, known bad, etc.
    * Examples of threat hunting automation playbooks

    Come learn how you can quickly reduce Dwell Times, False Positives, and False Negatives with security automation.
  • How to Automate Phishing Investigations Recorded: Mar 21 2018 40 mins
    Tom D’Aquino, Director of Security Solutions at LogicHub
    Get to Inbox Zero everyday with Automated Threat Ranking

    Do you struggle with getting too many phishing alerts? Does it take a long time to investigate and respond effectively?

    Join us for a special presentation to see how some of the most sophisticated security teams are applying automated threat ranking to phishing reports from their users and detection tools, helping them get to inbox zero every single day.

    Timely analysis and response is key to combating phishing threats while tracking and rewarding submissions helps keep submitters engaged and participating.

    Join this webinar to gain insight into:
    * The basics of Phishing investigations
    * What automation can and cannot accomplish
    * How to build the automation steps easily
    * Best practices from industry experts

    Learn how you can help make your phishing reporting initiative an asset that drives other security capabilities rather than a burden that exhausts your team!

    Speaker: Tom D’Aquino, Director of Security Solutions at LogicHub
  • How to get started with Security Automation and Orchestration Recorded: Feb 27 2018 47 mins
    Kumar Saurabh, CEO & Co-founder of LogicHub
    Security Automation can significantly improve investigations, reduce tedious busy work, and strengthen defenses. However, it is not always clear where to start, and which use cases to apply automation to.

    In this webinar, we will provide a primer and discuss best practices. Topics discussed will include:
    - What is security automation and orchestration?
    - Different automation models
    - Examples of how automation has helped others
    - Assessing your automation readiness
    - Steps to get started - picking your first use cases

    The discussion will be led by Kumar Saurabh, a 15 year veteran of Security Operations, and CEO & Co-founder of LogicHub.
Security Automation that Thinks
LogicHub is the industry’s most powerful automation platform for security operations, helping organizations dramatically accelerate every SecOps process from alert triage and incident response to threat hunting and detection.

Founded on a singular premise that every threat detection process can be automated, LogicHub empowers security analysts to be an order of magnitude more effective and productive.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Build an AI Analyst to Eliminate Phishing Burden
  • Live at: Aug 1 2018 5:00 pm
  • Presented by: Evan Gaustad - Principal Engineer, Threat Detection
  • From:
Your email has been sent.
or close