Hi [[ session.user.profile.firstName ]]

Network Monitor & behavior analysis: Achieve real-time network visibility

When attackers compromise the perimeter or are operating from within, you need to know. You can only stop attackers from gaining a foothold in your network to expand their presence if you can see them. The indicators of a breach are often first observed within the network itself, therefore network monitoring and forensics plays an essential role in helping to detect, respond, and naturalise attacks.

In this webcast, Rob McGovern senior technical product manager at LogRhythm, will discuss how to quickly identify emerging threats in your IT environment using network monitoring and forensic tools.

You’ll learn:
• What Network Monitor is and the important role it plays in your security operations strategy
• Real-life use cases that highlight the power of Network Monitor
• How Network Monitor works with SIEM to reduce the mean-time-to-detect (MTTD) and mean-time-to-respond (MTTR) to cyber attacks

Register now to learn how monitoring your network can help you detect and investigate potential malicious behaviour within your IT environment.
Recorded Oct 5 2016 57 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Rob McGovern | Senior Technical Product Manager | LogRhythm
Presentation preview: Network Monitor & behavior analysis: Achieve real-time network visibility

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Trends in Cyber Attacks and Breaches Dec 11 2018 1:00 pm UTC 45 mins
    Steve Durbin, Managing Director, ISF LTD
    As the scale, sophistication, and targeting of cyber-attacks increase, organisations need to manage risk in ways beyond those traditionally handled by the information security function.

    In this webinar, Steve Durbin, Managing Director at the ISF will offer his insights into how security and business teams across the entire organisation can work together to minimise the impact of a breach, in order to protect organisations from damaging shareholder value and business reputation.

    About the presenter

    Steve Durbin is Managing Director of the Information Security Forum (ISF). His main areas of specialism include strategy, information technology, cybersecurity and the emerging security threat landscape across both the corporate and personal environments.
  • Security in the Golden Age of Cloud Oct 23 2018 12:00 pm UTC 45 mins
    Steve Durbin, Managing Director, ISF LTD
    Demand for cloud services continues to increase as the benefits of cloud services change the way organisation manage their data and use of IT.

    However, while these services can be implemented quickly and easily, with increased legislation and data privacy, the threat of cyber theft is on the increase and organisations must have a clear understanding of where their information is stored and how reliant these services are.

    In this webinar, Steve Durbin, Managing Director of the ISF will discuss the risks associated with cloud computing and how to manage them, as well as how to maximise the benefits.

    About the presenter

    Steve Durbin is Managing Director of the Information Security Forum (ISF). His main areas of specialism include strategy, information technology, cybersecurity and the emerging security threat landscape across both the corporate and personal environments.
  • Data Breach Prevention, Detection & Response Sep 18 2018 12:00 pm UTC 45 mins
    Steve Durbin, Managing Director, ISF LTD
    With the ever-increasing security threats to organisations, business leaders need to have a comprehensive data security strategy to protect themselves.

    In order to prevent, detect and respond to breaches, organisations must focus on the basics such as software updates and patches, as well as build awareness within the organisation to ensure employees are educated on cybersecurity best practices.

    In this webinar, Steve Durbin, Managing Director of the ISF will discuss what actions can be taken to prevent and detect a data breach, and how to respond to a breach in order to reduce damage to brand and reputation, as well as how to mitigate the impact of a breach.

    About the presenter

    Steve Durbin is Managing Director of the Information Security Forum (ISF). His main areas of specialism include strategy, information technology, cybersecurity and the emerging security threat landscape across both the corporate and personal environments.
  • [Webcam Panel] Trends Discussed at Black Hat 2018 Aug 15 2018 5:00 pm UTC 60 mins
    Panelists TBA
    Join this post-Black Hat panel as we look at the biggest trends and cyber threats covered during the Black Hat Conference 2018 in Las Vegas.

    Tune in for an interactive Q&A panel with industry experts across the security ecosystem as they discuss:
    - What are the biggest threats to security in 2018?
    - Key steps to take today to better secure your critical data assets
    - Top technological advancements powering security
    - CISO strategy in the age of breaches
  • [Webcam Panel] What to Expect at Black Hat 2018 Jul 31 2018 5:00 pm UTC 60 mins
    Panelists TBA
    Join this panel of industry experts as they share their experiences and thoughts on one of biggest security conferences in the world, Black Hat in Las Vegas, along with their expectations from this year's event.

    Tune in for an interactive Q&A panel with some of the biggest names in infosecurity to learn more about:
    - What can security professionals learn during Black Hat / DEF CON week
    - Must-attend events and why
    - What's new on the cyber threatscape
    - Advances in technology
    - AI: Hype vs Reality
    - Common sense advice for CISOs
    - How to keep your employees cyber safe
  • Threat Hunting - An Indepth Explaination Jul 23 2018 4:00 pm UTC 60 mins
    Lance James, Andrew Johnston and Ulf Mattsson
    Threat Hunting is a complicated and often misunderstood cybersecurity activity that if properly used can add tremendous value to your cybersecurity posture.

    In this session you will learn:
    What is Threat Hunting?
    When do I use it?
    What will it tell me?
    How do I use it?
  • Zero to Hero: Blissfully Ignorant to Risk Focused Jul 19 2018 9:00 pm UTC 60 mins
    Casey Reid, Principal Security Engineer, Tenable
    Innovation is the key to survival in today's Digital economy. Providing fresh content in new ways to broader markets is expanding the attack surface. The adoption of DevOps, cloud proliferation and enterprise IoT has added significant challenges to understanding your Cyber Risk.

    In this webinar Casey Reid, Principal Security Engineer at Tenable will talk about:
    - Why there no such thing as "Secure"
    - How the "Race to Zero" is killing your productivity and increasing your Cyber Risk
    - How "Chasing the Zero Day" could be a big waste of time
    - What it takes to be Risk focused: Going from Zero to Hero

    About the Speaker:
    Casey Reid is a Principal Security Engineer at Tenable, responsible for helping enterprise customers reduce their Cyber Exposure and strengthen their Vulnerability Management program. He is an energetic, outspoken, problem solver and hobby hacker with over 15 years of diverse technical experience. When he's not learning new technologies or hacking in his lab, he is competing at local CrossFit competitions and Obstacle Course Races such as the World's Toughest Mudder.
  • [Earn 1 CPE] Practical Steps to Scale Your Vendor Risk Management Program Jun 26 2018 5:00 pm UTC 75 mins
    Rebecca Herold. Panel: Jake Olcott, BitSight; Todd Boehler, ProcessUnity; Matt Kunkel, LogicGate; Scott Schneider, CyberGRX.
    As organizations rely on third parties to grow and thrive, they’re exposed to major cybersecurity risks. Mitigating this risk means confronting the potential security vulnerabilities that are present in your third party network, but traditional vendor risk management (VRM) methods are no match for modern threats. According to Deloitte 83% of today’s business leaders lack confidence in third party VRM processes.

    Join our panel of experts on this CPE accredited webinar to learn how your organization can create a VRM program that’s ready and able to stand up to today's third party threat landscape.

    Learning objectives:

    - Find out why traditional vendor risk management programs don’t work
    - Learn how to perform quantifiable vendor security analyses
    - Discover how to build a scalable VRM program
  • Building Trust and Security into the IoT Jun 14 2018 12:00 pm UTC 60 mins
    Gil Bernabeu, Technical Director, GlobalPlatform
    The IoT landscape is exploding, with predictions of more than 20 billion connected objects worldwide by 2020. But protecting and securing data, devices and services in this dynamic, ever- expanding landscape presents significant challenges. Many of today’s connected objects do more than simply provide information at your fingertips – they can make use of sensitive data, gather information and even impact the physical world. Because of this, there is a need for ubiquitous end-point security, regardless of the use case, to prevent devices from becoming a platform for attacks.

    To be able to trust today’s digital services and devices, the IoT ecosystem needs to be built on a proven security foundation. Years away, right?
    Wrong. GlobalPlatform Specifications are readily available to the IoT community today, to protect service providers, device manufacturers and consumers on the edge.

    In this presentation GlobalPlatform, will provide an overview of:
    - The increasingly urgent need for robust security in IoT objects and the principles that must be addressed if the IoT market is to fully evolve;
    - The value that GlobalPlatform specifications and frameworks deliver to IoT stakeholders to address their security and privacy concerns;
    - How GlobalPlatform’s new Device Trust Architecture framework empowers all actors in the value chain to seamlessly deliver, and securely manage, digital services and devices.
  • How IoT Expands Hackers Attack Surface Jun 13 2018 12:00 pm UTC 60 mins
    Amit Waisel, Senior Cybersecurity Engineer, XM Cyber
    How do hackers infiltrate organizations through IoT connected devices? What can be done to prevent the next attack via an IoT device? Why can a weakened link in the IoT chain lead to compromised digital assets? The Internet of Things (IoT) is bringing convenience to consumers and process optimization to businesses, but it comes at a cost. Exploding onto the IT scene and the consumer world, it has created endless opportunities for a super-connected environment. But IoT could also signal the next security crisis. IoT formed a rising tide of shadow IT and a new frontier to data security vulnerabilities, in an ever-expanding attack surface.

    By joining this webinar with XM Cyber’s Security Expert, Amit Waisel, you will learn about the perils of an expanding attack surface and what can be done to prevent an APT attack via an IoT connected device. We will dive into hard core questions including:
    - How an ever-expanding IoT attack surface is creating multiple opportunities for the perfect attack vector to digital assets
    - Why an innocent aquarium thermometer, defibrillator or printer is a possible gateway to disaster
    - Steps you can take to avoid a potential crisis

    About the Speaker
    Amit Waisel is a Senior cybersecurity Engineer at XM Cyber. He is a seasoned data security expert with vast experience in cyber offensive projects. Prior to XM Cyber, Amit filled multiple data security positions in the Israel intelligence Corps. He graduated from the Open University with a BSc. in Computer Science and is currently completing a MSc. degree in Computer Science at Tel Aviv University.
  • Inside the MIND of a Hacker – How a Lightbulb Almost Stopped Christmas Jun 13 2018 8:00 am UTC 60 mins
    Joseph Carson, Chief Security Scientist at Thycotic
    It is critically important to know how cyber criminals target their victims, what you can do to reduce the risk and make it more challenging for the attackers who steal your information, your identity or your money.

    This session explains how outside attackers or malicious insiders can exploit vulnerabilities using examples such as a compromised email account password that escalates into a full-blown breach of network security and how a light bulb almost stopped Christmas from happening.

    - This session describes the anatomy of a privileged account hack
    - The risks of introducing IoT for ease of use but sacrificing security
    - We will show how cybercriminals target their victims
    - What you can do to reduce your risk and prevent abuse of your critical information assets
  • What's Needed to Secure the IoT & IIoT Jun 12 2018 5:30 pm UTC 60 mins
    Mark Weatherford (vArmour) | Robert M. Lee (Dragos) | Jennifer Minella (Carolina Advanced Digital)
    Internet of Things devices are built with cost & convenience in mind, not security. This makes them easy targets for cybercriminals looking to exploit their vulnerabilities and infiltrate your systems. With IoT adoption on the rise, organizations are looking for ways to improve security at all levels and limit the damage IoT-powered cyber attacks can cause. The stakes are even higher for the Industrial Internet of Things (IIoT).

    Join this interactive Q&A panel with top security experts across the ecosystem to learn more about:
    - IoT as a gateway to your systems
    - Key factors for building a successful security strategy encompassing the IoT & IIoT
    - Threats targeting the IoT / IIoT
    - Industrial threat detection and response
    - Recommendations for improving security

    - Mark Weatherford, Chief Cybersecurity Strategist, vArmour
    - Robert M. Lee, CEO, Dragos
    - Jennifer Minella, VP of Engineering and Security, Carolina Advanced Digital
  • Security-Enabling Industrial IoT – What Are the Challenges? Jun 12 2018 12:00 pm UTC 60 mins
    Oliver Pfaff, Principal Key Expert at Siemens
    Security is an important aspect of IoT and especially Industrial IoT systems (short: IIoT). It is not yet fully championed as shown by a number of incidences which became publicly known.

    One particular facet of the IIoT security challenge is given by the fact that widely used security solutions from the IT domain cannot be just copied-and-pasted to IIoT – due to differences in given constraints and needs.

    Join this webinar presentation to learn more about:
    - The IIoT security challenge
    - In-depth look into the architectural approaches to IIoT Security
    - Emerging solutions, as well as standards for IIoT security

    About the Speaker:
    Oliver Pfaff is a Principal Key Expert at Siemens, serving the technology field IT-Security at Corporate Technology. Oliver’s work concerns security in distributed systems. Oliver‘s current projects address the security-enabling of Industrial Internet-of-Things as well as Operational Technology systems and products.
  • How to Better Secure the Internet of Vulnerable Things Jun 12 2018 10:00 am UTC 60 mins
    Joseph Carson (Thycotic) | Panelists TBA
    Discover the latest trends in cyber attacks targeting the Internet of Things and how to protect your connected devices and networks from cyber criminals.

    This CISO panel will explore in detail:
    - The top IoT vulnerabilities
    - The biggest cyber threats on the horizon
    - What keeps CISOs up at night
    - The best practices when it comes to building a resilient enterprise

    - Joseph Carson, Chief Security Scientist, Thycotic
    - Others TBA
  • How to Limit Damage from Cyber Attacks with BCDR & SDS Jun 7 2018 9:00 am UTC 45 mins
    Garry Carpenter
    Join us for this 45 minute webinar on 7th June at 10am UK that will ensure that your Business is Seamlessly Up and Running in Minutes. Understand how Ultimate Damage Limitation for Cyber-Attacks is Achieved through Business Continuity within Software-Defined Storage.

    Reasons to attend:

    Severity of cyber-attacks are judged by the length of time critical systems, data and applications are down. The ability to have a Business Continuity and Disaster Recovery enabled infrastructure mitigates the risk, offering zero downtime, zero Recovery Point Objective, and seamless rollback in time to the point before the attack hits.

    Joining the webinar equips you with 3 essential skills for damage limitation:

    Learn how to:

    * Implement multi layered protection that offers
    * Achieve additional resiliency with disaster recovery to the Cloud and 3rd Site
    * Rollback to the point immediately before the attack

    Your host for the meeting, Garry Carpenter has immersed himself in all things business continuity for the past few decades and is one of the leading UK authorities in the field.
  • Data Breaches, Identity & Security Jun 6 2018 12:00 pm UTC 60 mins
    Amar Singh (Cyber Management Alliance) | Barry Scott (Centrify) |
    Data breaches are on the rise, affecting millions of people around the world. With personal information exposed to cyber criminals and up for sale, the impact of a breach can continue to haunt its victims for months, and even years to come.

    Join top security experts for this interactive Q&A panel as they discuss:
    - The current (broken) state of security and the role identity plays in cyber-attacks
    - Zero trust framework: Guiding principles and paradigms
    - The massive rethink underway that redefines security to follow identity
    - What you can do today to adopt a Zero Trust model and reduce risk through the power of next-gen access
    - Recommendations for prevention of data breaches

    - Amar Singh, CEO & Founder, Wisdom of Crowds, Cyber Management Alliance
    - Barry Scott, CTO – EMEA, Centrify

    The session will be streamed LIVE from London from the Infosecurity Europe conference.
  • [Earn 1 CPE] Best Practices for GRC Implementation & Enterprise Security Jun 5 2018 5:00 pm UTC 75 mins
    Colin Whitaker, Moderator. Renee Murphy, Forrester; Viktor Culjak, ACL; Cameron Jackson, Riskonnect; Paul Davies, Avecto.
    In today’s world, implementing an effective GRC program is critical for every organization striving to secure the enterprise in an era of increasingly frequent and complex cyber threats. However, getting budget approval, organization buy-in and executing on a successful implementation can be daunting tasks to take on.

    Join our panel of experts on this CPE accredited webinar to discover some of the best practices for GRC Implementation and Enterprise Security in 2018.

    Qualifying participants will earn 1 CPE credit.

    Learning Objectives

    - Discover what it takes to successfully implement GRC at your organization by:
    - Unifying controls for IT risk and compliance.
    - Enabling IT governance by establishing accountability.
    - Aligning technology and processes for efficiency and consistency.
    - Learn how do you measure the cost and ROI of an implementation, so that you can present the case to management.
    - Identify the maturity and design of your GRC program, and plan on an appropriate GRC implementation given your current state.
  • [Ep.13] Founders Spotlight: Paul Kurtz, Co-founder & CEO of TruSTAR Jun 5 2018 5:00 pm UTC 45 mins
    Paul Kurtz, Co-founder & CEO of TruSTAR
    This webinar is part of BrightTALK's Founders Spotlight Series, where each week we feature inspiring founders and entrepreneurs from across industries.

    In this episode, Paul Kurtz, an internationally recognized expert on cybersecurity and the co-founder and CEO of TruSTAR Technology, will share his insight and expertise into the threat intelligence and security industry.
    - What it means to found and run a security start up
    - Where is the industry headed in the age of cyber attacks and high-profile breaches
    - How to scale and grow a business in this hi-tech industry

    Paul will be taking questions from the live audience so this session will be an excellent opportunity for any entrepreneurs or security professionals out there to have their questions answered.

    About the Speaker:
    Paul began working on cybersecurity at the White House in the late 1990s. He served in senior positions relating to critical infrastructure and counterterrorism on the White House's National Security and Homeland Security Councils under Presidents Clinton and Bush. After leaving government, Paul has held numerous private sector cybersecurity positions including founding the Cyber Security Industry Alliance (Acquired by Tech America), Executive Director of SAFECode, Managing Partner of Good Harbor Consulting in Abu Dhabi, and CISO of CyberPoint International.

    Paul’s work in intelligence analysis, counterterrorism, critical infrastructure protection, and non-proliferation of weapons of mass destruction influenced his approach to cybersecurity. Specifically, the fields highlighted the need to build an exchange platform which addresses barriers to sharing information--bureaucratic, legal, and market risk and concerns--while providing immediate value to operators defending networks.
  • Securing the Transforming Industrial Environment May 29 2018 9:00 am UTC 60 mins
    Ronen Shpirer, Security Solutions Architect, Fortinet
    IoT, IIoT, OT... It is likely that for many of us these acronyms are confusing. The fact is that traditional industrial environments, such as utilities and production, have started a digital transformation process which harness these and other technologies to become more efficient, automated and competitive.

    Within this transformation from a well-defined and well-controlled industrial ecosystem to a dynamic and open one, lurks a shift in the security challenges, needs and solutions/architecture.

    This session will focus on the technologies and challenges digital transformation introduces in industrial environments and how Fortinet’s Security Fabric is deployed in such an environments to provide the required security infrastructure and posture, including demonstration of some simplified use cases.
  • The Role of the DPO May 29 2018 7:00 am UTC 60 mins
    Tarun Samtani, Group DPO for Vectura Group Plc, & SkyePharma
    For many organisations, it will be a legal requirement to have a Data Protection Officer. Even if you may not have a legal requirement, it will be useful to have a person responsible for Data Protection.

    Join this presentation to learn more about:
    - Challenges faced by organisations on deciding whether they should have a DPO
    - How to choose a DPO (full time or consultant)
    - The expectations from the role
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Network Monitor & behavior analysis: Achieve real-time network visibility
  • Live at: Oct 5 2016 1:00 pm
  • Presented by: Rob McGovern | Senior Technical Product Manager | LogRhythm
  • From:
Your email has been sent.
or close