Webinars

Cloud Risk-Based Authentication To Prevent Password Based Attacks

November 15, 2018  /  10:00 AM PT, afterwards on demand Gaining unauthorized access to internal systems is one of the top mechanisms employed by hackers. Access control systems, however, are not yet equipped with the advanced analytics needed to detect...
Read More

Kerberoasting Attack Detection For SOC Analysts

November 12, 2018  /  10:00 AM PT, afterwards on demand "Kerberoasting" is one of the advanced techniques currently in use by hackers to compromise weak service accounts in an Active Directory environment. This webinar by the Securonix Threat Research team...
Read More

Under The Hood: Effective Threat Hunting For The SOC Analyst

August 22, 2018  /  10:00 AM PST or after on demand The modern SOC cannot afford to rely just on cyberthreat detection to stay ahead of sophisticated hackers and advanced attacks. Threat hunting - the proactive approach to root out...
Register

Security Threat Research: New Real-World Attacks Update

June 26 2018  /  10AM PST or after on demand Join this webinar to learn about the latest threats and attack techniques that the Securonix Threat Research team is seeing in the wild. You will also learn how you can...
Register

Cloud Security Monitoring and Analytics for the New Age

May 16, 2018  /  10AM PST or after on demand Organizations are adopting cloud first strategies motivated by strong business drivers that include cost efficiency, faster time to market, and increased agility to respond to market requirements. As this trend...
Register

Defining UEBA in 2018!

March 26, 2018  /  10AM PST or after on demand As advanced threats and data breaches continue to grow, many Security vendors are claiming to have about user and entity behavior (UEBA) capabilities to combat such threats. SOC analyst, IR...
Register

Insider Threats: Best Practices For Detecting And Preventing An Attack

February 22, 2018 Insider Threats are the biggest cybersecurity threat vector in today's open environment. With organizational perimeters gone and sensitive digital data accessible across devices, personnel and geographies, ensuring a data breach does not occur is a formidable challenge....
Register

Seamlessly Replace Your Legacy SIEM

Nov 30, 2017   /   10:00 am There is a fundamental shift well underway in the SIEM/Security Management market. Legacy SIEM products designed, built and introduced 15-20 years ago are quickly falling out of favor - a fact painfully obvious in...
Register

Apache Struts – Don’t Be The Next Equifax

Oct 05, 2017   /  10:00 AM PST or after on demand The cybersecurity world was shaken last week when it heard about Equifax which will likely turn into the largest data breach in history. The reality is that the various...
Register

Complexities Of Securing Data Against Insider-Based Attacks

Oct 03, 2017  /  10:00 AM PST or after on demand Advanced cyber threats continue to grab headlines despite the plethora of security tools implemented by corporations. The reason is these attacks leverage insider threats - the often overlooked area...
Register

Protecting Patient Privacy With Securonix UEBA

Aug 23, 2017  /  10:00 AM PST or after on demand Healthcare organizations today are struggling with manual audit and reporting of patient data access records. The process is time-consuming, and although it helps meeting compliance needs, it is ineffective...
Register

Spark On Hadoop Is The Next Gen SIEM

Jul 12, 2017  /  10:00 AM PST or after on demand Today, 79% of security teams are overwhelmed with the volume of threat alerts they are receiving. Many of these SOC teams are forced into using decades old SIEM architectures...
Register