Webinars

Threat Hunting With Modern SIEM

Cyber threats today are advanced and complex. Even with the best analytics, threats may not be fully uncovered. Cyber threat hunting enables you to investigate the indicators of compromise to get full visibility and context around the threat so you...
Register

Must-Have Capabilities for a Next-Gen SIEM in 2019

The security monitoring and SIEM space is finally going through a much needed evolution to address with the growing volume of cyberattacks and data breaches. The increase in data volume and complexity and extreme shortage of skilled resources necessities innovation...
Register

Combat Phishing Attacks in Healthcare Using Next-Gen SIEM

Phishing attacks continue to be a significant threat for companies. This is especially true for highly-regulated industries such as healthcare, where phishing attacks often target sensitive patient data or valuable intellectual property. It is vital to understand what healthcare companies...
Register

Securonix Threat Research: Detecting LockerGoga Cyber Sabotage/Ransomware

Recently the Securonix Threat Research team published its report focused on the LockerGoga targeted attack that impacted Norsk Hydro (one of the largest aluminum companies worldwide), Hexion/Momentive (a chemical manufacturer), and other companies’ IT and operational technology (OT) infrastructure, causing...
Register

Taking SIEM to the Cloud: A SANS Review of Securonix Next-Gen SIEM

Today's security operations teams drown in data from security event management tools and platforms, yet investigators and threat hunters need better tools and capabilities to see behavioral trends and specific events in large environments. Is there a solution to this...
Register

Threat Research: Detecting Cloud Infrastructure Attacks

As organizations have adopted cloud-first IT strategies, the cyberthreat landscape has shifted as well. In recent months, the Securonix Threat Research team has been observing an increase in the number of automated attacks targeting exposed cloud infrastructure, Hadoop and YARN...
Register

Looking Ahead – Cybersecurity Predictions for 2019

2018 was a landmark year from a cybersecurity perspective. We saw another set of very large and high profile cybersecurity incidents. Financial organizations and systems were hit with attacks such as KRONOS/Osiris banking trojan, millions of dollars siphoned off through...
Register

Cloud Risk-Based Authentication To Prevent Password Based Attacks

Gaining unauthorized access to internal systems is one of the top mechanisms employed by hackers. Access control systems, however, are not yet equipped with the advanced analytics needed to detect the sophisticated techniques used by hackers. By integrating your SIEM...
Register

Kerberoasting Attack Detection For SOC Analysts

"Kerberoasting" is one of the advanced techniques currently in use by hackers to compromise weak service accounts in an Active Directory environment. This webinar by the Securonix Threat Research team will take a deep dive into this attack. We will...
Register

Under The Hood: Effective Threat Hunting For The SOC Analyst

The modern SOC cannot afford to rely just on cyberthreat detection to stay ahead of sophisticated hackers and advanced attacks. Threat hunting - the proactive approach to root out attacks coming from within is an extremely valuable complement to even...
Register

Security Threat Research: New Real-World Attacks Update

Join this webinar to learn about the latest threats and attack techniques that the Securonix Threat Research team is seeing in the wild. You will also learn how you can leverage user and big data security analytics to increase the...
Register

Cloud Security Monitoring and Analytics for the New Age

Organizations are adopting cloud first strategies motivated by strong business drivers that include cost efficiency, faster time to market, and increased agility to respond to market requirements. As this trend continues, the security of infrastructure and data in the cloud...
Register