Webinars

MITRE ATT&CK: Take Your SIEM and Insider Threat Detection to the Next Level

The MITRE ATT&CK framework is seeing rapid adoption across security teams. In this webinar, you'll learn key insights into how you can better leverage the MITRE ATT&CK framework from a SIEM and insider threat/user and entity behavior analytics (UEBA) perspective....
Read More

Surfing a Tsunami: How SOAR Keeps Security Operations Ahead of Human Limitations

Join Joseph Loomis, Founder and CSO of CyberSponse, and Jon Garside, Director of Product Marketing at Securonix, as they discuss the evolving threat landscape in an increasingly common hybrid cloud enterprise environment. Discover how analytics-driven security automation lowers mean time...
Register

Modernizing Your SOC: Lessons Learned with AmerisourceBergen

When it comes to taking your data from you, cyber criminals never rest. If they can’t get in one way, they'll try another. A sound Security Operations Center (SOC) - staffed by the right people and with the right tools...
Register

Threat Hunting With Modern SIEM

Cyber threats today are advanced and complex. Even with the best analytics, threats may not be fully uncovered. Cyber threat hunting enables you to investigate the indicators of compromise to get full visibility and context around the threat so you...
Register

Must-Have Capabilities for a Next-Gen SIEM in 2019

The security monitoring and SIEM space is finally going through a much needed evolution to address with the growing volume of cyberattacks and data breaches. The increase in data volume and complexity and extreme shortage of skilled resources necessities innovation...
Register

Combat Phishing Attacks in Healthcare Using Next-Gen SIEM

Phishing attacks continue to be a significant threat for companies. This is especially true for highly-regulated industries such as healthcare, where phishing attacks often target sensitive patient data or valuable intellectual property. It is vital to understand what healthcare companies...
Register

Securonix Threat Research: Detecting LockerGoga Cyber Sabotage/Ransomware

Recently the Securonix Threat Research team published its report focused on the LockerGoga targeted attack that impacted Norsk Hydro (one of the largest aluminum companies worldwide), Hexion/Momentive (a chemical manufacturer), and other companies’ IT and operational technology (OT) infrastructure, causing...
Register

Taking SIEM to the Cloud: A SANS Review of Securonix Next-Gen SIEM

Today's security operations teams drown in data from security event management tools and platforms, yet investigators and threat hunters need better tools and capabilities to see behavioral trends and specific events in large environments. Is there a solution to this...
Register

Threat Research: Detecting Cloud Infrastructure Attacks

As organizations have adopted cloud-first IT strategies, the cyberthreat landscape has shifted as well. In recent months, the Securonix Threat Research team has been observing an increase in the number of automated attacks targeting exposed cloud infrastructure, Hadoop and YARN...
Register

Looking Ahead – Cybersecurity Predictions for 2019

2018 was a landmark year from a cybersecurity perspective. We saw another set of very large and high profile cybersecurity incidents. Financial organizations and systems were hit with attacks such as KRONOS/Osiris banking trojan, millions of dollars siphoned off through...
Register

Cloud Risk-Based Authentication To Prevent Password Based Attacks

Gaining unauthorized access to internal systems is one of the top mechanisms employed by hackers. Access control systems, however, are not yet equipped with the advanced analytics needed to detect the sophisticated techniques used by hackers. By integrating your SIEM...
Register

Kerberoasting Attack Detection For SOC Analysts

"Kerberoasting" is one of the advanced techniques currently in use by hackers to compromise weak service accounts in an Active Directory environment. This webinar by the Securonix Threat Research team will take a deep dive into this attack. We will...
Register