Webinars

Better Together: Fighting Modern Threats with XDR and SIEM

A new wave of security solutions called XDR – Extended Detection and Response - have taken the security market by storm. Is this what your organization need to detect and respond to today's and tomorrow's threats? According to Gartner, XDR...
Read More

Securing Identity - 1 Year Check-In

According to Verizon’s 2020 Data Breach Investigation Report (DBIR), over 80% of hacking-related breaches involved the use of lost or stolen credentials - and approximately 35% of all breaches were initiated due to weak or compromised credentials. Last year, we...
Read More

The Human Element in Applying AI to Detecting Cyber and Insider Threat

There’s a lot of hype around applying machine learning, cognitive learning, and artificial intelligence to detect security threats in an environment. While analytics capabilities have advanced, there are still practical limitations in applying AI, such as: Lack of data that...
Read More

TEN ISE Fireside Webinar: Community-Based Approach to Threat Hunting

When it comes to detecting continuously evolving threats, SOC teams that rely solely on their own threat hunting content are often at a disadvantage. In fact, many advanced threats can bypass preventative and detection controls, making SOC members work twice...
Read More

SWIFT Security: Monitoring Cyber Threats with Behavior Analytics

Effectively detecting and identifying fraudulent activities in a complex SWIFT environment requires a big data analytics platform that relies on machine learning algorithms and artificial intelligence – not on static rules. Thomas Harrington, Securonix Board of Advisor, CISO Citi (Retired),...
Read More

Search, Hunt, and Collaborate with Cloud Native SIEM in AWS

Securonix's new search capabilities leverage the power of Amazon Web Services (AWS) cloud-native and big data architecture to enable dynamic and long-term searches at a fraction of the cost without any performance impact. Join Nitin Agale, Senior Vice President, Product...
Read More

Detecting the Unknown Threats: An Identity-Driven Approach

With our perimeters expanding beyond the confines of the typical workspace, it has become increasingly evident and critical to monitor the threats posed using insider credentials. Regardless of whether the threats are accidental or intentional, they both ultimately lead to...
Read More

Protecting Against Insider Threat in 2020

In the past few years, Insider Threat has evolved in several aspects from how sensitive data leaves the organization to ways in which privilege access gets misused, creating risks for organizations to mitigate. The proliferation of cloud applications had made...
Read More

Defending the New Normal with Advanced Detection Logic

Organizations are experiencing a changing cyber threat landscape. Phishing and malware attacks are on a rise and more effective than ever before because of the fear factor and lack of in-person communication. Having a large workforce working remotely presents more...
Read More

The Healthcare CISO Journey through COVID-19

From PPE phishing scams to ransomware, to hacking attempts of DNS routers, to hospital supply chain risks, malicious actors are looking to take advantage of the crisis caused by the Covid-19 outbreak. Healthcare organizations worldwide have been through pandemic planning...
Read More

BI Analyst Briefing: Understanding Rising Cybersecurity Risks Due to Covid-19

Covid-19 is exposing enterprises to new security risks as more employees work from home. For companies that haven’t historically allowed work from home, this has forced a rapid change in business culture. This new work from home could mean unintentional...
Read More

Securing Your Remote Workforce: Monitoring Use Case Demo

We are facing a new normal in our corporate lives, with work from home becoming a necessity rather than a privilege. This change comes with its own set of cybersecurity challenges that security teams must deal with. Working remotely could...
Read More