Webinars

TEN ISE Fireside Webinar: Community-Based Approach to Threat Hunting

When it comes to detecting continuously evolving threats, SOC teams that rely solely on their own threat hunting content are often at a disadvantage. In fact, many advanced threats can bypass preventative and detection controls, making SOC members work twice...
Read More

SWIFT Security: Monitoring Cyber Threats with Behavior Analytics

Effectively detecting and identifying fraudulent activities in a complex SWIFT environment requires a big data analytics platform that relies on machine learning algorithms and artificial intelligence – not on static rules. Thomas Harrington, Securonix Board of Advisor, CISO Citi (Retired),...
Read More

Search, Hunt, and Collaborate with Cloud Native SIEM in AWS

Securonix's new search capabilities leverage the power of Amazon Web Services (AWS) cloud-native and big data architecture to enable dynamic and long-term searches at a fraction of the cost without any performance impact. Join Nitin Agale, Senior Vice President, Product...
Read More

Detecting the Unknown Threats: An Identity-Driven Approach

With our perimeters expanding beyond the confines of the typical workspace, it has become increasingly evident and critical to monitor the threats posed using insider credentials. Regardless of whether the threats are accidental or intentional, they both ultimately lead to...
Read More

Protecting Against Insider Threat in 2020

In the past few years, Insider Threat has evolved in several aspects from how sensitive data leaves the organization to ways in which privilege access gets misused, creating risks for organizations to mitigate. The proliferation of cloud applications had made...
Read More

Defending the New Normal with Advanced Detection Logic

Organizations are experiencing a changing cyber threat landscape. Phishing and malware attacks are on a rise and more effective than ever before because of the fear factor and lack of in-person communication. Having a large workforce working remotely presents more...
Read More

The Healthcare CISO Journey through COVID-19

From PPE phishing scams to ransomware, to hacking attempts of DNS routers, to hospital supply chain risks, malicious actors are looking to take advantage of the crisis caused by the Covid-19 outbreak. Healthcare organizations worldwide have been through pandemic planning...
Read More

BI Analyst Briefing: Understanding Rising Cybersecurity Risks Due to Covid-19

Covid-19 is exposing enterprises to new security risks as more employees work from home. For companies that haven’t historically allowed work from home, this has forced a rapid change in business culture. This new work from home could mean unintentional...
Read More

Securing Your Remote Workforce: Monitoring Use Case Demo

We are facing a new normal in our corporate lives, with work from home becoming a necessity rather than a privilege. This change comes with its own set of cybersecurity challenges that security teams must deal with. Working remotely could...
Read More

Cyber Threat Briefing on Remote Workforce Challenges Amidst Covid-19

Today we are in the midst of a global health crisis, which is affecting every aspect of our lives. In these tough times, many organizations have resorted to working from home to keep their employees safe. However, this shift in...
Read More

Balancing Security On-Premises and In The Cloud

Digital transformation - we hear about it all the time, but what does it really mean for security? As organizations transition users, applications, workloads, and data from on-premises into the cloud to improve agility and competitiveness - how does that...
Read More

Scaling Security Operations in an Evolving Remote & Hybrid Cloud World

Recent world events have increased the vulnerability landscape and tested the security resiliency of enterprises. Not since the Icelandic volcano eruption in 2010 have we seen global events drive such profound changes to work behavior and employee mobility. As enterprises...
Read More