Speakers: Sanjay Raja, VP Product Marketing and Solutions
Antony Farrow, Sr Director of Solution Architecture
March 30, 2023, 11:00 AM PDT
In this webinar, we’ll cover how these areas are necessary for today’s Modern SOC and how organizations can achieve these improvements through their SIEM.
Speaker: Sanjay Raja, VP Product Marketing and Solutions
Apr 11 2023, 11:00 AM PT
Join this webinar, we will talk through:
– What XDR was meant to solve?
– How is the definition of XDR evolving? Including Traditional XDR and Open XDR
– What its real value is to the SOC, and
– Is XDR here to stay?
ON DEMAND WEBINARS
How Mature Behavior Analytics Accelerates Detection of Persistent Threats
In this webinar we’ll show you how a more integrated and mature approach to implementing UEBA can prevent damage to organizations.
Identity Analytics As a Cornerstone for Implementing Successful Zero Trust
In this webinar we’ll cover the following:
– How to baseline and understand current user access privileges and entitlements
– Common security gaps that can evade zero trust implementations
– Implementing identity analytics into your security operations for continuous monitoring of zero trust programs
Deep Dive into 2022 Gartner SIEM Critical Capabilities and Magic Quadrant
Join us for an interactive session with Antony Farrow, Sr Director of Solution Architecture, and Sanjay Raja, VP of Product Marketing and Solutions at Gurucul, where he will share detailed insights
Improving Contextual Analysis for Protecting Organizations from Insider Threats
In this session we will show you what is required to implement a new or improve an existing insider threat program. In addition, we will help you understand what sort of information and context you will need to better identify risks and accelerate the detection of insider threats before damage is done to your organization.
Insider Risk and Supply Chain Threats for Financial Services
The risks associated with insider threats grow with the more blatant recruitment of insiders via threat actor groups like Lapsus$, nation state recruitment efforts, the “Great Resignation” changing employee behaviors and the software supply chain extended to partners, third-party contractors, and consultants. Join us to know more.
Sifting Through the Noise: How to Modernize Today’s Security Operations
Join us, as we have an initial discussion on current challenges and gaps in today’s SOC operations, including making sense of the current SIEM and XDR market especially in the context of supporting hybrid cloud architectures.
Achieving Maximum Efficiencies and Outcomes Across Security Operations
Join Bryan Littlefair and Sanjay Raja for a fireside chat focusing on current challenges and gaps in today’s SOC operations. Subsequently, we will review strategies that can lessen the manual burden on SOC teams and improve response time, while optimizing current resources across all types of enterprise and government organizations.
Revolutionize SOC Operations with Improved Efficiencies and Automation
This webinar will discuss the emerging requirements that security leaders need to address and how they can tangibly reduce the risk of a breach in light of the challenges security operations teams face.
Lessons Learned from Operational Insider Threat Programs
Join Gurucul’s customer for a discussion on lessons learned operationalizing Insider Threat Programs. With proven strategies and tactics, organizations can get to the point where they are able to remediate insider threats in real-time or at least before data is exfiltrated.
How to Optimize SOC Operations with a Next-Gen SIEM
With endpoint, XDR and SIEM vendors all claiming superiority in the battle to thwart attackers, what remains the same is the lack of quality of data, superior analytics and confidence in automation leaving security teams to struggle. How can more than just minor improvements be made? This webinar will focus on the answers to those questions.
Determining Log4J’s Impact and Monitoring for Active Exploits
Our research team has broken down how Log4j works, but more importantly what you can do today to detect the vulnerabilities embedded in various systems, and whether they are actually being exploited in order to immediately begin remediation efforts.
Managed Security Services: Extracting More Value From Your SOC Platform
Attend this session to learn more about how to solve many of these challenges and drastically improve your security programs and margins over time.
Top Cyber Security Initiatives for 2022
This webinar looks forward into 2022 and beyond, and attempts to discern what adversaries SOC staff are facing. It delves into the psychology of these attacks, and how they are frequently perpetrated without our even knowing it.
How Dwell Time Is The #1 Enemy of the SOC
In this webinar we will look at the tactics and techniques that criminals use to get into the network and stay undetected. We’ll discuss the failures of detection technologies and what can be done to improve Mean Time To Detect (MTTD).
Cleaning House: Getting Rid of Malicious Insiders
Join us to explore how Gurucul’s Machine-Learning risk analytics platform can help you identify and remove malicious insiders before they generate a newsworthy incident.
Insider Threats – Advanced Analytics and Top Use Cases
Watch this webinar as we look at the main use cases in the Insider Threat space and how advanced analytics can help your organization mitigate the risk imposed by malicious insiders.
Risk Scoring – Bringing Meaning to Raw Data
Gurucul takes siloed, disparate, security data sources, analyzes them, and presents a unified risk score that Security Operations personnel can actually use. Join us to find out how we contextualize a sea of data to deliver usable information.
Automating Incident Response with Machine Learning
Join us as we explain how Gurucul’s Unified Risk and Security Analytics platform uses machine learning and AI to deliver advanced automated incident response.
The Value of an Analytics-Driven SIEM
Understand how leveraging AI and Machine Learning on massive volumes of data brings context to an otherwise siloed security picture.
The Future of Connected Devices: IoT Security
Watch this webinar to learn how Gurucul Behavior Analytics can weed out IoT anomalies since these devices perform a narrow set of functions that allow abnormalities to pop out.
Insider Threats Deep Dive: Case Studies for Advanced Analytics
Watch this webinar for an in-depth look at a couple of Insider Threat cases studies and how Advanced Behavioral Analytics can address the challenges posed by these pernicious threats.
Best Practices to Maximize the Benefits of Analytics-Driven SIEM
Gurucul has years of experience in the field implementing our cloud native analytics-driven SIEM in customer environments large and small, with extensive technology integrations as well as with limited data ingestion. The best practices are similar across the board whether you’re a large enterprise or a small hospital.
XDR Vs SIEM: Organizational Needs
Attendees will learn the fundamental differences between XDR and SIEM, the strengths and limitations of each approach, and how to utilize both real-time and saved data analytics to determine the security of your computing environment.
UEBA Explained: Using User & Entity Behavior Analytics to Stop Advanced Threats
Watch this webinar to learn how to manage risk and make risk-based decisions in a world where zero day threats can take down entire networks in seconds.
How to Leverage Automation for Security Policy Compliance
Watch this webinar to understand how Gurucul Unified Security and Risk Analytics offers real-time updates into behaviors that impact governance and compliance controls.
Drive Security Automation at Machine Speed
Watch this webinar to understand how Artificial Intelligence can drive security automation at Machine Speed.
The Three Pillars of Behavior: Identity, Access and Activity
Behavior is the leading threat indicator. Detecting and stopping insider threats and cybercriminals involves monitoring and linking three pillars of behavior.
Combat Phishing Attacks Using Modern Machine Learning Algorithms
Modern machine learning algorithms can detect the change in a user’s behavior from the moment the credentials are compromised. Detection can be tied to specific activities such as a series of failed login attempts, an atypical IP address or unusual activity in general.
Context is King: Real World Examples on Preventing Data Breaches
Watch this webinar for a review of some real world cases where contextual data was able to reveal an attack before it became a major data breach.
Aligning Security Analytics with MITRE ATT&CK for Threat Detection
Watch this webinar to learn how you can automate cyber defenses with machine learning models on big data.
AI Based Predictive Threat Hunting
Learn how pre-packaged threat hunting analytics can be used for both active and passive threat hunting capabilities. See how real-time contextual linking helps enrich threat hunting data.
Revolutionizing IAM Architecture with Machine Learning
Understand how machine learning improves IAM, and how Identity Analytics reduces the attack surface by radically reducing accounts and entitlements.
Join Gurucul for a conversation with our top data scientist about how we apply machine learning to the cybersecurity space. What models do we use? How do they work? What are the gotchas? What are the big wins?.
Detecting Malicious Traffic on your Network
Stay ahead of attackers with Network Traffic Analysis. Identify unknown network threats on network flows and packet data. Detect endpoint malware missed by software dependent on signatures and known patterns. Discover and report any unknown or unseen devices on the network.
SIEM Advanced Threat Detection
Advanced threat detection requires dynamic and proactive techniques powered by machine learning, artificial intelligence, and security analytics. Attend this webinar to learn how Gurucul’s beyond SIEM capabilities support advanced threat detection with risk prioritized alerts.
Securing Data with a Remote Workforce
Watch this webinar to find out how this free service can help you put advanced threat detection controls in place to identify users who are at risk from phishing attacks, detect users whose accounts may have been compromised, prevent data exfiltration, and more.
The Enemy Within: How Insider Threats Are Changing
As workforces go remote, new types of insider threats are cropping up. During Threatpost’s June webinar, a panel of experts including Saryu Nayyar, CEO at Gurucul; Craig Cooper, COO at Gurucul; and Theatpost Editors Lindsey O’Donnell Welch and Tara Seals, discussed how to detect and prevent today’s insider-based malicious activity.
Security Analytics Makes Zero Trust Possible
Watch the Zero Trust Security Webinar for an expert analysis on the unique role that security analytics and security automation plays in achieving a genuine zero trust environment.
Gurucul has invested significant R&D efforts to deliver Artificial Intelligence (AI) Driven Security Operations Center (SOC) automation. Attend this webinar to learn about our cutting-edge capabilities to help reduce Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR) to security incidents.
Best Practices for Implementing an Insider Threat Program
Watch this session for details on our best practice recommendations based on our experience. With proven strategies and tactics, organizations can get to the point where they are able to remediate insider threats in real-time or at least before data is exfiltrated.
Global Security Operations with a Remote Workforce
Watch this webinar to learn how AI-based advanced analytics serves as a force multiplier for remote SOC analysts. It can adapt seamlessly to the changing threat situation and empower the Security Operations team in the face of a brand new “normal.”
How to Build a Risk Based Authentication Program
Watch this webinar to learn how Gurucul’s Risk Based Authentication can help you streamline, optimize, and personalize your user and customer authentication experience.
Get Laser Focused with a Modern Analytics-Driven and Cloud Native SOC
Gurucul’s cloud native analytics-driven SIEM and UEBA provide cutting-edge contextual analytic capabilities that reduce MTTD & MTTR.
Super Bowl LII: Protecting Players and VIP Data
Super Bowl LII was held in Minneapolis, MN – the home of Allina Health. Allina needed to monitor Healthcare providers activities to detect unauthorized or rogue access to patient’s data, and to prevent PHI data exfiltration.