ON DEMAND WEBINARS
Stay ahead of attackers with Network Traffic Analysis. Identify unknown network threats on network flows and packet data. Detect endpoint malware missed by software dependent on signatures and known patterns. Discover and report any unknown or unseen devices on the network.
Phishing attacks are still one of the most common techniques used to compromise account credentials. Learn how modern machine learning algorithms can detect the change in a user’s behavior from the moment the credentials are compromised – to prevent data exfiltration.
Speaker: Craig Cooper, COO, Gurucul. Guest Speaker: Chase Cunningham, Principal Analyst, Forrester.
Get an expert analysis on the unique role that security analytics and security automation play in achieving a genuine Zero Trust environment.
Speaker: William Scandrett, CISO, Allina Health.
Super Bowl LII was held in Minneapolis, MN – the home of Allina Health. Allina needed to monitor Healthcare providers activities to detect unauthorized or rogue access to patient’s data, and to prevent PHI data exfiltration.
Speaker: Kurt Lieber, CISO, Aetna.
Organizations need to be looking at Model-Driven Security Orchestration, where the security responses to emerging threats and attacks are automated and driven at machine speed. In this presentation, Kurt Lieber provides an overview of Aetna’s security orchestration program.