Webinars

UPCOMING WEBINAR
Improving Contextual Analysis for Protecting Organizations from Insider Threats

Improving Contextual Analysis for Protecting Organizations from Insider Threats

Dec 08 2022, 11:00 AM PT

Speakers: Robert A. Davidson VP, Insider Threat Manager at Dominion Energy & Sanjay Raja VP, Product Marketing and Solutions at Gurucul

In this session we will show you what is required to implement a new or improve an existing insider threat program. In addition, we will help you understand what sort of information and context you will need to better identify risks and accelerate the detection of insider threats before damage is done to your organization.

ON DEMAND WEBINARS
Webinar-Insider Risk and Supply Chain Threats for Financial Services

Insider Risk and Supply Chain Threats for Financial Services

The risks associated with insider threats grow with the more blatant recruitment of insiders via threat actor groups like Lapsus$, nation state recruitment efforts, the “Great Resignation” changing employee behaviors and the software supply chain extended to partners, third-party contractors, and consultants. Join us to know more.

Webinar-Sifting Through the Noise: How to Modernize Today's Security Operations

Sifting Through the Noise: How to Modernize Today’s Security Operations

Join us, as we have an initial discussion on current challenges and gaps in today’s SOC operations, including making sense of the current SIEM and XDR market especially in the context of supporting hybrid cloud architectures.

Webinar-How Mature Behavior Analytics Accelerates Detection of Persistent Threats

How Mature Behavior Analytics Accelerates Detection of Persistent Threats

In this webinar we’ll show you how a more integrated and mature approach to implementing UEBA can prevent damage to organizations.

Webinar-Identity Analytics As a Cornerstone for Implementing Successful Zero Trust

Identity Analytics As a Cornerstone for Implementing Successful Zero Trust

In this webinar we’ll cover the following:
– How to baseline and understand current user access privileges and entitlements
– Common security gaps that can evade zero trust implementations
– Implementing identity analytics into your security operations for continuous monitoring of zero trust programs

Webinar-Why You Need Next Generation SIEM for Advanced Threat Detection and Response

Why You Need Next Generation SIEM for Advanced Threat Detection and Response

Join Gurucul and guest speaker Allie Mellen, Analyst Serving Security & Risk Professionals at Forrester, for an interactive dialog on trends we are seeing in the SIEM market. We will focus on three major areas in this session: Visibility, Detection Gaps, and Cost.

Professional IT Engineers Working in System Control Center Full of Monitors and Servers. Supervisor Holds Laptop and Holds a Briefing. Possibly Government Agency Conducts Investigation.

Achieving Maximum Efficiencies and Outcomes Across Security Operations

Join Bryan Littlefair and Sanjay Raja for a fireside chat focusing on current challenges and gaps in today’s SOC operations. Subsequently, we will review strategies that can lessen the manual burden on SOC teams and improve response time, while optimizing current resources across all types of enterprise and government organizations.

Confident Male Data Scientist Works on Personal Computer Wearing a Headset in Big Infrastructure Control and Monitoring Room. Map Surveillance of People Walking on City Streets

Revolutionize SOC Operations with Improved Efficiencies and Automation

This webinar will discuss the emerging requirements that security leaders need to address and how they can tangibly reduce the risk of a breach in light of the challenges security operations teams face.

Webinar-Lessons Learned from Operational Insider Threat Programs

Lessons Learned from Operational Insider Threat Programs

Join Gurucul’s customer for a discussion on lessons learned operationalizing Insider Threat Programs. With proven strategies and tactics, organizations can get to the point where they are able to remediate insider threats in real-time or at least before data is exfiltrated.

Webinar-How-to-Optimize-SOC-Operations-with-a-Next-Gen-SIEM

How to Optimize SOC Operations with a Next-Gen SIEM

With endpoint, XDR and SIEM vendors all claiming superiority in the battle to thwart attackers, what remains the same is the lack of quality of data, superior analytics and confidence in automation leaving security teams to struggle. How can more than just minor improvements be made? This webinar will focus on the answers to those questions.

Log4J Webinar

Determining Log4J’s Impact and Monitoring for Active Exploits

Our research team has broken down how Log4j works, but more importantly what you can do today to detect the vulnerabilities embedded in various systems, and whether they are actually being exploited in order to immediately begin remediation efforts.

Webinar-Managed Security Services Extracting More Value From Your SOC Platform

Managed Security Services: Extracting More Value From Your SOC Platform

Attend this session to learn more about how to solve many of these challenges and drastically improve your security programs and margins over time.

Webinar - How to Detect Zero Day Attacks with an Analytics-Driven SIEM

How to Detect Zero Day Attacks with an Analytics-Driven SIEM

This webinar describes zero day attacks and provides examples of attacks that have had significant consequences to organizations.

Webinar - Cyber Security Initiatives 2022

Top Cyber Security Initiatives for 2022

This webinar looks forward into 2022 and beyond, and attempts to discern what adversaries SOC staff are facing. It delves into the psychology of these attacks, and how they are frequently perpetrated without our even knowing it.

Webinar-Dwell time How are attackers staying hidden for so long

How Dwell Time Is The #1 Enemy of the SOC

In this webinar we will look at the tactics and techniques that criminals use to get into the network and stay undetected. We’ll discuss the failures of detection technologies and what can be done to improve Mean Time To Detect (MTTD).

Webinar-Cleaning House-Getting Rid of Malicious Insiders

Cleaning House: Getting Rid of Malicious Insiders

Join us to explore how Gurucul’s Machine-Learning risk analytics platform can help you identify and remove malicious insiders before they generate a newsworthy incident.

Webinar - Biggest Breaches of 2021

Biggest Breaches of 2021

Attendees will learn:
1. The most prevalent types of attacks that have occurred in the last year.
2. The loss of systems and privacy data that resulted from these attacks.
3. How Gurucul can provide solutions that make identification and remediation of such threats a reality.

Webinar- New Year, Same Breaches

New Year, Same Breaches

Join us for a deep dive into the types of cyberattacks we’re seeing, how they are evolving, who is being targeted, and what you can do to detect and prevent them.

Insider Threats - Advanced Analytics and Top Use Cases

Insider Threats – Advanced Analytics and Top Use Cases

Watch this webinar as we look at the main use cases in the Insider Threat space and how advanced analytics can help your organization mitigate the risk imposed by malicious insiders.

Who Watches the Watchers

Quis Custodiet Ipsos Custodes (Who Watches the Watchers)?

Join us as we take a look at the Insider Threat problem from a different perspective. We’ll explore where the SOC sits in the picture, what could cause an analyst to turn to the dark side, and how to mitigate the risk.

Risk Scoring - Bringing Meaning to Raw Data

Risk Scoring – Bringing Meaning to Raw Data

Gurucul takes siloed, disparate, security data sources, analyzes them, and presents a unified risk score that Security Operations personnel can actually use.  Join us to find out how we contextualize a sea of data to deliver usable information.

Webinar - Automating Incident Response with Machine Learning

Automating Incident Response with Machine Learning

Join us as we explain how Gurucul’s Unified Risk and Security Analytics platform uses machine learning and AI to deliver advanced automated incident response.

Webinar-The Value of an Analytics-Driven SIEM

The Value of an Analytics-Driven SIEM

Understand how leveraging AI and Machine Learning on massive volumes of data brings context to an otherwise siloed security picture.

Securing Internet-Connected Devices in Healthcare Life Saving Technology

Securing Internet-Connected Devices in Healthcare

Watch this webinar on securing medical devices to understand how advanced behavior analytics detects anomalies associated with security risks that can threaten patient safety.

The Future of Connected Devices: IoT Security

The Future of Connected Devices: IoT Security

Watch this webinar to learn how Gurucul Behavior Analytics can weed out IoT anomalies since these devices perform a narrow set of functions that allow abnormalities to pop out.

Insider Threats-Deep Dive Case Studies for Advanced Analytics

Insider Threats Deep Dive: Case Studies for Advanced Analytics

Watch this webinar for an in-depth look at a couple of Insider Threat cases studies and how Advanced Behavioral Analytics can address the challenges posed by these pernicious threats.

Webinar-Best Practices to Maximize the Benefits of Analytics-Driven SIEM

Best Practices to Maximize the Benefits of Analytics-Driven SIEM

Gurucul has years of experience in the field implementing our cloud native analytics-driven SIEM in customer environments large and small, with extensive technology integrations as well as with limited data ingestion. The best practices are similar across the board whether you’re a large enterprise or a small hospital.

Webinar -XDR Vs SIEM Organizational Needs

XDR Vs SIEM: Organizational Needs

Attendees will learn the fundamental differences between XDR and SIEM, the strengths and limitations of each approach, and how to utilize both real-time and saved data analytics to determine the security of your computing environment.

Webinar-Risky Account Discovery and Cleanup

Risky Account Discovery and Cleanup

Reduce risk of orphan or dormant accounts being compromised or misused, identify orphan and dormant accounts automatically, and identify account owners or mark an account for review.

Webinar-Using User & Entity Behavior Analytics to Stop Advanced Threats

UEBA Explained: Using User & Entity Behavior Analytics to Stop Advanced Threats

Watch this webinar to learn how to manage risk and make risk-based decisions in a world where zero day threats can take down entire networks in seconds.

Webinar-Compliance Controls

How to Leverage Automation for Security Policy Compliance

Watch this webinar to understand how Gurucul Unified Security and Risk Analytics offers real-time updates into behaviors that impact governance and compliance controls.

Webinar-Security Automation

Drive Security Automation at Machine Speed

Watch this webinar to understand how Artificial Intelligence can drive security automation at Machine Speed.

Webinar-The Three Pillars of Behavior_ Identity, Access and Activity

The Three Pillars of Behavior: Identity, Access and Activity

Behavior is the leading threat indicator. Detecting and stopping insider threats and cybercriminals involves monitoring and linking three pillars of behavior.

Take Security Beyond-SIEM with Behavior Analytics

Take Security Beyond SIEM with Behavior Analytics

Watch this webinar to learn how machine learning based behavior analytics takes security beyond SIEM correlation rules and queries.

Combat Phishing

Combat Phishing Attacks Using Modern Machine Learning Algorithms

Modern machine learning algorithms can detect the change in a user’s behavior from the moment the credentials are compromised. Detection can be tied to specific activities such as a series of failed login attempts, an atypical IP address or unusual activity in general.

5 Indisputable Gaps in your Security Environment

5 Indisputable Gaps in your Security Environment

Even the most advanced security solutions have gaps. DLP, Firewalls, network monitoring – no solution is complete on its own. By leveraging the data and information you already have and analyzing it to build behavior profiles and look for anomalies, Gurucul is able to detect and stop cyber threats like never before.

access risks

Discover & Manage Access Risks in This Global Pandemic

Dealing with remote workers, a surge in temporary workers, headcount reductions, and a staggering demand for staff in some industries has radically impacted access controls across the board. Get actionable insights into your access risks by using ML and AI to perform identity analytics on employee and contractor access.

Webinar - 5 Star Ingredients

5 Star Ingredients for a Successful Unified Security & Risk Analytics Program

Join Gurucul for Taco Tuesday! It’s Cinco de Mayo and we’re serving up Margaritas and ingredients for successful Unified Security and Risk Analytics programs. Join this webinar to learn our secret recipe when it comes to detecting, predicting and preventing data breaches.

Webinar-Context is King_Real World Examples on Preventing Data Breaches

Context is King: Real World Examples on Preventing Data Breaches

Watch this webinar for a review of some real world cases where contextual data was able to reveal an attack before it became a major data breach.

Webinar - Insider Threat Pgm

Practical Advice to Uplevel your Insider Threat Program Today

What should you be doing from a security practitioner perspective? Gurucul has spent the last decade helping organizations globally to deter, predict, detect, and remediate insider risk. We share our experience as well as a framework we have used with large, global companies.

Webinar - 3rd party risk

Third Party Risk: Secure Remote Contractors with Complimentary Monitoring Service

Gurucul has recently made a free 30-day Remote Workforce Monitoring Service. Attend this webinar to find out how leveraging our unique offerings can radically change the way you secure third party contractors working remotely.

BrightTALK-MITRE

Aligning Security Analytics with MITRE ATT&CK for Threat Detection

Watch this webinar to learn how you can automate cyber defenses with machine learning models on big data.

Webinar-Using Data to Fuel Transformation Across the Business

Using Data to Fuel Transformation Across the Business

Machine learning based behavior analytics delivers the ability to aggregate, filter, correlate, link, and make sense of enormous volumes of disparate data feeds in real-time. Fuel your cybersecurity transformation with big data.

Webinar - Critical CISO Initiatives_ Lessons Learned from 2020

Critical CISO Initiatives: Lessons Learned from 2020

Position your organization for cybersecurity success in 2021:
• Automate SOC operations
• Monitor the remote workforce
• Get visibility into cloud applications and infrastructure
• Manage risk with data science

AI Based Predictive Threat Hunting

AI Based Predictive Threat Hunting

Learn how pre-packaged threat hunting analytics can be used for both active and passive threat hunting capabilities. See how real-time contextual linking helps enrich threat hunting data.

Revolutionizing IAM Architecture with Machine Learning

Revolutionizing IAM Architecture with Machine Learning

Understand how machine learning improves IAM, and how Identity Analytics reduces the attack surface by radically reducing accounts and entitlements.

Machine Learning 101

Applied Machine Learning 101

Join Gurucul for a conversation with our top data scientist about how we apply machine learning to the cybersecurity space. What models do we use? How do they work? What are the gotchas? What are the big wins?.

Detect Unknown Cyber Threats with Network Traffic Analysis

Detecting Malicious Traffic on your Network

Stay ahead of attackers with Network Traffic Analysis. Identify unknown network threats on network flows and packet data. Detect endpoint malware missed by software dependent on signatures and known patterns. Discover and report any unknown or unseen devices on the network.

Webinar-SIEM Advanced Threat Detection

SIEM Advanced Threat Detection

Advanced threat detection requires dynamic and proactive techniques powered by machine learning, artificial intelligence, and security analytics. Attend this webinar to learn how Gurucul’s beyond SIEM capabilities support advanced threat detection with risk prioritized alerts.

BLOG: Model Driven Security Orchestration Webinar

Model Driven Security Orchestration

Organizations need to be looking at Model-Driven Security Orchestration, where the security responses to emerging threats and attacks are automated and driven at machine speed. In this presentation, Kurt Lieber provides an overview of Aetna’s security orchestration program.

Secure Data with a Remote Workforce

Securing Data with a Remote Workforce

Watch this webinar to find out how this free service can help you put advanced threat detection controls in place to identify users who are at risk from phishing attacks, detect users whose accounts may have been compromised, prevent data exfiltration, and more.

Rise of Insider Threats

The Enemy Within: How Insider Threats Are Changing

As workforces go remote, new types of insider threats are cropping up. During Threatpost’s June webinar, a panel of experts including Saryu Nayyar, CEO at Gurucul; Craig Cooper, COO at Gurucul; and Theatpost Editors Lindsey O’Donnell Welch and Tara Seals, discussed how to detect and prevent today’s insider-based malicious activity.

Webinar-Zero Trust Possible

Security Analytics Makes Zero Trust Possible

Watch the Zero Trust Security Webinar for an expert analysis on the unique role that security analytics and security automation plays in achieving a genuine zero trust environment.

Webinar-Best Practices for Retiring your Legacy Kit

Best Practices for Retiring your Legacy Kit

Join us for a quick look at what’s involved in retiring old equipment and migrating to it’s replacement. We’ll also look at how security analytics can help show where the old iron may be adding unnecessary risk.

Webinar-AI Driven SOC Automation

AI Driven SOC Automation

Gurucul has invested significant R&D efforts to deliver Artificial Intelligence (AI) Driven Security Operations Center (SOC) automation. Attend this webinar to learn about our cutting-edge capabilities to help reduce Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR) to security incidents.

Best Practices for Implementing an Insider Threat Program

Best Practices for Implementing an Insider Threat Program

Watch this session for details on our best practice recommendations based on our experience. With proven strategies and tactics, organizations can get to the point where they are able to remediate insider threats in real-time or at least before data is exfiltrated.

Saving Dollars By Saving Hours

Saving Dollars By Saving Hours

Automating Security Operations Center (SOC) tasks is critical to saving analyst time. Your security analysts can dedicate more time analyzing high priority threats and less time on tedious tasks, improving threat detection and analyst productivity. Attend this session for more details.

Webinar-Build vs. Buy Why you should not build your own SIEM

Build vs. Buy: Why you should not build your own SIEM

This webinar explains why building your own isn’t a good idea. It describes how a commercial SIEM can keep you up to date on both threats and analytics.

Webinar-Cloud Native SIEM

The Benefits of a Cloud Native SIEM

This webinar looks at what defines a cloud native SIEM. It describes the characteristics of a cloud native SIEM and why organizations should consider this a keystone of their network protection.

Global Security Operations with a Remote Workforce

Global Security Operations with a Remote Workforce

Watch this webinar to learn how AI-based advanced analytics serves as a force multiplier for remote SOC analysts. It can adapt seamlessly to the changing threat situation and empower the Security Operations team in the face of a brand new “normal.”

Webinar-How to Build Risk Based Authentication Program

How to Build a Risk Based Authentication Program

Watch this webinar to learn how Gurucul’s Risk Based Authentication can help you streamline, optimize, and personalize your user and customer authentication experience.

Webinar-Get Laser Focused with a Modern Analytics-Driven and Cloud Native SOC

Get Laser Focused with a Modern Analytics-Driven and Cloud Native SOC

Gurucul’s cloud native analytics-driven SIEM and UEBA provide cutting-edge contextual analytic capabilities that reduce MTTD & MTTR.

Super Bowl LII Security and Allina Health

Super Bowl LII: Protecting Players and VIP Data

Super Bowl LII was held in Minneapolis, MN – the home of Allina Health. Allina needed to monitor Healthcare providers activities to detect unauthorized or rogue access to patient’s data, and to prevent PHI data exfiltration.

Share this page: