Scroll Top
Home » Resources » Webinars

Webinars – Resources for Cybersecurity and Insider Threat Detection

UPCOMING WEBINAR
Webinar-Eliminating SOC Challenges for Multi-Cloud and Hybrid Cloud Environments

Eliminating SOC Challenges for Multi-Cloud and Hybrid Cloud Environments

Speakers: Sanjay Raja, VP Product Marketing and Solutions | Antony Farrow, Sr Director of Solution Architecture

Mar 20 2024, 11:00 AM PT

Learn about the top challenges and best practices for empowering security operations teams to better monitor these environments and prevent attackers from successfully breaching these complex architectures.

ON DEMAND WEBINARS
Webinar-Zero to SIEM in Seconds

Zero to SIEM in Seconds

In this webinar, we’ll cover how these areas are necessary for today’s Modern SOC and how organizations can achieve these improvements through their SIEM.

Early Determination of Attack Risk with Behavioral and Identity Analytics

Early Determination of Attack Risk with Behavioral and Identity Analytics

In this webinar, we’ll explore how security teams can improve their threat detection and incident response plan with UEBA and Identity Analytics.

Enhancing Security Operations by Augmenting SIEM with Observability

Enhancing Security Operations by Augmenting SIEM with Observability

In this webinar, we will cover how security teams can extend the right SIEM for the Observability use cases.

SIEM Augmentation: It’s Time to Up Your SIEM Game

SIEM Augmentation: It’s Time to Up Your SIEM Game

In this webinar we’ll cover how you can improve your security operations efficiency by augmenting your SIEM to reduce dwell time. Learn more about the four pillars for augmenting your SIEM.

Predictions for 2024: Navigating New Cyber Security Challenges and Trends

Predictions for 2024: Navigating New Cyber Security Challenges and Trends

Come join us for this informative webinar that will help you prepare for the new year and new challenges to come.

Webinar-How Machine Learning is Leveraged for Attack Detection Scenarios

How Machine Learning is Leveraged for Attack Detection Scenarios

In this webinar, we will discuss how ML is used as part of Artificial intelligence (AI) and share how Gurucul uses adaptive and static ML models.

Webinar-How Contextual Risk Scoring Massively Reduces Security Operations Alert Volume

How Contextual Risk Scoring Reduces Attack Response Time

In this webinar we’ll cover how advanced risk scoring provides accuracy and confidence to guide security operations decisions. Gurucul’s risk scoring model takes a holistic approach for computing risk.

Webinar-Decrease the Complexity and Cost of SOC Operations with Improved Data Ingestion

Decrease the Complexity and Cost of SOC Operations with Improved Data Ingestion

This webinar will walk you through the advantages of Gurucul’s pipeline, demonstrating the creation and mapping of event data.

Webinar-Contextual-Vulnerability-Prioritization-Remediation-Across-the-Attack-Surface

Contextual Vulnerability Prioritization & Remediation Across the Attack Surface

In this demo we’ll show you how Gurucul can enrich your vulnerability scan results with telemetry across your entire attack surface.

Webinar-Threats From Within-A Programmatic Approach to Managing Insider Risk

Threats From Within: A Programmatic Approach to Managing Insider Risk

In this webinar, we provide research into trends, the challenges with identifying insider threats, and how technology, people and process must work together to ensure a successful program that goes beyond just security or IT.

Webinar-2023 Insider Threat Report Presenting the Survey Results

2023 Insider Threat Report: Presenting the Survey Results

Join us as we present the 2023 Insider Threat Report survey results. Viewers will gain a better understanding of the current state of cybersecurity and how organizations can better respond to the evolving insider risks in the cloud.

Webinar-Effective Hybrid Multi-Cloud Monitoring for the SOC

Effective Hybrid Multi-Cloud Monitoring for the SOC

In this webinar we’ll cover the challenges most SIEM providers have in supporting these architectures as well as what features are necessary to fully support the needs of security teams in monitoring for threats and preventing breaches.

Webinar-Zero Trust Begins with Identity Analytics and Ends with ITDR

Zero Trust Begins with Identity Analytics and Ends with ITDR

Identity analytics used in Zero Trust implementations can also be leveraged by SOC teams to incorporate Identity Threat Detection, Investigation and Response (ITDR) capabilities to thwart identity-based attacks.

Webinar-Improving Contextual Analysis for Protecting Organizations from Insider Threats

Improving Contextual Analysis for Protecting Organizations from Insider Threats

Dominion Energy discusses what is required to implement a new or improve an existing insider threat program. What context is needed to better identify risks and accelerate the detection of insider threats before damage is done to your organization?

Webinar-Top 4 Trends for the SOC

Top 4 Trends for the SOC

The Security Operations Center (SOC) is in a never-ending race to collect and analyze data to make better decisions. Many factors can positively or negatively impact their success. In this webinar, we’ll discuss four trends that are shaping the future of security operations.

Webinar-Is XDR a Long Term Solution

Is XDR a Long Term Solution?

Join this webinar, we will talk through:
– What XDR was meant to solve?
– How is the definition of XDR evolving? Including Traditional XDR and Open XDR
– What its real value is to the SOC, and
– Is XDR here to stay?

Webinar-How Mature Behavior Analytics Accelerates Detection of Persistent Threats

How Mature Behavior Analytics Accelerates Detection of Persistent Threats

In this webinar we’ll show you how a more integrated and mature approach to implementing UEBA can prevent damage to organizations.

Webinar-Identity Analytics As a Cornerstone for Implementing Successful Zero Trust

Identity Analytics As a Cornerstone for Implementing Successful Zero Trust

In this webinar we’ll cover how to baseline and understand current user access privileges and entitlements, the common security gaps that evade zero trust implementations, and how to implement identity analytics into your security operations.

Webinar-Deep Dive into 2022 Gartner SIEM Critical Capabilities and Magic Quadrant

Deep Dive into 2022 Gartner SIEM Critical Capabilities and Magic Quadrant

Join us for an interactive session with Antony Farrow, Sr Director of Solution Architecture, and Sanjay Raja, VP of Product Marketing and Solutions at Gurucul, where he will share detailed insights

Webinar-Insider Risk and Supply Chain Threats for Financial Services

Insider Risk and Supply Chain Threats for Financial Services

The risks associated with insider threats grow with the more blatant recruitment of insiders via threat actor groups like Lapsus$, nation state recruitment efforts, the “Great Resignation” changing employee behaviors and the extended supply chain.

Webinar-Sifting Through the Noise-How to Modernize Today’s Security Operations

Sifting Through the Noise: How to Modernize Today’s Security Operations

Join us, as we have an initial discussion on current challenges and gaps in today’s SOC operations, including making sense of the current SIEM and XDR market especially in the context of supporting hybrid cloud architectures.

Webinar-Achieving Maximum Efficiencies and Outcomes Across Security Operations

Achieving Maximum Efficiencies and Outcomes Across Security Operations

Join Bryan Littlefair and Sanjay Raja for a fireside chat focusing on current challenges and gaps in today’s SOC operations. Subsequently, we will review strategies that can lessen the manual burden on SOC teams and improve response time, while optimizing current resources across all types of enterprise and government organizations.

Webinar-Revolutionize SOC Operations with Improved Efficiencies and Automation

Revolutionize SOC Operations with Improved Efficiencies and Automation

This webinar will discuss the emerging requirements that security leaders need to address and how they can tangibly reduce the risk of a breach in light of the challenges security operations teams face.

Webinar-Lessons Learned from Operational Insider Threat ProgramsWebinar-Lessons Learned from Operational Insider Threat Programs

Lessons Learned from Operational Insider Threat Programs

Join Gurucul’s customer for a discussion on lessons learned operationalizing Insider Threat Programs. With proven strategies and tactics, organizations can get to the point where they are able to remediate insider threats in real-time or at least before data is exfiltrated.

Webinar-How to Optimize SOC Operations with a Next-Gen SIEM

How to Optimize SOC Operations with a Next-Gen SIEM

With endpoint, XDR and SIEM vendors all claiming superiority in the battle to thwart attackers, what remains the same is the lack of quality of data, superior analytics and confidence in automation leaving security teams to struggle. How can more than just minor improvements be made? This webinar will focus on the answers to those questions.

Log4J Webinar

Determining Log4J’s Impact and Monitoring for Active Exploits

Our research team has broken down how Log4j works, but more importantly what you can do today to detect the vulnerabilities embedded in various systems, and whether they are actually being exploited in order to immediately begin remediation efforts.

Webinar-Managed Security Services-Extracting More Value From Your SOC Platform

Managed Security Services: Extracting More Value From Your SOC Platform

Attend this session to learn more about how to solve many of these challenges and drastically improve your security programs and margins over time.

Webinar-Cyber-Security Initiatives 2022

Top Cyber Security Initiatives for 2022

This webinar looks forward into 2022 and beyond, and attempts to discern what adversaries SOC staff are facing. It delves into the psychology of these attacks, and how they are frequently perpetrated without our even knowing it.

Webinar-Dwell time How are attackers staying hidden for so long

How Dwell Time Is The #1 Enemy of the SOC

In this webinar we will look at the tactics and techniques that criminals use to get into the network and stay undetected. We’ll discuss the failures of detection technologies and what can be done to improve Mean Time To Detect (MTTD).

Webinar-Cleaning House-Getting Rid of Malicious Insiders

Cleaning House: Getting Rid of Malicious Insiders

Join us to explore how Gurucul’s Machine-Learning risk analytics platform can help you identify and remove malicious insiders before they generate a newsworthy incident.

Webinar-Insider Threats - Advanced Analytics and Top Use Cases

Insider Threats – Advanced Analytics and Top Use Cases

Watch this webinar as we look at the main use cases in the Insider Threat space and how advanced analytics can help your organization mitigate the risk imposed by malicious insiders.

Webinar-Risk Scoring - Bringing Meaning to Raw Data

Risk Scoring – Bringing Meaning to Raw Data

Gurucul takes siloed, disparate, security data sources, analyzes them, and presents a unified risk score that Security Operations personnel can actually use.  Join us to find out how we contextualize a sea of data to deliver usable information.

Webinar - Automating Incident Response with Machine Learning

Automating Incident Response with Machine Learning

Join us as we explain how Gurucul’s Unified Risk and Security Analytics platform uses machine learning and AI to deliver advanced automated incident response.

Webinar-The Value of an Analytics-Driven SIEM

The Value of an Analytics-Driven SIEM

Understand how leveraging AI and Machine Learning on massive volumes of data brings context to an otherwise siloed security picture.

The Future of Connected Devices: IoT Security

The Future of Connected Devices: IoT Security

Watch this webinar to learn how Gurucul Behavior Analytics can weed out IoT anomalies since these devices perform a narrow set of functions that allow abnormalities to pop out.

Webinar-Insider Threats Deep Dive-Case Studies for Advanced Analytics

Insider Threats Deep Dive: Case Studies for Advanced Analytics

Watch this webinar for an in-depth look at a couple of Insider Threat cases studies and how Advanced Behavioral Analytics can address the challenges posed by these pernicious threats.

Webinar-Best Practices to Maximize the Benefits of Analytics-Driven SIEM

Best Practices to Maximize the Benefits of Analytics-Driven SIEM

Gurucul has years of experience in the field implementing our cloud native analytics-driven SIEM in customer environments large and small, with extensive technology integrations as well as with limited data ingestion. The best practices are similar across the board whether you’re a large enterprise or a small hospital.

Webinar -XDR Vs SIEM Organizational Needs

XDR Vs SIEM: Organizational Needs

Attendees will learn the fundamental differences between XDR and SIEM, the strengths and limitations of each approach, and how to utilize both real-time and saved data analytics to determine the security of your computing environment.

Webinar-Using User & Entity Behavior Analytics to Stop Advanced Threats

UEBA Explained: Using User & Entity Behavior Analytics to Stop Advanced Threats

Watch this webinar to learn how to manage risk and make risk-based decisions in a world where zero day threats can take down entire networks in seconds.

Webinar-How to Leverage Automation for Security Policy Compliance

How to Leverage Automation for Security Policy Compliance

Watch this webinar to understand how Gurucul Unified Security and Risk Analytics offers real-time updates into behaviors that impact governance and compliance controls.

Webinar-Drive Security Automation at Machine Speed

Drive Security Automation at Machine Speed

Watch this webinar to understand how Artificial Intelligence can drive security automation at Machine Speed.

Webinar-The Three Pillars of Behavior_ Identity, Access and Activity

The Three Pillars of Behavior: Identity, Access and Activity

Behavior is the leading threat indicator. Detecting and stopping insider threats and cybercriminals involves monitoring and linking three pillars of behavior.

Webinar-Combat Phishing Attacks Using Modern Machine Learning Algorithms

Combat Phishing Attacks Using Modern Machine Learning Algorithms

Modern machine learning algorithms can detect the change in a user’s behavior from the moment the credentials are compromised. Detection can be tied to specific activities such as a series of failed login attempts, an atypical IP address or unusual activity in general.

Webinar-Context is King_Real World Examples on Preventing Data Breaches

Context is King: Real World Examples on Preventing Data Breaches

Watch this webinar for a review of some real world cases where contextual data was able to reveal an attack before it became a major data breach.

Webinar-Aligning Security Analytics with MITRE ATT&CK for Threat Detection

Aligning Security Analytics with MITRE ATT&CK for Threat Detection

Watch this webinar to learn how you can automate cyber defenses with machine learning models on big data.

Webinar-AI Based Predictive Threat Hunting

AI Based Predictive Threat Hunting

Learn how pre-packaged threat hunting analytics can be used for both active and passive threat hunting capabilities. See how real-time contextual linking helps enrich threat hunting data.

Webinar-Applied Machine Learning

Applied Machine Learning 101

Join Gurucul for a conversation with our top data scientist about how we apply machine learning to the cybersecurity space. What models do we use? How do they work? What are the gotchas? What are the big wins?.

Webinar-Detecting Malicious Traffic on your Network

Detecting Malicious Traffic on your Network

Stay ahead of attackers with Network Traffic Analysis. Identify unknown network threats on network flows and packet data. Detect endpoint malware missed by software dependent on signatures and known patterns. Discover and report any unknown or unseen devices on the network.

Webinar-SIEM Advanced Threat Detection

SIEM Advanced Threat Detection

Advanced threat detection requires dynamic and proactive techniques powered by machine learning, artificial intelligence, and security analytics. Attend this webinar to learn how Gurucul’s beyond SIEM capabilities support advanced threat detection with risk prioritized alerts.

Webinar-Revolutionizing IAM Architecture with Machine Learning

Revolutionizing IAM Architecture with Machine Learning

Understand how machine learning improves IAM, and how Identity Analytics reduces the attack surface by radically reducing accounts and entitlements.

Webinar-Securing Data with a Remote Workforce

Securing Data with a Remote Workforce

Watch this webinar to find out how this free service can help you put advanced threat detection controls in place to identify users who are at risk from phishing attacks, detect users whose accounts may have been compromised, prevent data exfiltration, and more.

Webinar-The Enemy Within-How Insider Threats Are Changing

The Enemy Within: How Insider Threats Are Changing

As workforces go remote, new types of insider threats are cropping up. During Threatpost’s June webinar, a panel of experts including Saryu Nayyar, CEO at Gurucul; Craig Cooper, COO at Gurucul; and Theatpost Editors Lindsey O’Donnell Welch and Tara Seals, discussed how to detect and prevent today’s insider-based malicious activity.

Webinar-Security Analytics Makes Zero Trust Possible

Security Analytics Makes Zero Trust Possible

Watch the Zero Trust Security Webinar for an expert analysis on the unique role that security analytics and security automation plays in achieving a genuine zero trust environment.

Webinar-AI Driven SOC Automation

AI Driven SOC Automation

Gurucul has invested significant R&D efforts to deliver Artificial Intelligence (AI) Driven Security Operations Center (SOC) automation. Attend this webinar to learn about our cutting-edge capabilities to help reduce Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR) to security incidents.

Webinar-Best Practices for Implementing an Insider Threat Program

Best Practices for Implementing an Insider Threat Program

Watch this session for details on our best practice recommendations based on our experience. With proven strategies and tactics, organizations can get to the point where they are able to remediate insider threats in real-time or at least before data is exfiltrated.

Webinar-Global Security Operations with a Remote Workforce

Global Security Operations with a Remote Workforce

Watch this webinar to learn how AI-based advanced analytics serves as a force multiplier for remote SOC analysts. It can adapt seamlessly to the changing threat situation and empower the Security Operations team in the face of a brand new “normal.”

Webinar-How to Build Risk Based Authentication Program

How to Build a Risk Based Authentication Program

Watch this webinar to learn how Gurucul’s Risk Based Authentication can help you streamline, optimize, and personalize your user and customer authentication experience.

Webinar-Get Laser Focused with a Modern Analytics-Driven and Cloud Native SOC

Get Laser Focused with a Modern Analytics-Driven and Cloud Native SOC

Gurucul’s cloud native analytics-driven SIEM and UEBA provide cutting-edge contextual analytic capabilities that reduce MTTD & MTTR.

Super Bowl LII Security and Allina Health

Super Bowl LII: Protecting Players and VIP Data

Super Bowl LII was held in Minneapolis, MN – the home of Allina Health. Allina needed to monitor Healthcare providers activities to detect unauthorized or rogue access to patient’s data, and to prevent PHI data exfiltration.

Share this page: