Sanjay Raja, Solutions Architect, VP Product Marketing and Solutions
Antony Farrow, Sr Director of Solution Architecture
Dec 05 2023, 11:00 AM
In this webinar, we’ll cover how these areas are necessary for today’s Modern SOC and how organizations can achieve these improvements through their SIEM.
ON DEMAND WEBINARS
In this webinar we’ll cover how you can improve your security operations efficiency by augmenting your SIEM to reduce dwell time. Learn more about the four pillars for augmenting your SIEM.
In this webinar, we will discuss how ML is used as part of Artificial intelligence (AI) and share how Gurucul uses adaptive and static ML models.
In this webinar we’ll cover how advanced risk scoring provides accuracy and confidence to guide security operations decisions. Gurucul’s risk scoring model takes a holistic approach for computing risk.
This webinar will walk you through the advantages of Gurucul’s pipeline, demonstrating the creation and mapping of event data.
In this demo we’ll show you how Gurucul can enrich your vulnerability scan results with telemetry across your entire attack surface.
In this webinar, we provide research into trends, the challenges with identifying insider threats, and how technology, people and process must work together to ensure a successful program that goes beyond just security or IT.
Join us as we present the 2023 Insider Threat Report survey results. Viewers will gain a better understanding of the current state of cybersecurity and how organizations can better respond to the evolving insider risks in the cloud.
In this webinar, we’ll explore how security teams can improve their threat detection and incident response plan with UEBA and Identity Analytics.
In this webinar we’ll cover the challenges most SIEM providers have in supporting these architectures as well as what features are necessary to fully support the needs of security teams in monitoring for threats and preventing breaches.
Identity analytics used in Zero Trust implementations can also be leveraged by SOC teams to incorporate Identity Threat Detection, Investigation and Response (ITDR) capabilities to thwart identity-based attacks.
Dominion Energy discusses what is required to implement a new or improve an existing insider threat program. What context is needed to better identify risks and accelerate the detection of insider threats before damage is done to your organization?
The Security Operations Center (SOC) is in a never-ending race to collect and analyze data to make better decisions. Many factors can positively or negatively impact their success. In this webinar, we’ll discuss four trends that are shaping the future of security operations.
Join this webinar, we will talk through:
– What XDR was meant to solve?
– How is the definition of XDR evolving? Including Traditional XDR and Open XDR
– What its real value is to the SOC, and
– Is XDR here to stay?
In this webinar we’ll show you how a more integrated and mature approach to implementing UEBA can prevent damage to organizations.
In this webinar we’ll cover how to baseline and understand current user access privileges and entitlements, the common security gaps that evade zero trust implementations, and how to implement identity analytics into your security operations.
Join us for an interactive session with Antony Farrow, Sr Director of Solution Architecture, and Sanjay Raja, VP of Product Marketing and Solutions at Gurucul, where he will share detailed insights
The risks associated with insider threats grow with the more blatant recruitment of insiders via threat actor groups like Lapsus$, nation state recruitment efforts, the “Great Resignation” changing employee behaviors and the extended supply chain.
Join us, as we have an initial discussion on current challenges and gaps in today’s SOC operations, including making sense of the current SIEM and XDR market especially in the context of supporting hybrid cloud architectures.
Join Bryan Littlefair and Sanjay Raja for a fireside chat focusing on current challenges and gaps in today’s SOC operations. Subsequently, we will review strategies that can lessen the manual burden on SOC teams and improve response time, while optimizing current resources across all types of enterprise and government organizations.
This webinar will discuss the emerging requirements that security leaders need to address and how they can tangibly reduce the risk of a breach in light of the challenges security operations teams face.
Join Gurucul’s customer for a discussion on lessons learned operationalizing Insider Threat Programs. With proven strategies and tactics, organizations can get to the point where they are able to remediate insider threats in real-time or at least before data is exfiltrated.
With endpoint, XDR and SIEM vendors all claiming superiority in the battle to thwart attackers, what remains the same is the lack of quality of data, superior analytics and confidence in automation leaving security teams to struggle. How can more than just minor improvements be made? This webinar will focus on the answers to those questions.
Our research team has broken down how Log4j works, but more importantly what you can do today to detect the vulnerabilities embedded in various systems, and whether they are actually being exploited in order to immediately begin remediation efforts.
Attend this session to learn more about how to solve many of these challenges and drastically improve your security programs and margins over time.
This webinar looks forward into 2022 and beyond, and attempts to discern what adversaries SOC staff are facing. It delves into the psychology of these attacks, and how they are frequently perpetrated without our even knowing it.
In this webinar we will look at the tactics and techniques that criminals use to get into the network and stay undetected. We’ll discuss the failures of detection technologies and what can be done to improve Mean Time To Detect (MTTD).
Join us to explore how Gurucul’s Machine-Learning risk analytics platform can help you identify and remove malicious insiders before they generate a newsworthy incident.
Watch this webinar as we look at the main use cases in the Insider Threat space and how advanced analytics can help your organization mitigate the risk imposed by malicious insiders.
Gurucul takes siloed, disparate, security data sources, analyzes them, and presents a unified risk score that Security Operations personnel can actually use. Join us to find out how we contextualize a sea of data to deliver usable information.
Join us as we explain how Gurucul’s Unified Risk and Security Analytics platform uses machine learning and AI to deliver advanced automated incident response.
Watch this webinar to learn how Gurucul Behavior Analytics can weed out IoT anomalies since these devices perform a narrow set of functions that allow abnormalities to pop out.
Watch this webinar for an in-depth look at a couple of Insider Threat cases studies and how Advanced Behavioral Analytics can address the challenges posed by these pernicious threats.
Gurucul has years of experience in the field implementing our cloud native analytics-driven SIEM in customer environments large and small, with extensive technology integrations as well as with limited data ingestion. The best practices are similar across the board whether you’re a large enterprise or a small hospital.
Attendees will learn the fundamental differences between XDR and SIEM, the strengths and limitations of each approach, and how to utilize both real-time and saved data analytics to determine the security of your computing environment.
UEBA Explained: Using User & Entity Behavior Analytics to Stop Advanced Threats
Watch this webinar to learn how to manage risk and make risk-based decisions in a world where zero day threats can take down entire networks in seconds.
Watch this webinar to understand how Gurucul Unified Security and Risk Analytics offers real-time updates into behaviors that impact governance and compliance controls.
Behavior is the leading threat indicator. Detecting and stopping insider threats and cybercriminals involves monitoring and linking three pillars of behavior.
Modern machine learning algorithms can detect the change in a user’s behavior from the moment the credentials are compromised. Detection can be tied to specific activities such as a series of failed login attempts, an atypical IP address or unusual activity in general.
Watch this webinar for a review of some real world cases where contextual data was able to reveal an attack before it became a major data breach.
Learn how pre-packaged threat hunting analytics can be used for both active and passive threat hunting capabilities. See how real-time contextual linking helps enrich threat hunting data.
Understand how machine learning improves IAM, and how Identity Analytics reduces the attack surface by radically reducing accounts and entitlements.
Join Gurucul for a conversation with our top data scientist about how we apply machine learning to the cybersecurity space. What models do we use? How do they work? What are the gotchas? What are the big wins?.
Stay ahead of attackers with Network Traffic Analysis. Identify unknown network threats on network flows and packet data. Detect endpoint malware missed by software dependent on signatures and known patterns. Discover and report any unknown or unseen devices on the network.
Advanced threat detection requires dynamic and proactive techniques powered by machine learning, artificial intelligence, and security analytics. Attend this webinar to learn how Gurucul’s beyond SIEM capabilities support advanced threat detection with risk prioritized alerts.
Watch this webinar to find out how this free service can help you put advanced threat detection controls in place to identify users who are at risk from phishing attacks, detect users whose accounts may have been compromised, prevent data exfiltration, and more.
As workforces go remote, new types of insider threats are cropping up. During Threatpost’s June webinar, a panel of experts including Saryu Nayyar, CEO at Gurucul; Craig Cooper, COO at Gurucul; and Theatpost Editors Lindsey O’Donnell Welch and Tara Seals, discussed how to detect and prevent today’s insider-based malicious activity.
Watch the Zero Trust Security Webinar for an expert analysis on the unique role that security analytics and security automation plays in achieving a genuine zero trust environment.
Gurucul has invested significant R&D efforts to deliver Artificial Intelligence (AI) Driven Security Operations Center (SOC) automation. Attend this webinar to learn about our cutting-edge capabilities to help reduce Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR) to security incidents.
Watch this session for details on our best practice recommendations based on our experience. With proven strategies and tactics, organizations can get to the point where they are able to remediate insider threats in real-time or at least before data is exfiltrated.
Watch this webinar to learn how AI-based advanced analytics serves as a force multiplier for remote SOC analysts. It can adapt seamlessly to the changing threat situation and empower the Security Operations team in the face of a brand new “normal.”
Watch this webinar to learn how Gurucul’s Risk Based Authentication can help you streamline, optimize, and personalize your user and customer authentication experience.
Gurucul’s cloud native analytics-driven SIEM and UEBA provide cutting-edge contextual analytic capabilities that reduce MTTD & MTTR.
Super Bowl LII was held in Minneapolis, MN – the home of Allina Health. Allina needed to monitor Healthcare providers activities to detect unauthorized or rogue access to patient’s data, and to prevent PHI data exfiltration.