Webinars

On-Demand Webinars

KuppingerCole: Rise of the Intelligent SIEM: A Catalyst for SOC Modernization

In this webcast from Gurucul you’ll hear from the author of the 2024 KuppingerCole Leadership Compass on Intelligent SIEM Platforms, of which Guruucl was an Overall Leader. Together they’ll discuss how Next-Gen SIEM platforms can: ● Incorporate behavior analytics…

Watch Webinar

Demystifying Hype: AI & Breach Prevention Detection, Investigation & Response

While Generative AI has grabbed the attention of cyber security organizations, the line between what exists today, where things are going, and doomsday scenarios are increasingly blurred. In this webinar, we’ll help you cut through the current noise that overzealous…

Watch Webinar

Eliminating SOC Challenges for Multi-Cloud and Hybrid Cloud Environments

Learn about the top challenges and best practices for empowering security operations teams to better monitor these environments and prevent attackers from successfully breaching these complex architectures. Presenter: Sanjay Raja VP, Product Marketing and Solutions…

Watch Webinar

Zero to SIEM in Seconds

Improving threat detection, investigation and response within your SOC requires the ability to optimize, accelerate and improve the accuracy across four key areas: • Improve the Deployment, Ingestion and Operationalization of your SIEM • Increase the Accuracy and…

Watch Webinar

Early Determination of Attack Risk with Behavioral and Identity Analytics

In this webinar, we’ll explore how security teams can improve their threat detection and incident response plan with UEBA and Identity Analytics and cover the following: – Introduction to UEBA why you need it – How Identity Analytics can provide…

Watch Webinar

Enhancing Security Operations by Augmenting SIEM with Observability

In this webinar, we will cover how security teams can extend the right SIEM for the following Observability use cases: – Downtime and Performance Issues that can prohibit incident awareness – Application Reliability and Performance Impacts across microservices and cloud…

Watch Webinar

SIEM Augmentation: It’s Time to Up Your SIEM Game

In this webinar we’ll cover how you can improve your security operations efficiency by augmenting your SIEM to reduce dwell time. Learn more about the four pillars for augmenting your SIEM:…

Watch Webinar

Predictions for 2024: Navigating New Cyber Security Challenges and Trends

Come join us for this informative webinar that will help you prepare for the new year and new challenges to come. We’ll cover: – The impact of AI on cyber threats…

Watch Webinar

How Machine Learning is Leveraged for Attack Detection Scenarios

Machine Learning (ML) is used to identify abnormal behavior and pinpoint malicious behavior. This webinar will show you how Gurucul uses adaptive and static ML models to identify two different MITRE attack stages: Lateral movement (T1110) and Valid/Default Account (T1078/001).

Watch Webinar

How Contextual Risk Scoring Reduces Attack Response Time

In this webinar we’ll cover how advanced risk scoring provides accuracy and confidence to guide security operations decisions. Gurucul’s risk scoring model takes a holistic approach for computing risk. It uses a robust and flexible risk scoring framework which rolls…

Watch Webinar

Decrease the Complexity and Cost of SOC Operations with Improved Data Ingestion

This webinar will walk you through the advantages of Gurucul’s pipeline, demonstrating the creation and mapping of event data. SPEAKERS: Sanjay Raja VP, Product Marketing and Solutions…

Watch Webinar

Contextual Vulnerability Prioritization & Remediation Across the Attack Surface

In this demo we’ll show you how Gurucul can enrich your vulnerability scan results with telemetry across your entire attack surface. In addition, we’ll show you how we apply Risk-Chain Analysis powered by machine learning models to generate a risk…

Watch Webinar

Threats From Within: A Programmatic Approach to Managing Insider Risk

In this webinar, we will provide: Research into trends regarding insider threats The challenges with identifying insider threats How technology, people and process must work together to ensure a successful program that goes beyond just security or IT. SPEAKERS:…

Watch Webinar

2023 Insider Threat Report: Presenting the Survey Results

Key findings include: • 99% of organizations are vulnerable to insider threats • 74% of organizations say insider attacks have become more frequent • More than half of organizations have experienced an insider threat in the last…

Watch Webinar

Effective Hybrid Multi-Cloud Monitoring for the SOC

In this webinar we’ll cover the challenges most SIEM providers have in supporting these architectures as well as what features are necessary to fully support the needs of security teams in monitoring for threats and preventing breaches. SPEAKERS:…

Watch Webinar

Zero Trust Begins with Identity Analytics and Ends with ITDR

In this webinar we will discuss how identity analytics used in Zero Trust implementations can also be leveraged by SOC teams to incorporate Identity Threat Detection, Investigation and Response (ITDR) capabilities as part of their operations to help them thwart…

Watch Webinar

Top 4 Trends for the SOC

In this webinar, we’ll discuss four trends that are shaping the future of security operations, including how to: – Automate repeatable decision making processes – Operate at speed and scale with full data and risk visibility – Use AI/ML to…

Watch Webinar

Is XDR a Long Term Solution?

In this webinar, we will talk through: – What XDR was meant to solve? – How is the definition of XDR evolving? Including Traditional XDR and Open XDR – What its real value is to the SOC, and – Is…

Watch Webinar

How Mature Behavior Analytics Accelerates Detection of Persistent Threats

In this webinar we’ll show you how a more integrated and mature approach to implementing UEBA can prevent damage to organizations. Gurucul UEBA accelerates the detection and validation of common threats that continue to evade current solutions or require slow…

Watch Webinar

Identity Analytics As a Cornerstone for Implementing Successful Zero Trust

In this webinar we’ll cover the following: – How to baseline and understand current user access privileges and entitlements – Common security gaps that can evade zero trust implementations – Implementing identity analytics into your security operations for continuous monitoring…

Watch Webinar

Deep Dive into 2022 Gartner SIEM Critical Capabilities and Magic Quadrant

Join us for an interactive session with Antony Farrow, Sr Director of Solution Architecture, and Sanjay Raja, VP of Product Marketing and Solutions at Gurucul, where he will share detailed insights into: · The key innovations that we’ve built to…

Watch Webinar

Insider Risk and Supply Chain Threats for Financial Services

The risks associated with insider threats grow with the more blatant recruitment of insiders via threat actor groups like Lapsus$, nation state recruitment efforts, the “Great Resignation” changing employee behaviors and the software supply chain extended to partners, third-party contractors,…

Watch Webinar

Sifting Through the Noise: How to Modernize Today’s Security Operations

Join Jon Oltsik, Senior Principal Analyst & ESG Fellow, ESG Research and Sanjay Raja, VP of Product Marketing and Solutions at Gurucul, as we have an initial discussion on current challenges and gaps in today’s SOC operations, including making sense…

Watch Webinar

Revolutionize SOC Operations with Improved Efficiencies and Automation

Join Gurucul with guest speaker Joseph Blankenship, VP, Research Director for Security & Risk at Forrester to learn: Trends and gaps in security operations especially with increasing cloud adoption How the right data, analytics and intelligence comes together to provide…

Watch Webinar

Lessons Learned from Operational Insider Threat Programs

Join Gurucul’s customer for a discussion on lessons learned operationalizing Insider Threat Programs. With proven strategies and tactics, organizations can get to the point where they are able to remediate insider threats in real-time or at least before data is…

Watch Webinar

How to Optimize SOC Operations with a Next-Gen SIEM

With endpoint, XDR and SIEM vendors all claiming superiority in the battle to thwart attackers, what remains the same is the lack of quality of data, superior analytics and confidence in automation leaving security teams to struggle. How can more…

Watch Webinar

Determining Log4J’s Impact and Monitoring for Active Exploits

Our research team has broken down how Log4j works, but more importantly what you can do today to detect the vulnerabilities embedded in various systems, and whether they are actually being exploited in order to immediately begin remediation efforts. SPEAKER:…

Watch Webinar

Managed Security Services: Extracting More Value From Your SOC Platform

Attend this session to learn more about how to solve many of these challenges and drastically improve your security programs and margins over time. SPEAKER: Sanjay Raja VP, Product Marketing and Solutions…

Watch Webinar

Top Cyber Security Initiatives for 2022

This webinar looks forward into 2022 and beyond, and attempts to discern what adversaries SOC staff are facing. It delves into the psychology of these attacks, and how they are frequently perpetrated without our even knowing it. SPEAKER:…

Watch Webinar

How Dwell Time Is The #1 Enemy of the SOC

In this webinar we will look at the tactics and techniques that criminals use to get into the network and stay undetected. We’ll discuss the failures of detection technologies and what can be done to improve Mean Time To Detect…

Watch Webinar

Cleaning House: Getting Rid of Malicious Insiders

Join us to explore how Gurucul’s Machine-Learning risk analytics platform can help you identify and remove malicious insiders before they generate a newsworthy incident. SPEAKER: Jane Grafton Vice President Of Marketing, Gurucul…

Watch Webinar

Insider Threats – Advanced Analytics and Top Use Cases

Watch this webinar as we look at the main use cases in the Insider Threat space and how advanced analytics can help your organization mitigate the risk imposed by malicious insiders. SPEAKER: Mike Parkin Technical Marketing Engineer…

Watch Webinar

Risk Scoring – Bringing Meaning to Raw Data

Gurucul takes siloed, disparate, security data sources, analyzes them, and presents a unified risk score that Security Operations personnel can actually use.  Join us to find out how we contextualize a sea of data to deliver usable information. SPEAKER:…

Watch Webinar

Automating Incident Response with Machine Learning

Join us as we explain how Gurucul’s Unified Risk and Security Analytics platform uses machine learning and AI to deliver advanced automated incident response. SPEAKER: Mike Parkin Director of Technical Marketing, Gurucul…

Watch Webinar

The Value of an Analytics-Driven SIEM

Understand how leveraging AI and Machine Learning on massive volumes of data brings context to an otherwise siloed security picture. SPEAKER: Craig Cooper COO & SVP of Customer Success, Gurucul…

Watch Webinar

The Future of Connected Devices: IoT Security

Watch this webinar to learn how Gurucul Behavior Analytics can weed out IoT anomalies since these devices perform a narrow set of functions that allow abnormalities to pop out. SPEAKER: Mike Parkin Director of Technical Marketing, Gurucul…

Watch Webinar

Insider Threats Deep Dive: Case Studies for Advanced Analytics

Watch this webinar for an in-depth look at a couple of Insider Threat cases studies and how Advanced Behavioral Analytics can address the challenges posed by these pernicious threats. SPEAKER: Mike Parkin Director of Technical Marketing, Gurucul…

Watch Webinar

Best Practices to Maximize the Benefits of Analytics-Driven SIEM

Gurucul has years of experience in the field implementing our cloud native analytics-driven SIEM in customer environments large and small, with extensive technology integrations as well as with limited data ingestion. The best practices are similar across the board whether…

Watch Webinar

XDR Vs SIEM: Organizational Needs

Attendees will learn the fundamental differences between XDR and SIEM, the strengths and limitations of each approach, and how to utilize both real-time and saved data analytics to determine the security of your computing environment. SPEAKER: Peter…

Watch Webinar

How to Leverage Automation for Security Policy Compliance

Watch this webinar to understand how Gurucul Unified Security and Risk Analytics offers real-time updates into behaviors that impact governance and compliance controls. SPEAKER: Peter Draper Technical Director – EMEA…

Watch Webinar

Drive Security Automation at Machine Speed

Watch this webinar to understand how Artificial Intelligence can drive security automation at Machine Speed. SPEAKER: Mike Parkin Director of Technical Marketing, Gurucul Mike is a security…

Watch Webinar

The Three Pillars of Behavior: Identity, Access and Activity

Behavior is the leading threat indicator. Detecting and stopping insider threats and cybercriminals involves monitoring and linking three pillars of behavior. SPEAKER: Craig Cooper COO & SVP of Customer Success, Gurucul…

Watch Webinar

Context is King: Real World Examples on Preventing Data Breaches

Watch this webinar for a review of some real world cases where contextual data was able to reveal an attack before it became a major data breach. SPEAKER: Mike Parkin Director of Technical Marketing, Gurucul…

Watch Webinar

AI Based Predictive Threat Hunting

Learn how pre-packaged threat hunting analytics can be used for both active and passive threat hunting capabilities. See how real-time contextual linking helps enrich threat hunting data. SPEAKER: Mike Parkin Director of Technical Marketing, Gurucul…

Watch Webinar

Revolutionizing IAM Architecture with Machine Learning

Understand how machine learning improves IAM, and how Identity Analytics reduces the attack surface by radically reducing accounts and entitlements. SPEAKER: Peter Draper Technical Director – EMEA…

Watch Webinar

Securing Data with a Remote Workforce

Watch this webinar to find out how this free service can help you put advanced threat detection controls in place to identify users who are at risk from phishing attacks, detect users whose accounts may have been compromised, prevent data…

Watch Webinar

Security Analytics Makes Zero Trust Possible

Watch the Zero Trust Security Webinar for an expert analysis on the unique role that security analytics and security automation plays in achieving a genuine zero trust environment. SPEAKERS: Craig Cooper COO & SVP of Customer Success,…

Watch Webinar

AI Driven SOC Automation

Gurucul has invested significant R&D efforts to deliver Artificial Intelligence (AI) Driven Security Operations Center (SOC) automation. Attend this webinar to learn about our cutting-edge capabilities to help reduce Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR)…

Watch Webinar

Best Practices for Implementing an Insider Threat Program

Watch this session for details on our best practice recommendations based on our experience. With proven strategies and tactics, organizations can get to the point where they are able to remediate insider threats in real-time or at least before data…

Watch Webinar

How to Build a Risk Based Authentication Program

Watch this webinar to learn how Gurucul’s Risk Based Authentication can help you streamline, optimize, and personalize your user and customer authentication experience. SPEAKER: Craig Cooper COO & SVP of Customer Success, Gurucul…

Watch Webinar

Get Laser Focused with a Modern Analytics-Driven and Cloud Native SOC

Gurucul’s cloud native analytics-driven SIEM and UEBA provide cutting-edge contextual analytic capabilities that reduce MTTD & MTTR. SPEAKER: Jane Grafton Vice President Of Marketing, Gurucul Jane Grafton…

Watch Webinar

Super Bowl LII: Protecting Players and VIP Data

Super Bowl LII was held in Minneapolis, MN – the home of Allina Health. Allina needed to monitor Healthcare providers activities to detect unauthorized or rogue access to patient’s data, and to prevent PHI data exfiltration. SPEAKER:…

Watch Webinar