"Avoiding a Breach with Security Analytics and Automated Response"

"In this webinar, our guest speaker John Kindervag, Vice President, Principal Analyst at Forrester Research, and Seth Goldhammer, Director of Product Management at LogRhythm, will discuss how pervasive visibility and big data security analytics, when coupled with intelligent automated response, can substantially reduce an organization’s risk of experiencing a material breach or cyber incident."
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

BSI and Proofpoint: State of the Phish Webinar

BSI

Join BSI for a webinar where we’ll explore findings from the 2019 State of the Phish Report by our partner, Proofpoint. It provides the data-driven intelligence you and your team need to manage end-user risk more effectively within your organization. In this webinar, we will explore data related to the following: Tens of millions of simulated phishing emails: Analysis of tens of millions of simulated phishing emails sent to end users over a 12-month period. 16 industries: Comparisons of activities and results from organizations and their employees across 16 industries. Nearly 15,000 survey responses from infosec professionals: Responses reveal the challenges they are facing, their views of the threat landscape, and the actions they’re taking to fend off phishing attacks.
Watch Now

Maximizing Network Security with Microsegmentation to Minimize the Risk From Any Attacker

Lateral movement allows attackers to damage and steal information from an entire network once they gain access to one (usually the most vulnerable) entry point. Microsegmentation solves this problem by dividing a network into very small regions called microsegments, usually up to a segment per machine. However, if implemented incorrectly, it can be time-consuming, expensive, difficult to manage, and ineffective. Join Nicholas DiCola, VP of Customers at Zero Networks, and Aaron J. Goodwin, CISO at B. Riley Financial, as they share everything you need to know to effectively utilize microsegmentation for maximum network security and minimize the risk of attacks – including best practices, use cases, and the most easily deployable solutions to keep your organization safe.
Watch Now

The Critical Factors to Look for in a Cybersecurity Vendor

Are you assessing which cybersecurity vendor to use for your business, or even consolidating to just one? There are some key characteristics and business strategies you’ll want to consider. We’ve turned to global business leaders to share their experience vetting cybersecurity vendors and even trends in the security industry that influenced their choice.
Watch Now

The Power of AI to Disrupt Security Ops

GovInfoSecurity

Many of today's companies are hesitant to adopt new security technologies - particularly AI. The truth is AI is successfully disrupting many areas of security operations and shifting us away from the traditional SOC and man-led threat intelligence. In this webinar, Chris Calvert will introduce the concept of autonomous security driven by AI, probability theory and advanced algorithms. These new technologies apply reasoning, judgement and experience to identify threats and make decisions at the scale, speed and consistency no human can match, freeing up analysts for higher level investigation and response actions.
Watch Now