ManageEngine IT Security Webinar Series

Security information and event management (SIEM) solutions have entered the market to provide security intelligence and automate managing terabytes of log data for IT security. SIEM solutions monitor network systems, devices, and applications in real time, providing security intelligence for IT professionals to mitigate threats, correlate events, identify the root cause of security incidents, and meet compliance requirements.Most organizations think that SIEM solutions have a steep learning curve and are expensive, complex, and hard to deploy. This claim may be true about many SIEM vendors. However, the right SIEM solution is one that can be easily deployed, is cost-effective, and meets all your IT security needs with a single tool.At this webinar you'll learn how to:Choose an SIEM solution,Monitor user activity to curb insider threat,Proactively mitigate sophisticated cyber-attacks,Meet IT Compliance Requirements.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Are you Ready to Demystify the Dark Web with IBM IRIS?

IBM

Dark web forums and marketplaces can be treasure troves of data on threat actor activities, motivations, and capabilities. Often organizations desiring to obtain this valuable information attempt to conduct their own dark web research. However, what they usually learn too late is that setting up effective, efficient dark web access can be costly, difficult, and dangerous to the organization. This webinar covers the challenges setting up a dark web collection apparatus, and why for most organizations using an independent provider makes more sense.
Watch Now

Cyberattack Prevention for the Water & Wastewater Industry

America’s Water Infrastructure Act (AWIA) mandates (drinking) water systems serving more than 3,300 people to improve cybersecurity measures no later than six months after certifying the completion of a risk and resilience assessment. It is important to understand the various dimensions of the challenges in cyber securing water and wastewater treatment plants before we establish a roadmap to manage cyber threats, risks, and breaches.
Watch Now

Attack Tactics 5 – Zero to Hero Attack

Black Hills Information Security

Presented BHIS Testers by: Jordan Drysdale, Kent Ickler, and John Strand. This is a re-recording of a live BHIS webcast that was presented on April 26th, 2019. Ever want to see a full attack from no access on the outside to domain takeover? Ever want to see that in under an hour? OWA? Password Sprays? Yup! VPNs? Remote account takeover? Yup! Fully documented command and tool usage? Yup! MailSniper? Absolutely! Nmap? Obviously.
Watch Now

Security Industry Financials – A Closer Look

Sia

Equities performed exceptionally well in 2017 on the back of strong corporate earnings, lax monetary policy, and the passing of major tax reforms. Notwithstanding the strength seen for a majority of the year, 2018 has been off to a rocky start, with volatility seen in both the debt and equity markets. Mack explained that where we are with tax reform and the strength in the economy that the security industry will continue to see reasonable growth in the equity capital markets over the next several years.
Watch Now