Webinar- Mastering Next Gen SIEM Use Cases (Part3)

Webinar- Mastering Next Gen SIEM Use Cases (Part3)

Explore in-depth Use Cases of Next-Gen Security Information and Event Management (SIEM) – Part 3 of 3 series.   What will you learn: Tools and techniques – understanding the taxonomy Top use cases for the SOC Attack surfaces Insider threat Credential theft Endpoint compromise Application attack Monitoring / Building / SWIFT Fraud Analytics and hunting playbooks for SWIFT AboutRead more about Webinar- Mastering Next Gen SIEM Use Cases (Part3)[…]

Webinar-Insider Threat Intelligence: Creating A Robust Information Security System

Webinar-Insider Threat Intelligence: Creating A Robust Information Security System

What will you learn: Overview of data leakages Cases Risks Solutions Protection against data leakages Main challenges Sources of data leakages Tools and solutions Data Leakage Prevention systems Core principles and technologies involved Layered insider threat intelligence Visualization of information flows Pinpoint control of suspicious activities Mobile environment and insider threats About Speaker:   NikitaRead more about Webinar-Insider Threat Intelligence: Creating A Robust Information Security System[…]

Webinar- Mastering Next Gen SIEM Use Cases (Part2)

Webinar- Mastering Next Gen SIEM Use Cases (Part2)

Explore in-depth Use Cases of Next-Gen Security Information and Event Management (SIEM) – Part 2 of 3 series.   What will you learn: Tools and techniques – understanding the taxonomy Top use cases for the SOC Attack surfaces Insider threat Credential theft Endpoint compromise Application attack Monitoring / Building / SWIFT Fraud Analytics and hunting playbooks for SWIFT AboutRead more about Webinar- Mastering Next Gen SIEM Use Cases (Part2)[…]

Webinar- Mastering Next Gen SIEM Use Cases (Part1)

Webinar- Mastering Next Gen SIEM Use Cases (Part1)

Explore in-depth Use Cases of Next-Gen Security Information and Event Management (SIEM) – Part 1 of 3 series.   What will you learn: Tools and techniques – understanding the taxonomy Top use cases for the SOC Attack surfaces Insider threat Credential theft Endpoint compromise Application attack Monitoring / Building / SWIFT Fraud Analytics and hunting playbooks for SWIFT AboutRead more about Webinar- Mastering Next Gen SIEM Use Cases (Part1)[…]

20 Emerging IT Security Vendors to Look Out for in RSA Conference 2018, USA

20 Emerging IT Security Vendors to Look Out for in RSA Conference 2018, USA

We are here, once again, with our list of Top 20 Emerging IT Security Vendors from 500+ vendors attending RSAC 2018, April 16 to 20 in San Francisco. BTW, We have also created a RSAC 1-Minute Itinerary tool for the ease of attendees, through which you can now navigate the maze of 500+ Vendors at RSAC Expo likeRead more about 20 Emerging IT Security Vendors to Look Out for in RSA Conference 2018, USA[…]

Webinar-Under The Hood Of Deception Technologies

Webinar-Under The Hood Of Deception Technologies

What will you learn: How is deception technology different from honeypots ? Deception v/s EDR, UEBA and NTA A hacker’s view of deception across the kill-chain Key technology capabilities or key components of deception technology   About Speaker: Sahir Hidayatullah Cofounder, Smokescreen @sahirh     Sahir started his security career as an ethical hacker andRead more about Webinar-Under The Hood Of Deception Technologies[…]