Latest Talk
The Role of Government and Service Providers in Securing UK Business and Critical National Infrastructure
During this webinar, we discussed the ever-expanding role of the UK’s trusted managed security service provider (MSSP) community in securing our
cyberspace – as well as when, why, and critically how, the government should become involved. We drew on Matt Rider’s recent experience working with g…
Upcoming talks
LogRhythm SIEM - April 2025 Quarterly Launch
April 2025 marks our 12th consecutive quarterly release, bringing you new product enhancements to help safeguard your environment with confidence.
Learn more about the latest enhancements to LogRhythm SIEM, our self-hosted SIEM platform. Product leaders will demo the latest enhancements and
provide guidance on how to apply these enhancements to your team.
On-demand talks
The Role of Government and Service Providers in Securing UK Business and Critical National
Infrastructure
During this webinar, we discussed the ever-expanding role of the UK’s trusted managed security service provider (MSSP) community in securing our
cyberspace – as well as when, why, and critically how, the government should become involved. We drew on Matt Rider’s recent experience working with
government agencies’ inaugural Hackers in the House initiative and discussed which organisations should be classed as CNI. Key takeaways: - How and wh…
Looking Ahead: Cybersecurity Trends and Predictions for 2025
Cybersecurity threats are evolving at an unprecedented pace, and 2025 promises to bring new challenges and opportunities for defenders. Join industry
experts Steve Wilson, Steve Povolny, Gabrielle Hempel, and Kevin Kirkwood for an engaging conversation exploring the biggest cybersecurity predictions for
the year ahead. From AI accelerating exploitation cycles and the rise of "Zero Trust for AI" to the emergence of triple extortion attacks and the growing sop…
LogRhythm SIEM - January 2025 Quarterly Launch
January 2025 marks our 11th consecutive quarterly release, bringing you new product enhancements to help safeguard your environment with confidence.
Learn more about the latest enhancements to LogRhythm SIEM, our self-hosted SIEM platform. Product leaders will demo the latest enhancements and
provide guidance on how to apply these enhancements to your team.
Trust No One: How to Spot Insider Threats Hiding in Plain Sight
Insider threats are among the hardest cybersecurity challenges to solve. Unlike external attacks, insiders have legitimate credentials, making them nearly
invisible to traditional detection methods. But what if you could uncover these threats before they escalate? Join Exabeam’s expert-led webinar to explore
how our advanced UEBA technology and AI-driven workflows can surface hidden risks by understanding "normal" user behavior and identifying deviations. …
Elevate Your Cybersecurity Response: Transform Threat Detection, Investigation, and Response (TDIR)
with AI
Cybersecurity spend is set to surpass $170 billion annually by 2027 according to IDC. Enterprises face pressing challenges in threat detection and response as
adversaries use generative AI to increase compromise credentials. Approximately 60% of organizations experienced a rise in credential phishing attacks,
facilitated by generative AI tools. Join us on November 20th to dive into modern security architectures using the Exabeam Security Operations Platform to…
Leadership and Career Development During a Breach
Effective leadership during a cybersecurity breach is vital for both immediate response and long-term resilience. Not only does it protect the organization but
also nurtures the team. By fostering an environment of communication, collaboration, and continuous improvement, as well as investing in technologies to
fully equip the team, CISOs can lead their organization through crises and emerge stronger. In this webinar, recently hosted by SASIG Events, Exabeam’s …
The Intersection of Gen AI and Cybersecurity: Building the Case for an AI-Copilot
In a time of continuous threats with committed adversaries, AI is becoming a powerful ally in improving threat detection, investigation and response by
capitalizing on the power of machine learning, the knowledge contained in large language models (LLMs) and AI techniques such as natural language
processing (NLP). As organizations continue to struggle to hire and retain their security personnel, there’s a huge opportunity in security operations for ena…