Webinars

Webinars

  • Expert Humans vs. Expert Machines: Next Gen Threat Detection Will Require Both

    Organizations are drowning in intelligence data. The problem isn’t that there’s not enough breach detection data, it’s that there is too much. “Sleeper threats” lie hidden in plain sight, protected by a cacophony of noise and a security team too overwhelmed to find them. And with AI-fueled attacks, combat has moved to warp speed. We need machines to fight the machines, but we need still need expert humans at the helm. Implementing AI and automation enables organizations to perform advanced threat hunting, detection, and response at machine speed and scale. Earlier AI followed a set of rules and never deviated, but the problem was that it never went beyond that either. It wasn’t customizable or adaptable. To be impactful, threat hunting AI needs to run on a deep neural net architecture and rely on a progressive learning model that mimics human learning and assimilates the techniques, processes, and expertise of analysts. Kumar Saurabh, CEO and Co-founder of LogicHub, demonstrates new technology that acts as force multiplier for skilled human expertise. Learn how to improve threat detection and response efficacy at a lower cost and free up your security team’s valuable time and resources to focus on high-value security tasks. Key takeaways from this session will be: • How to use advanced decision automation to analyze millions of data points per day. • How to automate threat discovery, cataloging, triage, and response – at machine speeds. • How to leverage AI as a force multiplier for skilled human expertise. • How to reduce noise and repetitive work for Level 1 & 2 analysts and free up time and resources to focus on real threats and critical decisions. • How to leverage AI to build sophisticated playbooks in hours, rather than weeks. Read More

  • Great eXpeltations: Cybersecurity trends and predictions for 2022

    Join Expel, a managed detection and response (MDR) provider offering 24x7 security monitoring and response for cloud, hybrid and on-premises environments, and special guest Sean Mason, Managing Director - Cyber Defense at United Airlines as we explore the top cybersecurity trends that stood out last year. We’ll dive into the four most important attack trends, including what we saw in 2021, practical recommendations to handle these threats and protect your org, and predictions for what to expect this year. These trends include: - Business email compromise (BEC) targeting emails and application data - Ransomware - Supply chain targeting - Cryptojacking You’ll leave this session with helpful information to make your org more secure in 2022. Read More

  • Protecting Enterprise Data from Threats in 2022

    According to Identity Theft Resource Center (ITRC) research, the total number of breaches in 2020 have been exceeded by October 2021 - an increase of 17%, with 1,291 breaches in 2021 compared to 1,108 breaches in 2020. How has remote working impacted your organization's security posture? What lessons can security professionals learn from the recent wave of breaches and what steps can enterprises take to strengthen security in 2022? This keynote panel of security experts and industry leaders will explore the best practices for breach prevention, as well as share real-life lessons from the frontlines on what works and doesn't work. Viewers will learn more about: - The reality of data breaches - Why data breach severity is rising - Ransomware attacks and the ongoing threat to businesses - Technologies that help with breach prevention, detection and response - Why security awareness matters and best practices for educating employees to be cyber secure Moderated by: Jeremy Snyder, Managing Director, Entiviti Panelists: Willy Leichter, CMO, LogicHub Mike Parkin, Engineer, VulcanCyber Julie Davila, Sr Dir of AppSec, Sophos Read More

  • Plan, Prepare, Predict: Implementing Breach Prevention Strategies from the Start

    Preventing data breaches has become a key area of focus for most security programs, driven by the news of ever increasing ransomware attacks, intellectual property loss and insider threats. Having a strong Incident Response program is crucial when a data breach occurs, but more and more, we need to get ahead of these attacks and lay strong foundations that can help prevent data breaches before they occur. And beyond that, with that foundation in place, what if we can also look ahead and actually predict which areas of our network environment are most likely to be attacked? It's at this stage where defenders can start to get ahead of the curve, make sound decisions around how to prevent or mitigate risks, reduce the likelihood that these vulnerabilities are exploited and help keep their organization out of the news. In this talk, we'll discuss: • Fundamental strategies and best practices for shoring up the areas of your environment most often targeted by cyberattackers • How a culture of preparedness can be your strongest line of defense against data breaches • Leveraging threat intelligence sources to predict where attackers may target you next • Ways to prioritize your risk mitigation efforts to quickly and efficiently address weaknesses in the environment Read More

  • Advanced XDR: Map Detection Methods to Align to Your Most Critical Risks

    In recent years, despite the advances in advanced endpoint protection, high-profile breaches have continued and become more frequent and destructive. Attackers have learned how to work around the existing security stack to achieve their objectives. This talk will focus on how organizations can use attacker behavior analytics to better detect attacks and align their security stack towards critical business assets. Learn how to maximize your threat detection and response efforts more effectively. • Shift to a risk-aligned security strategy and avoid the traditional “reactive” and tool-based approach • Learn how behavioral analytics better reflects attacker behavior • Integration of network, endpoint, cloud, and application data to better reflect entire attack surface • Scale XDR and MDR processes and automate tasks for speed and efficiencies Read More