9 past events found
Back to Search Begin New Search Save Search Auto-Notify
Navigating Cybersecurity Threats, Chall...
The threat landscape will continue to change creating new challenges for organizations. How will threats that are relevant today evolve in 2023? Will technology innovations and regulatory frameworks require organizations to change the way they operate? With cybersecurity spending as a percentage of IT spending growing to 11.8% in 2022, these questions are top of mind for cybersecurity leaders and their teams. Join Augusto Barros and a panel of...
February 1, 2023
Organizer: Securonix
Location: Webcast
Add Favorite
Cybersmart Series: Securing the Cloud
Securing the Cloud Join Securonix on June 16th as we host a virtual event focusing on the Cybersmart Series: Securing the Cloud. Increased reliance on technologies that advance worker productivity from anywhere has seen cloud computing become one of the key opportunities for development over the past few years. In this online event, we’ll talk with a number of federal and local officials to learn more about how they’re using cloud...
June 16, 2021
Organizer: Securonix
Location: Webcast
Add Favorite
Securonix Workshop: Capture the Crate,...
Securonix offers the ability to detect and respond to both external and internal threats with next-generation SIEM augmented by industry-leading UEBA. Securonix UEBA offers out-of-the-box use cases for many types of insider threats including: Data exfiltration Privilege account abuse and misuse Compromised users Botnet infections Join our upcoming workshop, Capture the Crate via Zoom on Tuesday, May 25. Compete in 3-person teams to uncover th...
May 25, 2021
Organizer: Securonix Government Team at Carahsoft
Location: Webcast
Add Favorite
Applying the MITRE ATT&CK Framework to...
The MITRE ATT&CK framework has become an excellent way for security professionals to understand and describe threats. However, most of the time, it is used to describe the actions of external threats.But what about the insider threats? According to Forrester, 25% of breaches resulted from internal incidents, and almost half of them were malicious. In the past few years, insider threats have evolved in several aspects from how sensitive dat...
January 20, 2021
Organizer: Securonix
Location: Webcast
Add Favorite
Transform Big Data into Actionable Secu...
View our on-demand webcast for a webcast with Tanuj Gulati, CTO and Co-founder at Securonix, as he discusses how Securonix User and Entity Behavior Analytics (UEBA) and Cloudera's next generation data and analytics management platform continue to deliver on the promise of big data security analytics. Learn how advances in big data, machine learning, and behavior analytics are revolutionizing cyber security, moving beyond simple rules, signatur...
October 17, 2016
Organizer: Securonix Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Supercharge UAM With Securonix
The Federal Government has been very proactive in mandating and deploying User Activity Monitoring (UAM) solutions on the users endpoint systems. These agent-based solutions can capture incredibly detailed information about users' activity and the status of the endpoint device itself. Additionally, User Activity Monitoring (UAM) can rapidly detect and alert on threats such as suspicious events in near-real-time where polices and or rules have...
June 22, 2016
Organizer: Securonix Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
U.S. Cyber Adversaries: Tactics and Tec...
Join us for a presentation that will interpret nation-state threat actors and their techniques. We will analyze the rapidly evolving but highly contested domain of warfare: cyberwar. We'll define the various advantages that nation-states reap by embracing cyberwar and we'll contrast advancements in cyber with other technological and military achievements throughout history in order to measure the significance cyber is and will be playing in th...
April 28, 2016
Organizer: Securonix Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Insider Threat: Evil Employees and the...
View our on-demand webcast with our featured speaker Brian Contos, Securonix Vice President and Chief Security Strategist, for this provocative analysis of insider threats with real-life use cases. Brian is the author of a well-known book on insider threats, Enemy at the Water Cooler. He also co-authored a book on physical and logical security convergence with former NSA Deputy Director William Crowell. Brian is a frequent speaker at industry...
February 20, 2016
Organizer: Securonix Team at Carahsoft
Location: Webcast
Add Favorite
Automated Real Time Threat Detection wi...
Cybersecurity experts all agree, that in most cases, the data necessary to detect an insider or cyber attack is already being captured by the organization. After virtually every breach and compromise, digital forensics are able to reconstruct the actions of the persons or entities involved based on exisiting logs and data. Forensics by definition is too late! Automated Behavioral Analytics and machine learning can detect threats as they are un...
November 5, 2015
Organizer: Securonix Government at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Back to Search Begin New Search