Event Date: May 08, 2018
Hosted By: Exabeam & Carahsoft
With so many potential cyber security risks at hand, it can be difficult to determine which alerts and activities are risks to your organization and which are false positives. More importantly, which risks your organization can live with, which it can’t, and which it can cope with when reduced to an acceptable level.
Attendees of this webinar were able to learn about:
Insights from top cyber security incidents and why the attackers remained undetected
Examples of how analytics can collect and contextualize activity in your network to map to risk
Steps to build a framework to help you define an acceptable level of risk
Examples of how machine learning and user behavior analytics can minimize insider threats
Fill out the form below to view this archived event.
Threat hunting enables analysts to proactively search for and respond to adversaries on the network. Exabeam Threat Hunter brings the power of threat hunting to every analyst within a Security Operations Center (SOC).
Exabeam, an industry pioneer of User Behavior Intelligence,
leverages existing SIEM and log management data repositories
to understand a complete picture of user session activities from
log on to log off, allowing the technology to detect account
impersonation throughout the attack chain. The Ex...
One of the biggest challenges for any federal agency is finding ways to identify and minimize the impact of insider threats -- that someone with access to the organization’s networks (an employee, former employee, or contractor) will use that access maliciously. Compounding the problem, if someone...
In 2011, U.S. Executive Order 13587 established the National Insider Threat Task Force (NITTF), under joint leadership of the Attorney General and the Director of National Intelligence. A year later, the President issued the National Insider Threat Policy. This policy introduced a set of standards -...
Join Rocky Rashidi, Senior Product Manager, and Abel Morales, Regional Sales Engineer at Exabeam, as they cover MITRE ATT&CK, also known as the MITRE framework, and how it's used with the Exabeam platform. Information security professionals looking to up their game will learn how moving from Indicat...
In evaluating UBA solutions’ ability to detect, prioritize, and response, it is important to understand the full potential of data
science-driven analytics. Organizations should ask their vendors if they can support the following Top 12 UBA use cases, and
most importantly, demand that the vendor...
Threat hunting and incident response are critical roles of security operations center (Soc) Analysts. With the ever-rising sophistication of new and emerging attacks, analysts need an edge to stay ahead of adversaries.