Multimedia Archives

View our previously recorded broadcasts by selecting any topic below.

Note: Audio is enabled, please adjust your volume

Protecting Critical Infrastructure Against Advanced Cyber Threats

SC Magazine presents Dr. Sameer Bhalotra, Former Sr. Director of Cybersecurity at the White House and current Chief Operating Officer at Impermium, and Chris Petersen, CTO & Co-Founder of LogRhythm, as they discuss meeting the challenges of protecting critical infrastructure against advanced cyber threats.

Click here to watch the full webinar


Ultimate Windows Security and LogRhythm | Network Security Analytics

Randy Franklin Smith with Ultimate Windows Security and Seth Goldhammer, Director of Product Management at LogRhythm, talk Network Security Analytics and LogRhythm’s new Network Monitor.

Click here to watch the full webinar

PCI 3.0: Moving from an Audit Scramble to a State of Continuous Compliance

In this webcast, LogRhythm and SecureState will demonstrate how its next gen SIEM and Security Analytics Platform empowers organizations around the globe to establish a state of continuous compliance with over 80 specific controls of the PCI DSS with their Automation Suite for PCI and PA DSS.

Click here to watch the full webinar


SANS Analyst Webcast: Results of the SANS Analytics and Intelligence Survey 

Learn results of a new SANS survey on Security Intelligence and Analytics. This is the logical next step for organizations that are collecting larger amounts of security and operational data than ever before, and now need the means to make sense of it. This survey explores the use of analytics engines, security baselining and threat profiling (including the use of security intelligence) to take security event analysis to the next level.

Click here to watch the full webinar

 SANS Review | Under Pressure Scaling Analytics to Meet Real-Time Threats
  This webcast discusses the collection, correlation and analysis features of LogRhythm's Security Analytics Platform, its capabilities and its use in the real world, with advice for readers assessing their present and future SIEM needs.

Register to watch the full webinar

HIPAA Omnibus Rule Compliance Deadline | Are you Ready
  The HIPAA Omnibus Rule enforcement deadline is September 23, 2013. The Omnibus Rule modifies the HIPAA privacy, security and enforcement rules, and will be incorporated into the HHS/OCR HIPAA audit programs.

Click here to watch the full webinar

Ultimate Windows Security and LogRhythm  | Linux Security Logging
 

Randy Franklin Smith with Ultimate Windows Security and Seth Goldhammer, Director of Product Management at LogRhythm presents Linux Security Logging: Auditing Logon and Authentication webcast.

Click Here to Watch Full Webcast


A Leading Global CISO and Security Expert Uses SIEM to Defend his Client's Turf


Amar Singh, chair of ISACA's Security Task Force/Security Advisory Group in the UK, highlights how SIEM that embraces big data can enhance an enterprise's security program, brought to you by SC Magazine and LogRhythm. 

Click Here to Watch Full Webcast


BeyondTrust and LogRhythm Practical Applications of Cyber Threat Protection and SIEM

BeyondTrust & LogRhythm solutions provide the visibility necessary to make smart decisions and reduce risk to assets and users.

Click here to watch the full webcast 


Cutting Through the Hype: What is Big Data Security Analytics?


Randy Franklin Smith, from UltimateWindowsSecurity.com, and Seth Goldhammer, Director of Product Management at LogRhythm, Inc., discuss the hot topic of Big Data Security Analytics.

This webcast, introduces big data, what constitutes big data and then turns the discussion to focus on big data security analytics.  Big data query techniques like cluster analysis, as well as key scenarios in which these elements are valuable to security will also be investigated.

Click Here to Watch Full Webcast


IT Harvest Video Interview Series 2013


Richard Stiennon, former Gartner VP research and author of UP and to the RIGHT: Strategy and Tactics of Analyst Influence and currently Chief Research Analyst at IT Harvest sits down with Chris Petersen, CTO & Co-founder of LogRhythm, Inc., to discuss today's threat landscape and how LogRhythm's SIEM 2.0 Big Data Security Analytics platform helps companies around the world detect breaches and the most sophisticated cyber threats of today, faster and with greater accuracy than ever before.

Click here to watch the full video


LogRhythm and  Rapid7


Get Real-Time Cyber Threat Protection with Risk Management and SIEM presented by Dana Wolf, Director of Products with Rapid7 and Seth Goldhammer, Director of Product Management.

 Click here to watch the full LogRhythm and Rapid7 webcast


Defend the Edge with Greater Network Insight and Enforcement | Cisco, SC Magazine and LogRhythm



Seth Goldhammer, Director of Product Management with LogRhythm, Inc. and Scot Pope Senior Manager Identity & Policy Management Ecosystem with Cisco discuss new security challenges due to mobility and BYOD, the challenge of identifying true anomaly and LogRhythm SIEM and Cisco ISE.

Click here to watch full Webcast.


Top 6 Security Events to Monitor in SharePoint


Ultimate Windows Security, LOGBinder and LogRhythm present the top events to monitor in SharePoint audit log. Key topics are: Audit policy change, SharePoint site collection administrator, Member added, Unique permissions, Permissions changed and Permission level modified. 

Click here to watch full webcast

 


SC Magazine, ESG and LogRhythm Webcast | Big Data Intersection with Security Analytcs


The relationship between big data and security analytics is one that can assist organizations to address the high level risks with the threat landscape constantly evolving and presenting new sophisticated threats on a daily basis. Large enterprises should be planning on the conversion of the two. Learn more by watching the full webcast recorded on February 13.

Click here to view.


Fortinet and LogRhythm Webinar | Ensure Rapid Threat Response & Improve Threat Defense with UTM and SIEM


The Verizon Breach report stated that 97% of security breaches in 2011 were avoidable through simple or intermediate controls and further, 85% of attacks took weeks or more to discover. To ensure rapid response to potential breaches, application control, situational awareness and real-time alerting become the critical tools for cyber threat defense. Originally recorded on February 7, 2013

Click here to view.


Security Intelligence in Action: A Review of LogRhythm's Advanced Analysis Features


It's not enough to know that something's happened in an enterprise IT environment; insights need to lead directly to actions. To get to this level of analysis in our SIEM systems, complexities of managing an overabundance of threat information must also be addressed.

In this webcast, explore the key issues associated with event and log monitoring, along with the value thatsecurity information and event management (SIEM) can provide in today's complex, high-volume threat environment. In addition, senior SANS Analyst and GIAC technical director Dave Shackleford will go over his review of the LogRhythm SIEM platform.

Recorded live November 28, 2012

Click here to view.


Gartner SIEM 2.0


Key Considerations for SIEM 2.0 Big Data Security Analytics

Click here to view.


5 Ways to Reduce Information Overload from Your Log Management SIEM


Randy Franklin Smith, UWS security expert and Seth Goldhammer, LogRhythm director of product management will discuss how organizations can analyze multiple dimensions of event data and use various algorithms to improve an organization's current definition of "normal." They will identify six different "dimension categories" that can be used to define normal behavior and four analysis techniques, as well as explore various use cases. November 8, 2012

Click here to view


Automating PCI Compliance in Virtual, Cloud and Hybrid Environments


LogRhythm, Coalfire and VMware present Automating PCI Compliance in Virtual, Cloud and Hybrid Environments November 8, 2012

Click here to view


Stay One Step Ahead of Cyber Threats


Tap the Power of Next Generation IPS, Firewall and SIEM Presented by Doug Hurd, Director of Technical Alliances, with Sourcefire and Seth Goldhammer, Director of Product Management with LogRhythm September 25, 2012

Click here to view


Cyber Threat Defense | Is Your Firm the Weak Link
Cyber Threat Defence Webinar| LogRhythm


This co-sponsored webinar with ILTA and LogRhythm will offer solutions to law firms who are increasingly targeted by hackers and cyber criminals to protect sensitive client data, meet compliance requirements and to improve their overall security posture. July 10, 2012

Click here to view.


Avoid HIPAA Fines and Pass OCR Audits

Cyber Threat Defence Webinar| LogRhythm

Fairwarning and LogRhythm partner to offer HIPAA and OCR audit solutions for healthcare organizations. Learn how to secure electronic protected health information, provide privacy auditing and monitoring, meet compliance requirements and detect security threats and data breaches.

Click here to view.


Cyber Threat Defense | Strategies to Detect and Respond to Advanced Persistent Threats
Cyber Threat Readiness: The New Reality


Learn how to leverage a SIEM 2.0 platform with continuous monitoring to improve your organization’s overall security posture and protect critical information assets against increasing threats.

Click here to view.


Prepare Your Defenses and Comply with NERC CIP



Learn how to prepare for audits and meet compliance requirements for NERC CIP and improve your overall security posture while protecting critical information assets against increasing cyber threats.

Click here to view.


Beyond Alerting : 7 Critical Security Event Responses That Can be Automated


LogRhythm | Key Considerations For Log Management and SIEM Buyers

Randy Franklin Smith of Ultimate Windows Security examines at least 7 security events that folks in your organization likely have to respond to on a regular basis that are candidates for automation. David Pack, Manager of LogRhythm Labs, provides his years of insight as part of this informative webinar.

Click here to view


Detecting Advanced Persistent Threats (APTs) - Practical Experience from LogRhythm Labs



LogRhythm Labs Manager, David Pack, provides practical experience from LogRhythm Labs, working with customers to help detect and respond to sophisticated threats such as APTs and how continuous monitoring via SIEM 2.0 can play a meaningful role in thwarting the increasing number of high-profile data breaches occurring today.  A simulated attack demo using LogRhythm's SIEM 2.0 platform follows his presentation.

Click here to view


Detecting Advanced Persistent Threats (APTs)- Applying Continuous Monitoring via SIEM 2.0 for Maximum Visibility & Protection



KPMG’s Deron Grzetich and LogRhythm’s CTO, Chris Petersen share experiences working with clients to help detect and respond to sophisticated threats such as APTs and how continuous monitoring via SIEM 2.0 can play a meaningful role in thwarting the increasing number of high-profile data breaches occurring today.

Click here to view 


HIPAA & HITECH Act



Get ready for Tougher Privacy, Security Rules and Enforcement

Ken Pischke, Technology Sales Manager, Lockstep Technology Group, provides an overview of the changing risk landscape, how to prepare for the changes in HIPAA to avoid data breaches and penalties.  Isaac Thompson, Solutions Engineer, LogRhythm, demonstrates how log management and SIEM 2.0 solutions help organizations by automating HIPAA compliance, provide Privileged User Monitoring and avoid data breaches.

Click here to view.


Introducing Network Analysis and Visibility



John Kindervag, senior analyst at Forrester Research, Inc., presents Forrester’s Network Analysis and Visibility (NAV) prescription for understanding what’s happening on your internal and external networks. Chris Petersen presents an advanced approach to threat detection, intelligence and response, including a detailed 7-phase methodology to apply SIEM 2.0 for continuous monitoring to detect APTs.

Click here to view.


PCI 2.0 | Are You Ready For An Audit?



Organizations subject to PCI DSS will need to be compliant with the new PCI 2.0 updates by Dec. 31, 2011. Listen to Kennet Westby, CEO & Co-Founder of Coalfire, an independent IT audit & compliance firm, give you insights into how to prepare for an audit, from critical reporting requirements to required alerts for incident response and post-incident evidence for forensics.

This webcast was originally broadcast on June 14, 2011.

Click here to view.


Implementing A Zero Trust Model
LogRhythm | Implementing A Zero Trust Model

Listen to Senior Analyst, John Kindervag, of Forrester Research share his thoughts on the Zero Trust Model and leveraging SIM and NAV.

This webcast was originally broadcast on December 13, 2010.

Click here to view.


NERC CIP Version 4 Updates | Audit and Enforcement in 2011



Listen to experts from ReymannGroup, Cisco and LogRhythm as they share their views on the impacts of NERC CIP V4 on critical cyber assets and your security strategy.

This webcast was originally broadcast on November 9, 2010.

Click here to view.


PCI PA-DSS 2.0 | Payment Applications Monitoring Essentials


Eric Knight, Senior Knowledge Engineer at LogRhythm and a PCI compliance expert, clarifies the changes to PCI-DSS 2.0 and its impact on applications monitoring.

This webcast was originally broadcast on November 2, 2010.

Click here to view.


FISMA II & Cybersecurity


Join Paul Reymann, Federal compliance expert, where he clarifies the expected changes in FISMA and helps you anticipate the impact of the pending "continuous monitoring program" mandates.

This webcast was originally broadcast on August 3, 2010.

Click here to view.


HIPAA & HITECH Act Meaningful Use Mandates | Gaining Access to Stimulus Funds



Learn how to centralize and simplify data collection, auditing and reporting processes throughout a healthcare organization.

Originally presented on February 9, 2010.

Click here to view.


GLBA and EU Directive 95 Security | New Regulatory Focus for Financial Institutions in 2010 and Beyond



Learn more about safe harbor provisions in the EU Directive for U.S. financial institutions that meet GLBA requirements. You will also learn how real-time log and security event management solutions take the heavy lifting out of your recurring security compliance mandates.

Originally presented on May 4, 2010.

Click here to view.


SIEM 2.0: Integrating Five Key Requirements Missing in First Generation Solutions


This interactive conversation features: Chris Petersen, Co-Founder & CTO of LogRhythm interviewed by Raffael Marty, IANS Faculty.

Originally presented in October 2009.

Click here to view.


Securing Medical Records | Advanced Approaches for Logging and Monitoring


This webinar features: Feisal Nanji, Executive Director, Techumen and Caleb Wright, Solutions Engineer, LogRhythm.

Originally presented in November 2009

Click here to view.


Deep Dive into SIEM 2.0 | SIEM 1.0 Has Been Holding Companies Back For Years

This podcast interview features: ETM's Managing Editor Ali Klaver and LogRhythm's Co-Founder and CTO Chris Petersen.

Originally presented in November 2009

Click here to view.

 

Ultimate Windows Security and LogRhythm | Linux Security Logging


Randy Franklin Smith with Ultimate Windows Security and Seth Goldhammer, Director of Product Management at LogRhythm presents Linux Security Logging: Auditing Logon and Authentication webcast.

Click Here to Watch Full Webcast

A Leading Global CISO and Security Expert Uses SIEM to Defend his Client's Turf


Amar Singh, chair of ISACA's Security Task Force/Security Advisory Group in the UK, highlights how SIEM that embraces big data can enhance an enterprise's security program, brought to you by SC Magazine and LogRhythm. 

Click Here to Watch Full Webcast

BeyondTrust and LogRhythm Practical Applications of Cyber Threat Protection and SIEM

BeyondTrust & LogRhythm solutions provide the visibility necessary to make smart decisions and reduce risk to assets and users.

Click here to watch the full webcast

Cutting Through the Hype: What is Big Data Security Analytics?

Randy Franklin Smith, from UltimateWindowsSecurity.com, and Seth Goldhammer, Director of Product Management at LogRhythm, Inc., discuss the hot topic of Big Data Security Analytics.

This webcast, introduces big data, what constitutes big data and then turns the discussion to focus on big data security analytics.  Big data query techniques like cluster analysis, as well as key scenarios in which these elements are valuable to security will also be investigated.

Click Here to Watch Full Webcast

IT Harvest Video Interview Series 2013

Richard Stiennon, former Gartner VP research and author of UP and to the RIGHT: Strategy and Tactics of Analyst Influence and currently Chief Research Analyst at IT Harvest sits down with Chris Petersen, CTO & Co-founder of LogRhythm, Inc., to discuss today's threat landscape and how LogRhythm's SIEM 2.0 Big Data Security Analytics platform helps companies around the world detect breaches and the most sophisticated cyber threats of today, faster and with greater accuracy than ever before.

Click here to watch the full video

LogRhythm and Rapid7

Get Real-Time Cyber Threat Protection with Risk Management and SIEM presented by Dana Wolf, Director of Products with Rapid7 and Seth Goldhammer, Director of Product Management. Click here to watch the full LogRhythm and Rapid7 webcast

Defend the Edge with Greater Network Insight and Enforcement | Cisco, SC Magazine and LogRhythm

Seth Goldhammer, Director of Product Management with LogRhythm, Inc. and Scot Pope Senior Manager Identity & Policy Management Ecosystem with Cisco discuss new security challenges due to mobility and BYOD, the challenge of identifying true anomaly and LogRhythm SIEM and Cisco ISE. Click here to watch full Webcast.

Top 6 Security Events ot Monitor in SharePoint

Ultimate Windows Security, LOGBinder and LogRhythm present the top events to monitor in SharePoint audit log. Key topics are: Audit policy change, SharePoint site collection administrator, Member added, Unique permissions, Permissions changed and Permission level modified.  Watch now

 

Originally recorded March 14, 2013

SC Magazine, ESG and LogRhythm Webcast I Big Data Intersection with Security Analytics

The relationship between big data and security analytics is one that can assist organizations to address the high level risks with the threat landscape constantly evolving and presenting new sophisticated threats on a daily basis. Large enterprises should be planning on the conversion of the two. Learn more by watching the full webcast recorded on February 13.

Click here to view.

Fortinet and LogRhythm Webinar | Ensure Rapid Threat Response & Improve Threat Defense with UTM and SIEM

Data Security Analytics| LogRhythmThe Verizon Breach report stated that 97% of security breaches in 2011 were avoidable through simple or intermediate controls and further, 85% of attacks took weeks or more to discover. To ensure rapid response to potential breaches, application control, situational awareness and real-time alerting become the critical tools for cyber threat defense. Originally recorded on February 7, 2013

Click here to view.

Tapping Data Security Analytics to Detect Breaches & Advanced Threats and Gain Actionable INTEL

Data Security Analytics| LogRhythmIn this webinar, John Kindervag, Forrester principal analyst for security and risk, will discuss how the combination of Tapping Big Data Security Analytics and network analysis and visibility (NAV) capabilities provide the necessary extra ingredients for SIEM to move from merely a compliance reporting platform to delivering situational awareness and "INTEL" . Recorded December 5, 2012


Click here to view.

Security Intelligence in Action: A Review of LogRhythm's Advanced Analysis Features

Cyber Threat Defence Webinar| LogRhythmIt's not enough to know that something's happened in an enterprise IT environment; insights need to lead directly to actions. To get to this level of analysis in our SIEM systems, complexities of managing an overabundance of threat information must also be addressed.

In this webcast, explore the key issues associated with event and log monitoring, along with the value thatsecurity information and event management (SIEM) can provide in today's complex, high-volume threat environment. In addition, senior SANS Analyst and GIAC technical director Dave Shackleford will go over his review of the LogRhythm SIEM platform.

Recorded live November 28, 2012

Click here to view.

Gartner SIEM 2.0

Key Considerations for SIEM 2.0 Big Data Security Analytics

Click here to view.

5 Ways to Reduce Information Overload from Your Log Management SIEM

LogManagement| LogRhythm
Randy Franklin Smith, UWS security expert and Seth Goldhammer, LogRhythm director of product management will discuss how organizations can analyze multiple dimensions of event data and use various algorithms to improve an organization's current definition of "normal." They will identify six different "dimension categories" that can be used to define normal behavior and four analysis techniques, as well as explore various use cases. November 8, 2012

Click here to view

Automating PCI Compliance in Virtual, Cloud and Hybrid Envirnoments

Cyber Threat Defence Webinar| LogRhythm
LogRhythm, Coalfire and VMware present Automating PCI Compliance in Virtual, Cloud and Hybrid Environments November 8, 2012

Click here to view

Stay One Step Ahead of Cyber Threats

Tap the Power of Next Generation IPS, Firewall and SIEM Presented by Doug Hurd, Director of Technical Alliances, with Sourcefire and Seth Goldhammer, Director of Product Management with LogRhythm September 25, 2012

Click here to view

Cyber Threat Defense | Is Your Firm the Weak Link?

Cyber Threat Defence Webinar| LogRhythm
This co-sponsored webinar with ILTA and LogRhythm will offer solutions to law firms who are increasingly targeted by hackers and cyber criminals to protect sensitive client data, meet compliance requirements and to improve their overall security posture. July 10, 2012

Click here to view.

Avoid HIPAA Fines and Pass OCR Audits

Cyber Threat Defence Webinar| LogRhythm
Fairwarning and LogRhythm partner to offer HIPAA and OCR audit solutions for healthcare organizations. Learn how to secure electronic protected health information, provide privacy auditing and monitoring, meet compliance requirements and detect security threats and data breaches.

Click here to view.

Cyber Threat Defense - Strategies to Detect and Respond to Advanced Persistent Threats

Cyber Threat Readiness: The New Reality
Learn how to leverage a SIEM 2.0 platform with continuous monitoring to improve your organization’s overall security posture and protect critical information assets against increasing threats.

Click here to view.

Prepare Your Defenses and Comply with NERC CIP

NERC CIP webinar with Coalfire and LogRhythm
Learn how to prepare for audits and meet compliance requirements for NERC CIP and improve your overall security posture while protecting critical information assets against increasing cyber threats.

Click here to view.

Beyond Alerting: 7 Critical Security Event Responses That Can Be Automated

LogRhythm | Key Considerations For Log Management and SIEM Buyers
Randy Franklin Smith of Ultimate Windows Security examines at least 7 security events that folks in your organization likely have to respond to on a regular basis that are candidates for automation. David Pack, Manager of LogRhythm Labs, provides his years of insight as part of this informative webinar.

Click here to view

Detecting Advanced Persistent Threats (APTs) - Practical Experience from LogRhythm Labs

LogRhythm | APT Webinar | David Pack
LogRhythm Labs Manager, David Pack, provides practical experience from LogRhythm Labs, working with customers to help detect and respond to sophisticated threats such as APTs and how continuous monitoring via SIEM 2.0 can play a meaningful role in thwarting the increasing number of high-profile data breaches occurring today.  A simulated attack demo using LogRhythm's SIEM 2.0 platform follows his presentation.

Click here to view

Detecting Advanced Persistent Threats (APTs) -- Applying Continuous Monitoring via SIEM 2.0 for Maximum Visibility & Protection

LogRhythm | KPMG | Detecting Advanced Persistent Threats
KPMG’s Deron Grzetich and LogRhythm’s CTO, Chris Petersen share experiences working with clients to help detect and respond to sophisticated threats such as APTs and how continuous monitoring via SIEM 2.0 can play a meaningful role in thwarting the increasing number of high-profile data breaches occurring today.

Click here to view 

HIPAA & HITECH Act

LogRhtyhm | HIPAA and HITECH Act Webinar
Get ready for Tougher Privacy, Security Rules and Enforcement

Ken Pischke, Technology Sales Manager, Lockstep Technology Group, provides an overview of the changing risk landscape, how to prepare for the changes in HIPAA to avoid data breaches and penalties.  Isaac Thompson, Solutions Engineer, LogRhythm, demonstrates how log management and SIEM 2.0 solutions help organizations by automating HIPAA compliance, provide Privileged User Monitoring and avoid data breaches.

This webcast was originally broadcast on September 15, 2011.

Click here to view.

Introducing Network Analysis and Visibility

LogRhythm | Forrester Research Webinar
John Kindervag, senior analyst at Forrester Research, Inc., presents Forrester’s Network Analysis and Visibility (NAV) prescription for understanding what’s happening on your internal and external networks. Chris Petersen presents an advanced approach to threat detection, intelligence and response, including a detailed 7-phase methodology to apply SIEM 2.0 for continuous monitoring to detect APTs.

This webcast was originally broadcast on June 21, 2011.

Click here to view.

PCI 2.0 - Are You Ready For An Audit?

LogRhythm | CoalFire PCI 2.0 Compliance Webinar
Organizations subject to PCI DSS will need to be compliant with the new PCI 2.0 updates by Dec. 31, 2011. Listen to Kennet Westby, CEO & Co-Founder of Coalfire, an independent IT audit & compliance firm, give you insights into how to prepare for an audit, from critical reporting requirements to required alerts for incident response and post-incident evidence for forensics.

This webcast was originally broadcast on June 14, 2011.

Click here to view.

Implementing A Zero Trust Model

LogRhythm | Implementing A Zero Trust Model
Listen to Senior Analyst, John Kindervag, of Forrester Research share his thoughts on the Zero Trust Model and leveraging SIM and NAV.

This webcast was originally broadcast on December 13, 2010.

Click here to view.

NERC CIP Version 4 Updates | Audit and Enforcement in 2011

LogRhythm | NERC CIP Cybersecurity Webinar
Listen to experts from ReymannGroup, Cisco and LogRhythm as they share their views on the impacts of NERC CIP V4 on critical cyber assets and your security strategy.

This webcast was originally broadcast on November 9, 2010.

Click here to view.

PCI PA-DSS 2.0: Payment Applications Monitoring Essentials

LogRhythm | PCI PA-DSS 2.0 Webinar
Eric Knight, Senior Knowledge Engineer at LogRhythm and a PCI compliance expert, clarifies the changes to PCI-DSS 2.0 and its impact on applications monitoring.

This webcast was originally broadcast on November 2, 2010.

Click here to view.

FISMA II & Cybersecurity

LogRhythm | FISMA II & Cybersecurity
Join Paul Reymann, Federal compliance expert, where he clarifies the expected changes in FISMA and helps you anticipate the impact of the pending "continuous monitoring program" mandates.

This webcast was originally broadcast on August 3, 2010.

Click here to view.

HIPAA & HITECH Act Meaningful Use Mandates: Gaining Access to Stimulus Funds

LogRhythm | Reymann Group on HIPAA & HITECH Act
Learn how to centralize and simplify data collection, auditing and reporting processes throughout a healthcare organization.

Originally presented on February 9, 2010.

Click here to view.

GLBA and EU Directive 95 Security: New Regulatory Focus for Financial Institutions in 2010 and Beyond

LogRhythm | GLBA & EU Directive Webinar
Learn more about safe harbor provisions in the EU Directive for U.S. financial institutions that meet GLBA requirements. You will also learn how real-time log and security event management solutions take the heavy lifting out of your recurring security compliance mandates.

Originally presented on May 4, 2010.

Click here to view.

SIEM 2.0: Integrating Five Key Requirements Missing in First Generation Solutions

LogRhythm | SIEM 2.0 Webinar
This interactive conversation features: Chris Petersen, Co-Founder & CTO of LogRhythm interviewed by Raffael Marty, IANS Faculty.

Originally presented in October 2009.

Click here to view.

Securing Medical Records: Advanced Approaches for Logging and Monitoring

LogRhythm | Securing Mediacal Records Webinar
This webinar features: Feisal Nanji, Executive Director, Techumen and Caleb Wright, Solutions Engineer, LogRhythm.

Originally presented in November 2009

Click here to view.

Deep Dive into SIEM 2.0: SIEM 1.0 Has Been Holding Companies Back For Years

LogRhythm | SIEM2.0 In-Depth PodCast
This podcast interview features: ETM's Managing Editor Ali Klaver and LogRhythm's Co-Founder and CTO Chris Petersen.

Originally presented in November 2009

Click here to view.