Multimedia Archives

View our previously recorded broadcasts by selecting any topic below.

Note: Audio is enabled, please adjust your volume

LogRhythm and CISCO | Discovering Advanced Threats: What you Cannot See Can Hurt You
  With all the security and event-related data noise, it is difficult for organizations to sort through and obtain real, actionable events that need attention. LogRhythm's enterprise-class Log Management & SIEM 2.0 Analytics Platform combined with Cisco's Identity Services Engine (ISE) creates an integrated solution allowing users to monitor and secure their entire network of systems and applications. 

This webcast discusses how log data, net flow, and other machine data generated by your network devices can be used by an advanced security intelligence platform to provide profound visability into the threats and risks to which organizations might otherwise be blind. 

Click here to register and watch the full webinar

  LogRhythm & Coalfire | Retail Cyber Threats: How to Detect them Early and Limit the Damage
  In this webinar, Rick Dakin, CEO/Co-Founder & Chief Security Strategist for Coalfire, a leading PCI-DSS QSA and IT GRC firm, and David Pack, head of the LogRhythm Labs group at LogRhythm, the Security Intelligence Company, will discuss the current cyber threat landscape, the increasing exposure it’s creating for retailers and how security intelligence can be leveraged to detect and respond to the signs of a retail breach sooner to limit the damage or stop the loss of data altogether. 

Click here to watch the full webinar

  LogRhythm and SecureState | PCI Compliance
  John Melvin, Technical Lead PCI Forensics Investigator, and Kerstyn Clover, Incident Response and Forensics Consultant, for SecureState discuss how to prepare for and effectively respond a compromise. In addition, they will provide insight into the PCI compliance investigator process. It's WHEN, not IF.

Click here to watch the full webinar

  Ultimate Windows Security and LogRhythm | Linking Host Events and Network Events to Detect Threats
  Randy Franklin Smith from Ultimate Windows Security talks about linking host events and network events to catch the bad guys. He presents 5 real world scenarios for capturing necessary information and performing the sophisticated correlation to link said host and network events to discover violations and intrusions.

Click here to watch the full webinar

 SC Magazine and LogRhythm eSymposium | Death by Malware
  Amar Singh, Chairman of ISACA UK Security Advisory Group in the UK, discusses the role malware plays in today's cyber threat landscape and how enterprises can enhance their detection and response capabilities to defend against the increasingly complex threat vector.

Click here to watch the full webinar

 Rapid Threat Detection Response with Next Generation Firewall and SIEM
  In this webinar Fortinet and LogRhythm present how you can protect against APT's and other threats targeting your users data and applications. 

Click here to watch the full webinar

Auditing User Accounts in Active Directory with the Windows Server 2012 Security Log

Randy Fraklin Smith with Ultimate Windows Security and LogRhythm will show you how to audit changes to domain user accounts, configure the right audit policy to produce the right events and learn what events to look for. 

Click here to watch the full webinar

Protecting Critical Infrastructure Against Advanced Cyber Threats

SC Magazine presents Dr. Sameer Bhalotra, Former Sr. Director of Cybersecurity at the White House and current Chief Operating Officer at Impermium, and Chris Petersen, CTO & Co-Founder of LogRhythm, as they discuss meeting the challenges of protecting critical infrastructure against advanced cyber threats.


Click here to watch the full webinar

Ultimate Windows Security and LogRhythm | Network Security Analytics

Randy Franklin Smith with Ultimate Windows Security and Seth Goldhammer, Director of Product Management at LogRhythm, talk Network Security Analytics and LogRhythm’s new Network Monitor.

Click here to watch the full webinar

PCI 3.0: Moving from an Audit Scramble to a State of Continuous Compliance

In this webcast, LogRhythm and SecureState will demonstrate how its next gen SIEM and Security Analytics Platform empowers organizations around the globe to establish a state of continuous compliance with over 80 specific controls of the PCI DSS with their Automation Suite for PCI and PA DSS.

Click here to watch the full webinar


SANS Analyst Webcast: Results of the SANS Analytics and Intelligence Survey 


Learn results of a new SANS survey on Security Intelligence and Analytics. This is the logical next step for organizations that are collecting larger amounts of security and operational data than ever before, and now need the means to make sense of it. This survey explores the use of analytics engines, security baselining and threat profiling (including the use of security intelligence) to take security event analysis to the next level.

Click here to watch the full webinar

SANS Review | Under Pressure Scaling Analytics to Meet Real Time Threats
 
This webcast discusses the collection, correlation and analysis features of LogRhythms security analytics platform, its capabilities and its use in the real world, with advice for readers assessing their present and future SIEM needs.

Register to watch the full webinar

HIPAA Omnibus Rule Compliance Deadline | Are you Ready
 
The HIPAA Omnibus Rule enforcement deadline is September 23, 2013. The Omnibus Rule modifies the HIPAA privacy, security and enforcement rules, and will be incorporated into the HHS/OCR HIPAA audit programs.

Click here to watch the full webinar

Ultimate Windows Security and LogRhythm  | Linux Security Logging
 
Randy Franklin Smith with Ultimate Windows Security and Seth Goldhammer, Director of Product Management at LogRhythm presents Linux Security Logging: Auditing Logon and Authentication webcast.

Click here to watch full bebcast

A Leading Global CISO and Security Expert Uses SIEM to Defend his Client's Turf


Amar Singh, chair of ISACA's Security Task Force/Security Advisory Group in the UK, highlights how SIEM that embraces big data can enhance an enterprise's security program, brought to you by SC Magazine and LogRhythm. 

Click here to watch full webcast


BeyondTrust and LogRhythm Practical Applications of Cyber Threat Protection and SIEM


BeyondTrust & LogRhythm solutions provide the visibility necessary to make smart decisions and reduce risk to assets and users.

Click here to watch the full webcast 


Cutting Through the Hype: What is Big Data Security Analytics?


Randy Franklin Smith, from UltimateWindowsSecurity.com, and Seth Goldhammer, Director of Product Management at LogRhythm, Inc., discuss the hot topic of Big Data Security Analytics.

This webcast, introduces big data, what constitutes big data and then turns the discussion to focus on big data security analytics.  Big data query techniques like cluster analysis, as well as key scenarios in which these elements are valuable to security will also be investigated.

Click Here to Watch Full Webcast


IT Harvest Video Interview Series 2013


Richard Stiennon, former Gartner VP research and author of UP and to the RIGHT: Strategy and Tactics of Analyst Influence and currently Chief Research Analyst at IT Harvest sits down with Chris Petersen, CTO & Co-founder of LogRhythm, Inc., to discuss today's threat landscape and how LogRhythm's SIEM 2.0 Big Data Security Analytics platform helps companies around the world detect breaches and the most sophisticated cyber threats of today, faster and with greater accuracy than ever before.

Click here to watch the full video


LogRhythm and  Rapid7


Get Real-Time Cyber Threat Protection with Risk Management and SIEM presented by Dana Wolf, Director of Products with Rapid7 and Seth Goldhammer, Director of Product Management.

 Click here to watch the full video


Defend the Edge with Greater Network Insight and Enforcement | Cisco, SC Magazine and LogRhythm



Seth Goldhammer, Director of Product Management with LogRhythm, Inc. and Scot Pope Senior Manager Identity & Policy Management Ecosystem with Cisco discuss new security challenges due to mobility and BYOD, the challenge of identifying true anomaly and LogRhythm SIEM and Cisco ISE.

Click here to watch full Webcast.


Top 6 Security Events to Monitor in SharePoint


Ultimate Windows Security, LOGBinder and LogRhythm present the top events to monitor in SharePoint audit log. Key topics are: Audit policy change, SharePoint site collection administrator, Member added, Unique permissions, Permissions changed and Permission level modified. 

Click here to watch full webcast

 


SC Magazine, ESG and LogRhythm Webcast | Big Data Intersection with Security Analytcs


The relationship between big data and security analytics is one that can assist organizations to address the high level risks with the threat landscape constantly evolving and presenting new sophisticated threats on a daily basis. Large enterprises should be planning on the conversion of the two. Learn more by watching the full webcast recorded on February 13.

Click here to watch full webcast


Fortinet and LogRhythm Webinar | Ensure Rapid Threat Response & Improve Threat Defense with UTM and SIEM


The Verizon Breach report stated that 97% of security breaches in 2011 were avoidable through simple or intermediate controls and further, 85% of attacks took weeks or more to discover. To ensure rapid response to potential breaches, application control, situational awareness and real-time alerting become the critical tools for cyber threat defense. Originally recorded on February 7, 2013

Click here to watch full webcast


Security Intelligence in Action: A Review of LogRhythm's Advanced Analysis Features


It's not enough to know that something's happened in an enterprise IT environment; insights need to lead directly to actions. To get to this level of analysis in our SIEM systems, complexities of managing an overabundance of threat information must also be addressed.

In this webcast, explore the key issues associated with event and log monitoring, along with the value thatsecurity information and event management (SIEM) can provide in today's complex, high-volume threat environment. In addition, senior SANS Analyst and GIAC technical director Dave Shackleford will go over his review of the LogRhythm SIEM platform.

Recorded live November 28, 2012

Click here to watch full webcast


Gartner SIEM 2.0


Key Considerations for SIEM 2.0 Big Data Security Analytics

Click here to view.


5 Ways to Reduce Information Overload from Your Log Management SIEM


Randy Franklin Smith, UWS security expert and Seth Goldhammer, LogRhythm director of product management will discuss how organizations can analyze multiple dimensions of event data and use various algorithms to improve an organization's current definition of "normal." They will identify six different "dimension categories" that can be used to define normal behavior and four analysis techniques, as well as explore various use cases. November 8, 2012

Click here to watch full webcast


Automating PCI Compliance in Virtual, Cloud and Hybrid Environments


LogRhythm, Coalfire and VMware present Automating PCI Compliance in Virtual, Cloud and Hybrid Environments November 8, 2012

Click here to watch full webcast


Stay One Step Ahead of Cyber Threats




Tap the Power of Next Generation IPS, Firewall and SIEM Presented by Doug Hurd, Director of Technical Alliances, with Sourcefire and Seth Goldhammer, Director of Product Management with LogRhythm September 25, 2012

Click here to watch full webcast


Cyber Threat Defense | Is Your Firm the Weak Link
Cyber Threat Defence Webinar| LogRhythm


This co-sponsored webinar with ILTA and LogRhythm will offer solutions to law firms who are increasingly targeted by hackers and cyber criminals to protect sensitive client data, meet compliance requirements and to improve their overall security posture. July 10, 2012

Click here to watch full webcast


Avoid HIPAA Fines and Pass OCR Audits

Cyber Threat Defence Webinar| LogRhythm

Fairwarning and LogRhythm partner to offer HIPAA and OCR audit solutions for healthcare organizations. Learn how to secure electronic protected health information, provide privacy auditing and monitoring, meet compliance requirements and detect security threats and data breaches.

Click here to watch full webcast


Cyber Threat Defense | Strategies to Detect and Respond to Advanced Persistent Threats
Cyber Threat Readiness: The New Reality


Learn how to leverage a SIEM 2.0 platform with continuous monitoring to improve your organization’s overall security posture and protect critical information assets against increasing threats.

Click here to watch full webcast


Prepare Your Defenses and Comply with NERC CIP



Learn how to prepare for audits and meet compliance requirements for NERC CIP and improve your overall security posture while protecting critical information assets against increasing cyber threats.

Click here to watch full webcast