Webinars

Filter selections by:
11:00 AM (EDT)
29 Sept 2021
60 minutes
Upcoming Webinar

A security operations center (SOC) is full of (expensive) technology and (even more expensive) people, and they don't always get along. Why do organizations consistently struggle with building out - and maintaining - their basic threat detection and response functions to meet today's adversaries? Attendees of this session will learn about the five quickest paths to ensure failure in a SOC and will have the opportunity to ask questions.

Are you still relying exclusively on your SIEM as your primary tool in your threat detection and response toolbox? There is so much more visibility you need within your environment today, above and beyond capturing details from your logs.  Join us to learn more about the power of extended detection and response (XDR) – and better yet, from a provider who started down this path years ago, starting with a SIEM and today offering a full-blown XDR platform. This session will be led by the NetWitness Field CTO Ben Smith and our lead Principal Systems Engineer, Nak Kwak. Nak will build a real attack framework and then defend with NetWitness.

60 minutes
On-Demand Webinar

First, our experts will give you an introduction to threat hunting while walking you through various threat hunting methodologies during the webinar session.  We'll discuss tactics and techniques used by world class hunters around the globe and give you the building blocks to start your analysts on the road to becoming threat hunters, regardless of skill level. Then, we’ll let you take things into your own hands with multi-stage "hands on" scenarios that will allow you to apply some of the techniques discussed during the session. Don’t sweat it if you feel overwhelmed.  Our experts will be on hand to help you through the details, so everyone walks away with a solid grasp of the value of the hunt. Your final challenge will be to test your skills with a remote exercise that you’ll have 72 hours to complete.  You’ll be competing against other workshop participants for CPE credits, the opportunity to win a prize, and the title of “Threat Hunter."

58 minutes
On-Demand Webinar

Cybersecurity monitoring and logging are critical to your ability to detect network events and potential cyber attacks. But if the sheer volume of log data and other challenges are getting in the way of a rapid and effective response to security threats, we have an offer you can’t refuse. This complimentary virtual training session led by RSA Principal Sales Engineer Dave Glover demystifies logging complexities and enhances your threat detection and IR skills.  With more than 20 years in cybersecurity, there is very little that Dave Glover, aka The Logfather, hasn’t seen when it comes to infiltrators and cyber threats. In this one-hour session, Dave, an RSA Principal Sales Engineer, shares his in-depth knowledge of threat detection and describes relevant use cases through live demos using RSA NetWitness – but the concepts he presents can be applied to whatever tool you use.

60 minutes
On-Demand Webinar

A complimentary virtual training session that demystifies logging complexities and enhances your threat detection and IR skills.  Cybersecurity monitoring and logging are critical to your ability to detect network events and potential cyber attacks. But if the sheer volume of log data and other challenges are getting in the way of a rapid and effective response to security threats, we have an offer you can’t refuse.  You can’t get this type of insight and expert training from just anyone. With more than 20 years in cybersecurity, there is very little that Dave Glover, aka The Logfather, hasn’t seen when it comes to infiltrators and cyber threats. In this one-hour session, Dave, an RSA Principal Sales Engineer, shares his in-depth knowledge of threat detection and describes relevant use cases through live demos using RSA NetWitness – but the concepts he presents can be applied to whatever tool you use.

Are developers a liability or an asset when it comes to security? Check out Matias Madou, CTO of Secure Code Warrior, and RSA’s CTO Ben Smith as they discuss the importance of empowering developers to start left, not just shift left.  Through this interactive session, they will touch on the importance of building a positive security environment that can be used in a dev team’s everyday practice.

75 minutes
On-Demand Webinar

Building on the popularity of the highly technical Operationalizing Incident Response workshop, RSA is offering a special virtual version of this in-person event. During the webinar, Shane Harsh will describe a business-driven security framework for the fundamentals of operational threat hunting and incident response. This will enable your organization to understand the essential elements required to build an effective, repeatable, and cross-functional IR plan. Shane will also share knowledge of operational best practices to successfully identify, contain, eradicate, and recover from cybersecurity incidents.

Various
On-Demand Webinar

How do you begin your journey to an Intelligent SOC? Start by evaluating where your dimensions of visibility, analytics, automation, and risk fall. With that knowledge you can build your roadmap in a sequence that delivers maximum impact and cost effectiveness.

45 minutes
On-Demand Webinar

The internet of things (IoT) has presented numerous real or perceived security challenges, but edge computing promises a way to respond and overcome them, in part by giving security analysts and admins the ability to monitor, detect and handle IoT threats. RSA partner IOTech Systems joins us to show how IoT edge computing can help you get IoT under control and secured. During this exclusive webinar and demo: You’ll learn how IoT edge computing works conceptually and from a technical perspective. You’ll see via the demo: How IOTech’s Edge Xpert platform can be configured to efficiently and accurately ingest and aggregate data from multiple, different edge devices. How Edge Xpert seamlessly deploys and manages the RSA IoT Security Monitor Collector to provide security at the edge. You’ll learn how you can integrate RSA IoT security monitoring tools with your existing SIEM.

ty-on-demand-webinar|On-Demand Webinar ty-upcoming-webinar|Upcoming Webinar