Skip to main content

Webinars

5:00 AM ET
27-April-2022
60 minutes
Upcoming Webinar

The growing complexity and sophistication of cyber-attacks has driven an evolution of the current cyber security legislation, strengthening the regulatory framework by extending the scope of application, but more critically vastly reducing the time to report an incident.

Is your business adequately prepared to alert, triage, contain and eradicate a threat efficiently before it causes irreparable damage?

The most widespread method to start the investigative process for a cyber-attack is incident response triage to analyse the network, endpoints, and system logs to reconstruct the attack timeline.

Join us on Wednesday, April 27th, for a virtual live session where we’ll show you how to act quickly to remove the threat from company systems and mitigate any further possible attacks.

Agenda:
  • How promptly reconstruct the dynamics of the threat actors activities, tools and tactics;
  • How to eradicate the threat before exfiltration or detonation occurs without raising alarms for the attacker.
  • How and when to report an attack, as required by the legislator
View Details & Register

Is your agency looking for funding to invest in cybersecurity modernization efforts?

The recently passed Infrastructure Investment and Jobs Act (IIJA) includes the $1 billion State and Local Cybersecurity Grant Program, which government agencies can use for cyber threat detection and response projects.

Additionally, the American Rescue Plan Act (ARPA) provides $350 million that government agencies can use for cybersecurity modernization projects.

You’re invited to join NetWitness and Carahsoft for a webinar all about these new grant programs and how to best utilize them for your agency. Members of the Grants Office will also be present to answer your application questions.

In this webinar, you will learn:

  • How to upgrade your holistic threat intelligence capabilities and access powerful security insights with grant funding
  • All about how rapid end-to-end visibility up-levels your agency’s entire infrastructure and decreases disparate security platforms
  • The best practices for writing and submitting your funding application with tips from the Grants Office

Register now to find new funding sources for all of your agency’s cybersecurity needs!

View Details & Register
60 minutes
On-Demand Webinar

Grab your detective hat (white, of course) and join NetWitness for an hour of threat hunting intrigue. We’ll study a mock attacker, hunting down security threats and following a trail of cyber breadcrumbs, infiltrations, and threat detection events that can help your organization stay vigilant and keep your operations secure.

In this threat hunting session you’ll uncover:
• How to engage the EDR and NDR capabilities of the NetWitness Platform for your organization’s security needs
• How you can carve, reconstruct, and analyze suspicious behaviors, attacks, and data
• How best to examine the investigative workflow, learn time-saving critical features, and study tips and tricks from other cases

This is the first of a two-part series. While you don’t need to attend both sessions, Part 2 in April will be an intriguing case study where we’ll respond to the threats we hunted for in this Part 1.

View Details & Register

From new forms of malware to changing market dynamics to evolving sanctions and standards, today’s geopolitical crises unleash tomorrow’s cybersecurity vulnerabilities.

With cybercriminals and threat actors looking to exploit the pressing urgency and confusion resulting from rapid change, what do businesses need to do to protect themselves from a security incident?

Join NetWitness Field Chief Technology Officer Ben Smith and SecurID Chief Product Officer Jim Taylor to review some of the core cybersecurity fundamentals that can help businesses adapt to emerging threats and build long-term resilience.

View Details & Register

Want to update configurations across your entire NetWitness environment—with one command?

Need a hit list on-demand of all of your hosts/services?

Or how about a color-formatted report showing your ESA rules?

This NetWitness customer session will discuss new, efficient techniques for platform automation using Python. Our Professional Services consultant Sean Drzewiecki returns for more key tips and tricks for admin and engineering pros.

If you’re a NetWitness customer (admin or engineering), you do not want to miss this installment of the NetWitness webinar series.

View Details & Register

On December 11, 2022, the Log4Shell vulnerability was discovered—and the effect was immediate and profound, as security teams worldwide worked ‘round the clock to mitigate this dangerous risk.

Join us on Tuesday, 3 March for a virtual live attack simulation that models a Log4J exploit. We’ll show how the NetWitness network detection and response system (NDR) provides near-immediate visibility to drastically reduce the response times on severe exploits like Log4J, empowering security teams like yours to swiftly detect and respond to this ominous threat tactic.

In addition to a virtual front row seat for this simulated attack, you’ll learn how to monitor for similar future attacks.

Agenda
  • The true meaning of Log4j, and how to be better prepared for the next one
  • Key risks of other platforms (endpoints without agents, deleted/augmented logs)
  • How to discover if Log4Shell-like threats have infiltrated and how to remediate—quickly
View Details & Register

On December 11, 2022, the Log4Shell vulnerability was discovered—and the effect was immediate and profound, as security teams worldwide worked ‘round the clock to mitigate this dangerous risk.

Join us on Tuesday, March 1st for a virtual live attack simulation that models a Log4J exploit. We’ll show how the NetWitness network detection and response system (NDR) provides near-immediate visibility to drastically reduce the response times on severe exploits like Log4J, empowering security teams like yours to swiftly detect and respond to this ominous threat tactic.

In addition to a virtual front row seat for this simulated attack, you’ll learn how to monitor for similar future attacks.

Agenda

  • The true meaning of Log4j, and how to be better prepared for the next one
  • Key risks of other platforms (endpoints without agents, deleted/augmented logs)
  • How to discover if Log4Shell-like threats have infiltrated and how to remediate—quickly
View Details & Register
68 minutes
On-Demand Webinar

Join us for this on-demand webinar as we go through the most common troubleshooting tips and tricks for the NetWitness Platform.

Our systems engineering experts will share with you their real-world experience and you will learn that solving most troubleshooting tasks is a breeze that you can do yourself.

Register now to learn the art of NetWitness troubleshooting.

View Details & Register
60 minutes
On-Demand Webinar

Join Dave Glover, aka The Logfather, for this virtual insider training session that goes behind-the-scenes on logging complexities and enhances your threat detection and IR skills.

View Details & Register
58 minutes
On-Demand Webinar

Cybersecurity monitoring and logging are critical to your ability to detect network events and potential cyber attacks. But if the sheer volume of log data and other challenges are getting in the way of a rapid and effective response to security threats, we have an offer you can’t refuse. This complimentary virtual training session led by RSA Principal Sales Engineer Dave Glover demystifies logging complexities and enhances your threat detection and IR skills.  With more than 20 years in cybersecurity, there is very little that Dave Glover, aka The Logfather, hasn’t seen when it comes to infiltrators and cyber threats. In this one-hour session, Dave, an RSA Principal Sales Engineer, shares his in-depth knowledge of threat detection and describes relevant use cases through live demos using RSA NetWitness – but the concepts he presents can be applied to whatever tool you use.

View Details & Register