Skip to main content

Webinars

42 minutes

This is not another XDR webinar. NetWitness has invested in the XDR concept for 20 years, evolving our products for security operations worldwide.

We’ll show you how we’ve built the new NetWitness XDR upon a quarter century of real-world use cases and innovation. So watch now to learn more about this major product release and see why not all XDR is created equal.

In this webinar, NetWitness product managers will dive deep into the NetWitness XDR product line, provide use cases, and show you which XDR product suite can best provide the detection, response, and efficiency you require for your security operations.

Watch it now

The growing complexity and sophistication of cyber-attacks has driven an evolution of the current cyber security legislation, strengthening the regulatory framework by extending the scope of application, but more critically vastly reducing the time to report an incident.

Is your business adequately prepared to alert, triage, contain and eradicate a threat efficiently before it causes irreparable damage?

The most widespread method to start the investigative process for a cyber-attack is incident response triage to analyse the network, endpoints, and system logs to reconstruct the attack timeline.

Join us on Wednesday, April 27th, for a virtual live session where we’ll show you how to act quickly to remove the threat from company systems and mitigate any further possible attacks.

Agenda:
  • How promptly reconstruct the dynamics of the threat actors activities, tools and tactics;
  • How to eradicate the threat before exfiltration or detonation occurs without raising alarms for the attacker.
  • How and when to report an attack, as required by the legislator
Watch it now

Grab your detective hat (white, of course) and join NetWitness for an hour of threat hunting intrigue. We’ll study a mock attacker, hunting down security threats and following a trail of cyber breadcrumbs, infiltrations, and threat detection events that can help your organization stay vigilant and keep your operations secure.

In this threat hunting session you’ll uncover:
• How to engage the EDR and NDR capabilities of the NetWitness Platform for your organization’s security needs
• How you can carve, reconstruct, and analyze suspicious behaviors, attacks, and data
• How best to examine the investigative workflow, learn time-saving critical features, and study tips and tricks from other cases

This is the first of a two-part series. While you don’t need to attend both sessions, Part 2 in April will be an intriguing case study where we’ll respond to the threats we hunted for in this Part 1.

Watch it now

Want to update configurations across your entire NetWitness environment—with one command?

Need a hit list on-demand of all of your hosts/services?

Or how about a color-formatted report showing your ESA rules?

This NetWitness customer session will discuss new, efficient techniques for platform automation using Python. Our Professional Services consultant Sean Drzewiecki returns for more key tips and tricks for admin and engineering pros.

If you’re a NetWitness customer (admin or engineering), you do not want to miss this installment of the NetWitness webinar series.

Watch it now

On December 11, 2022, the Log4Shell vulnerability was discovered—and the effect was immediate and profound, as security teams worldwide worked ‘round the clock to mitigate this dangerous risk.

Join us on Tuesday, 3 March for a virtual live attack simulation that models a Log4J exploit. We’ll show how the NetWitness network detection and response system (NDR) provides near-immediate visibility to drastically reduce the response times on severe exploits like Log4J, empowering security teams like yours to swiftly detect and respond to this ominous threat tactic.

In addition to a virtual front row seat for this simulated attack, you’ll learn how to monitor for similar future attacks.

Agenda
  • The true meaning of Log4j, and how to be better prepared for the next one
  • Key risks of other platforms (endpoints without agents, deleted/augmented logs)
  • How to discover if Log4Shell-like threats have infiltrated and how to remediate—quickly
Watch it now

On December 11, 2022, the Log4Shell vulnerability was discovered—and the effect was immediate and profound, as security teams worldwide worked ‘round the clock to mitigate this dangerous risk.

Join us on Tuesday, March 1st for a virtual live attack simulation that models a Log4J exploit. We’ll show how the NetWitness network detection and response system (NDR) provides near-immediate visibility to drastically reduce the response times on severe exploits like Log4J, empowering security teams like yours to swiftly detect and respond to this ominous threat tactic.

In addition to a virtual front row seat for this simulated attack, you’ll learn how to monitor for similar future attacks.

Agenda

  • The true meaning of Log4j, and how to be better prepared for the next one
  • Key risks of other platforms (endpoints without agents, deleted/augmented logs)
  • How to discover if Log4Shell-like threats have infiltrated and how to remediate—quickly
Watch it now

Join us for this on-demand webinar as we go through the most common troubleshooting tips and tricks for the NetWitness Platform.

Our systems engineering experts will share with you their real-world experience and you will learn that solving most troubleshooting tasks is a breeze that you can do yourself.

Register now to learn the art of NetWitness troubleshooting.

Watch it now

Join Dave Glover, aka The Logfather, for this virtual insider training session that goes behind-the-scenes on logging complexities and enhances your threat detection and IR skills.

Watch it now

Cybersecurity monitoring and logging are critical to your ability to detect network events and potential cyber attacks. But if the sheer volume of log data and other challenges are getting in the way of a rapid and effective response to security threats, we have an offer you can’t refuse. This complimentary virtual training session led by RSA Principal Sales Engineer Dave Glover demystifies logging complexities and enhances your threat detection and IR skills.  With more than 20 years in cybersecurity, there is very little that Dave Glover, aka The Logfather, hasn’t seen when it comes to infiltrators and cyber threats. In this one-hour session, Dave, an RSA Principal Sales Engineer, shares his in-depth knowledge of threat detection and describes relevant use cases through live demos using RSA NetWitness – but the concepts he presents can be applied to whatever tool you use.

Watch it now

Too many enterprises today are in a reactive, firefighting mode when it comes to incident response. The MITRE ATT&CK framework is gaining popularity as a structured way to approach vulnerabilities, threats and remediation. Yet a recent study showed that even though 82% of cybersecurity professionals are familiar with the MITRE ATT&CK framework, only 8% said they used it regularly. The challenge: How to operationalize the framework.
Register for this executive roundtable to gain key insights about putting MITRE ATT&CK to work and to discuss with your peers.

Watch it now