Skip to main content

In these enterprise-level cyberside chats, NetWitness threat intelligence teams will explore a particular prevalent threat facing organizations today—and its impact on a particular industry. Our specialists will share personal experiences regarding an industry attack, the steps incident response (IR) teams are taking, plus insights on best security practices and detection and mitigation strategies.

In this session, we’ll cover major threats to financial industries and go behind the cybersecurity curtain to discuss:

  • Advanced operational models of financial services attacks
  • Evidence of institution-focused threat actors actively targeting Mexico, Costa Rica, Panama, Peru, Ecuador
  • How FIN13 specifically targets banking institutions and financial services

This is not another XDR webinar. NetWitness has invested in the XDR concept for 20 years, evolving our products for security operations worldwide.

We’ll show you how we’ve built the new NetWitness XDR upon a quarter century of real-world use cases and innovation. So watch now to learn more about this major product release and see why not all XDR is created equal.

In this webinar, NetWitness product managers will dive deep into the NetWitness XDR product line, provide use cases, and show you which XDR product suite can best provide the detection, response, and efficiency you require for your security operations.

The growing complexity and sophistication of cyber-attacks has driven an evolution of the current cyber security legislation, strengthening the regulatory framework by extending the scope of application, but more critically vastly reducing the time to report an incident.

Is your business adequately prepared to alert, triage, contain and eradicate a threat efficiently before it causes irreparable damage?

The most widespread method to start the investigative process for a cyber-attack is incident response triage to analyse the network, endpoints, and system logs to reconstruct the attack timeline.

Join us on Wednesday, April 27th, for a virtual live session where we’ll show you how to act quickly to remove the threat from company systems and mitigate any further possible attacks.

Agenda:
  • How promptly reconstruct the dynamics of the threat actors activities, tools and tactics;
  • How to eradicate the threat before exfiltration or detonation occurs without raising alarms for the attacker.
  • How and when to report an attack, as required by the legislator

Grab your detective hat (white, of course) and join NetWitness for an hour of threat hunting intrigue. We’ll study a mock attacker, hunting down security threats and following a trail of cyber breadcrumbs, infiltrations, and threat detection events that can help your organization stay vigilant and keep your operations secure.

In this threat hunting session you’ll uncover:
• How to engage the EDR and NDR capabilities of the NetWitness Platform for your organization’s security needs
• How you can carve, reconstruct, and analyze suspicious behaviors, attacks, and data
• How best to examine the investigative workflow, learn time-saving critical features, and study tips and tricks from other cases

This is the first of a two-part series. While you don’t need to attend both sessions, Part 2 in April will be an intriguing case study where we’ll respond to the threats we hunted for in this Part 1.

Want to update configurations across your entire NetWitness environment—with one command?

Need a hit list on-demand of all of your hosts/services?

Or how about a color-formatted report showing your ESA rules?

This NetWitness customer session will discuss new, efficient techniques for platform automation using Python. Our Professional Services consultant Sean Drzewiecki returns for more key tips and tricks for admin and engineering pros.

If you’re a NetWitness customer (admin or engineering), you do not want to miss this installment of the NetWitness webinar series.

On December 11, 2022, the Log4Shell vulnerability was discovered—and the effect was immediate and profound, as security teams worldwide worked ‘round the clock to mitigate this dangerous risk.

Join us on Tuesday, 3 March for a virtual live attack simulation that models a Log4J exploit. We’ll show how the NetWitness network detection and response system (NDR) provides near-immediate visibility to drastically reduce the response times on severe exploits like Log4J, empowering security teams like yours to swiftly detect and respond to this ominous threat tactic.

In addition to a virtual front row seat for this simulated attack, you’ll learn how to monitor for similar future attacks.

Agenda
  • The true meaning of Log4j, and how to be better prepared for the next one
  • Key risks of other platforms (endpoints without agents, deleted/augmented logs)
  • How to discover if Log4Shell-like threats have infiltrated and how to remediate—quickly

On December 11, 2022, the Log4Shell vulnerability was discovered—and the effect was immediate and profound, as security teams worldwide worked ‘round the clock to mitigate this dangerous risk.

Join us on Tuesday, March 1st for a virtual live attack simulation that models a Log4J exploit. We’ll show how the NetWitness network detection and response system (NDR) provides near-immediate visibility to drastically reduce the response times on severe exploits like Log4J, empowering security teams like yours to swiftly detect and respond to this ominous threat tactic.

In addition to a virtual front row seat for this simulated attack, you’ll learn how to monitor for similar future attacks.

Agenda

  • The true meaning of Log4j, and how to be better prepared for the next one
  • Key risks of other platforms (endpoints without agents, deleted/augmented logs)
  • How to discover if Log4Shell-like threats have infiltrated and how to remediate—quickly

Join us for this on-demand webinar as we go through the most common troubleshooting tips and tricks for the NetWitness Platform.

Our systems engineering experts will share with you their real-world experience and you will learn that solving most troubleshooting tasks is a breeze that you can do yourself.

Register now to learn the art of NetWitness troubleshooting.

Join Dave Glover, aka The Logfather, for this virtual insider training session that goes behind-the-scenes on logging complexities and enhances your threat detection and IR skills.

Are developers a liability or an asset when it comes to security? Check out Matias Madou, CTO of Secure Code Warrior, and RSA’s CTO Ben Smith as they discuss the importance of empowering developers to start left, not just shift left.  Through this interactive session, they will touch on the importance of building a positive security environment that can be used in a dev team’s everyday practice.