Free webinar

Detecting insider threats with UEBA

Closed

Presented by

Sid, Cybersecurity Product Specialist

Why attend this webinar?

To stay on top of the rapidly evolving threat landscape, organizations must add new technology to their security arsenals. While traditional SIEM functionality is still important, security teams must augment their incident detection capability with machine learning and analytics to tackle more advanced threats.

Given how advanced cyberattacks are today, manually creating more alerting rules in a SIEM solution alone simply isn't an effective way of detecting threats. Organizations need to include anomaly-based analytics to strengthen incident detection mechanisms.

This is why user and entity behavior analytics (UEBA) is quickly becoming a must-have component for security operation centers. UEBA creates a baseline of user activities and dynamically monitors the network for anomalies by leveraging machine learning and statistical analysis. This way, UEBA technology can discover threats that basic rule-based alerting mechanisms fail to capture.

In this webinar, we'll explore how security teams can improve their threat detection and incident response plan with UEBA.

Agenda

  • Introduction to UEBA and why you need it
  • Types of anomalies that you can detect using UEBA
  • Tracking insider threats by monitoring risk scores
  • UEBA use cases
    1. Data exfiltration
    2. Account compromise
  • Introduction to the Log360 UEBA add-on
  • 2Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.
  • 3Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.
  • 4Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.

Thanks!

Your e-book is on its way.

If you don't find it in your inbox within the next few minutes, check your spam folder.

Closed

Zoho Corporation Pvt. Ltd. All rights reserved.

Claim Your Spot Now