Lightcyber Webinars

Five Ways to Spot an Attacker in Your Network

This webinar discuss in depth, five key things to look for to spot an attacker in your network.

Webinar Link

Five Ways to Spot an Attacker in Your Network

This webinar discuss in depth, five key things to look for to spot an attacker in your network.

Webinar Link

In Detection, The Only Thing That Matters is Results

This webinar discusses the processes that can make security operations effective at proactive and realtime detection, and some of the underlying technology that can, buzz aside, enable real results.

Webinar Link

Machine Learning and Network Security

In this Webinar David Thompson, Sr. Director, Product Management, LightCyber explains unlocking the true potential of Machine Learning to enhance network security.

Webinar Link

Webinar: Advanced, Persistent, Threats

In this webinar David Thompson Sr. Director, Product Management at LightCyber discusses “Advanced”, “Persistent”, “Threat”, which of the three is the key word? Advanced attackers inevitably get into our networks, why and how the LightCyber Magna’s Active Breach Detection features determine the intrusion behavior method and when caught early can prevent theft and damage to your network.

Webinar Link

Firewall Hacking 101: Exploits and Countermeasures

Think Like an Attacker

Think Like an Attacker: What You Must Know About Targeted Attack Techniques

Register and watch this SANS webinar led by SANS Institute director John Pescatore to learn more about the move from a prevention-only strategy to one with detection based on behavioral profiling from both network and endpoint visibility. This webinar reveals many of the operational techniques of a hidden attacker to which most companies are blind. The presentation follows with a demonstration of the new Cyber Attack Training System (CATS), including a simulated external attack. We also unveil the results of the Hacker Simulation Challenge, where participants used the CATS environment to break into a network to locate and exfiltrate a target data set.

Implementing Active Breach Detection

Implementing Active Breach Detection

Watch this SANS webinar led by SANS Analyst David Shackleford to learn more about the critical role detection needs to play in a successful security strategy. He asks the question — “Do you have confidence you can prevent 100 percent of intrusion attempts, and if not, can you find the attacker once they get in?” Trying to do detection with the same signature-based techniques that attackers circumvent is a fool’s errand. Instead, active breach detection utilizes machine learning techniques to profile what is normal on your network, and through integrated analysis of your network and endpoints exposes anomalous attacker behaviors. These behaviors are inherent to any successful attack, and if spotted early can ensure effective response and prevent damage. This webcast presents the role of behavior-based breach detection and the new SANS Analyst Program review of the LightCyber Magna Platform and its intrusion detection features.