LogRhythm and Cisco Cybersecurity Experts Discuss How to Detect and Respond to High-Impact Threats in Webinar

Dec 03, 2015, 08:00 ET from LogRhythm

BOULDER, Colo., Dec. 3, 2015 /PRNewswire/ -- According to Gartner Research, by 2020, 60 percent of enterprise information security budgets will be allocated for rapid detection and response approaches. This is the main theme of an SC Magazine-hosted panel discussion webinar, sponsored by Cisco (NASDAQ: CSCO) and LogRhythm titled, "Rapid Threat Containment: Detect & Respond Quickly to High-Impact Threats." Organizations require a new security model designed to rapidly detect and neutralize cyber threats that have penetrated the enterprise perimeter or originated from within.

In this webcast, James Carder, CISO of LogRhythm and vice president of LogRhythm Labs, and Scott Pope, senior manager,security ecosystem product management and business development, Cisco Systems, will share some of the latest techniques used by attackers to penetrate networks. The speakers will cover how companies can use next-generation security solutions to detect, respond to and neutralize these threats to reduce the risk of a material breach or cyber incident.

What:

"Rapid Threat Containment: Detect & Respond Quickly to High-Impact Threats"

When:

Tuesday, December 8, 2015; at 2:00 p.m. ET

Who:

James Carder, CISO of LogRhythm and vice president of LogRhythm Labs, and Scott Pope, senior manager, security ecosystem product management and business development, Cisco Systems

Register Here:

https://engage.vevent.com/rt/scwc~dec8logrhythm?code=LogRhythmA

 

Participants will learn how machine data generated across the network—including contextual identity and access telemetry from the Cisco Identity Services Engine (ISE)—can be leveraged by LogRhythm's security intelligence and analytics platform to provide organizations with highly corroborated risk-based alerts and enable immediate automated response to contain threats by interfacing with Cisco pxGrid to take protective action.  

Key topics in this webcast:

  1. Common ways hackers get into the network
  2. How threat actors attempt to avoid detection
  3. Tips on finding the hacker trail: how to look in the right place
  4. How to expand and accelerate an organization's mean-time-to-detect (MTTD) and mean-time-to-respond (MTTR)

About the Presenters

Scott Pope, senior manager, security ecosystem product management and business development, Cisco Systems, has held positions in network engineering, market strategy and technical product management at global service providers and networking equipment vendors covering a wide range of data and voice networking technologies.  Since 1998, Scott Pope has driven product strategy for many aspects of network security ranging from VPN and firewall to threat management for both wired and wireless networks. He currently concentrates his efforts on identity and network policy management solutions.

James Carder, CISO of LogRhythm and vice president of LogRhythm Labs, has more than 17 years of IT security experience developing and maintaining security governance and risk strategies. At LogRhythm, he oversees both threat and vulnerability management and the Security Operations Center (SOC). Prior to joining LogRhythm, Carder was the director of security informatics at Mayo Clinic, where he managed threat intelligence, incident response, security operations and the offensive security groups. Carder also served as a senior manager at Mandiant, where he led professional services and incident response engagements. He holds a B.S. degree in computer information systems and the CISSP certification.

About LogRhythm LogRhythm, a leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company's award-winning platform unifies next-generation SIEM, log management, network monitoring and forensics, endpoint monitoring and forensics, security analytics and user, network and endpoint behavioral analytics. In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides innovative compliance automation and assurance, and enhanced IT intelligence.

Consistently recognized by third-party experts, LogRhythm has been positioned as a Leader in Gartner's SIEM Magic Quadrant report for four consecutive years, named a "Champion" in Info-Tech Research Group's 2014-15 SIEM Vendor Landscape report, ranked Best-in-Class in DCIG's 2014-15 SIEM Appliance Buyer's Guide, awarded the SANS Institute's "Best of 2014" award in SIEM and received the SC Magazine Reader Trust Award for "Best SIEM Solution" in April 2015. Additionally, the company earned Frost & Sullivan's Global SIEM/LM Market Penetration Leadership Award and was named a Top Workplace by the Denver Post. LogRhythm is headquartered in Boulder, Colorado with operations throughout North and South America, Europe and the Asia Pacific region

Media Contact Davida Dinerman MSLGROUP 781-684-0770 LogRhythm@mslgroup.com 

Logo - http://photos.prnewswire.com/prnh/20140917/146696

SOURCE LogRhythm