Company

Live, on-demand and industry events

Live events

Vectra Bootcamp

1 March 2017 Time: 9:30 a.m. PST

Vectra Bootcamp is a live 30-minute introduction to the Vectra product and its underlying technology. Each session provides a foundation for understanding how Vectra can detect hidden cyber threats while making your security team run faster and more efficient. We will provide a live demonstration and include interactive Q&A to answer any questions you may have. 

Register Today

Automatically quarantine endpoints based on network attack behavior detections

8 March 2017 Time: 9:30 a.m. PST

Join Albert Caballero, chief information security officer for HBO Latin America, to learn how to automatically pivot from real-time attack behavior detections in the Vectra UI to Carbon Black Response to expedite forensic investigation and isolate compromised hosts.

Register Today

On-Demand Webcasts

Automatically correlate attacker behavior detections and Splunk events

Join Albert Caballero, chief information security officer for HBO Latin America, to learn how to automatically correlate real-time attacker behaviors detected by the Vectra cybersecurity platform with events in Splunk Enterprise.

Register Today

Why data center attackers are aiming low

While most data center security has focused on protecting the virtualized layers, real-world attackers are increasingly subverting the data center's physical infrastructure. This webcast analyzes the reality of data center cybersecurity, including:

- The hidden role of infrastructure in the data center attack surface
- An analysis of recent attack tools and how they can be used in a targeted attack
- Understanding the sanctioned backdoors into your data center and how attackers use them 

Register Today

Detecting advanced threats using network traffic analysis

Gartner

Network traffic analysis can be effective for detecting advanced threats including malware and targeted attacks. It covers a fairly broad category that includes analyzing NetFlow records, monitoring DNS traffic and direct analysis of internal traffic with data science.

Register Today

Insider threats – How to prevent, detect and remediate insider attacks

Join Vectra for a discussion about insider threats and what cybersecurity professionals are doing to prevent, detect and remediate insider attacks.

Register Today

The expanding role of data analytics in threat detection

The SANS Institute

Recent SANS studies on malware, intrusion prevention and cyber threat intelligence agree that almost every organization, no matter how well prepared, is infected with malware to some degree and that many show signs of malicious activity.


This webinar provides insight and guidance about:
- The characteristics of the technologies being used in this modern age of intelligence-driven threat detection
- How this new type of threat detection differs from more traditional methods
- How data analytics affects existing security frameworks and complement critical security controls"

Register Today

Detecting and preventing cyberattacks in your network

University Business

Tune in to this web seminar to learn about threats, as well as the new defense-in-depth models that can quickly pinpoint and mitigate threats in progress. Hernan Londono, associate CIO at Barry University in Miami, will share strategies to detect and mitigate in-progress cyberattacks, how Automated Threat Management can reduce risk, and how to meet university security requirements while providing an open and collaborative learning environment that embraces BYOD and mobility.

Register Today

Shouldn’t intrusion detection systems actually detect intrusions?

InformationWeek/DarkReading

IDS has lost its ability to spot cyber intrusions. Sophisticated attackers are using more evasive, strategic intrusions to spread rapidly through networks. This webinar analyzes new approaches to IDS and how they detect today’s most advanced cyber attacks.

Register Today

How to detect hidden cyberattack communications inside today’s networks

InformationWeek/DarkReading

Today’s cyber attackers survive by hiding their attack communications from the prying eyes of security. It’s a critical part of their attack arsenal and it lets them patiently manage and propagate attacks throughout your network, undetected.

Register Today

Building resilient security with network-based threat detection

Securosis

Prevention alone is not enough. IDS, SIEM tools and other traditional threat detection methods aren’t solving the problem, either. Join host Mike Rothman, president of Securosis, who will share perspectives from his research report, Network-Based Threat Detection. Vectra CSO Gunter Ollmann will also share real-world examples and observations from the field.

Register Today

The new rules of engagement for breach detection

Forrester

Forrester Principal Analyst John Kinderwag will explain the new rules of engagement for automating the response to network breaches. Also, Wade Williamson, director of threat analytics at Vectra, will expose real-world cyber-attack techniques and reveal new detection methodologies that can identify active threats before data is stolen.

Register Today

Hostage crisis survival: The ransomware pandemic

Tune-in to hear Jacob Sendowski, Ph.D., senior product manager at Vectra Networks and Wade Williamson, direct of threat analytics at Vectra Networks discuss ransomware, the implications for enterprises, and steps that can be taken to help IT organizations address the risks.

Register Today

Making cybersecurity manageable with high-fidelity security

EMA

Join David Monahan, research director at leading IT analyst firm Enterprise Management Associates (EMA), and Wade Williamson, director of threat analytics at Vectra Networks, to learn how to implement high-fidelity security to manage today’s most challenging threats, efficiently and effectively.

Register Today

The hidden role of IoT in cyber attacks

Networked IoT devices – printers, cameras and even advanced devices like MRI scanners – can pose an alarming cybersecurity risk. While they don’t fit the bill of a traditional network host, they represent fruitful targets and vectors for cyber attackers.

In this live webinar, we will dive into examples of how attackers target and use IoT device vulnerabilities to their advantage, and how IT security organizations can stop this emerging threat.

Register Today

Protecting healthcare organizations from cyber attacks

Connie Barrera, CISO of the internationally recognized Jackson Health System in Miami, will talk about the rising tide of cyber attacks and medical device vulnerabilities that are threatening healthcare organizations and how automated threat management has played a key role in mitigating this ominous problem – without requiring additional headcount.

Register Today