Webinars
A CISO’s Guide to the AI Opportunity in Security Operations
September 29, 2023
Read MoreIf you’re looking for documentation or training materials follow the links below.
See our documentation
A CISO’s Guide to the AI Opportunity in Security Operations
September 29, 2023
Using Cribl Observability Pipelines to Optimize Cloud-Native SIEM
August 3, 2023
Bots in SOCs: The Rise of AI in Security Operations Centers
August 2, 2023
Leveraging AI to Monitor, Analyse and Respond to Threats
July 21, 2023
Exabeam and RiverSafe: Inside Out – Mastering the Art of Insider Threat Defence
July 21, 2023
CISO Q&A — Solving Insider Threats
July 13, 2023
Taking Your SIEM Solution to the Next Level – The Power of SIEM in the Cloud
July 6, 2023
What is the Future of AI in IT and Security?
June 22, 2023
The Hidden Threat: Understanding Insider Risks
March 13, 2023
Not all SIEMs are Created Equal
February 22, 2023
Overcoming the Limitations of Addressing Insider Threat: Real Solutions for Real Security Challenges with Exabeam
February 16, 2023
Using Behavior Analytics to Stave Off Compromised Credential Attacks
January 9, 2023
Google Cloud Marketplace Video Series: The SIEM Leader for Security Operations
November 16, 2022
How to Build an Insider Threat Program with Exabeam
October 17, 2022
Introducing Exabeam SIEM: Cloud-native SIEM at Hyperscale
October 17, 2022
Exabeam Security Log Management: Powerful and Affordable Log Management Solution, Purpose-built for Security
October 17, 2022
Overview of Exabeam’s SIEM & Security Analytics Product Innovations
October 7, 2022
The CISOs Response Plan After a Breach
June 22, 2022
Exabeam & Pentera: Ein unschlagbares Duo
May 4, 2022
A CISO’s Guide to Communicating Risk
April 27, 2022
Maturing the CISO Role
April 15, 2022
Planning Before the Breach: You Can’t Protect What You Can’t See
February 4, 2022
The Responsibility of Risk
February 3, 2022
Supply Chain Breaches and other OT/IoT Scenarios
February 3, 2022
Fantastic Attack Types and How to Find Them
February 3, 2022
Start Your SOC Workflow with Exabeam Alert Triage
January 30, 2022
The 5 Claims Your SIEM Vendor Should Never Make… And They Did
January 24, 2022
Protecting Your Blindspots Against Insider Threats and Other Attacks, Featuring Forrester
January 19, 2022
See How We Protect Your Business From Insider Threats
January 19, 2022
Mapping AI to Your Security Posture and Avoiding Overlooked Threats
January 18, 2022
How Do You Know if Your SOC is Relevant?
January 18, 2022
Moving Past Feeds and Speeds: Creating an Outcome Based SOC
October 8, 2021
Top Three Reasons to Replace Your Existing SIEM with Exabeam
August 26, 2021
Top Five Reasons to Augment your Existing SIEM with Exabeam Fusion XDR
August 23, 2021
Differentiating Legitimate Activity from Adversarial Behavior to Detect Account Manipulation using Exabeam
August 20, 2021
Safeguard Your Most Precious Assets by Mitigating Privileged User Attacks with Exabeam
August 10, 2021
Want to Up Your Game Against Lateral Movement?
August 3, 2021
Curious About the Best Defense Against Compromised Credentials?
July 27, 2021
Looking to Automate Your Threat Detection, Investigation and Response (TDIR)?
July 20, 2021
Tips en best practices voor het detecteren en mitigeren van bedreigingen en ‘malicious’ insiders
June 30, 2021
Les derniers tips & pratiques pour réduire les risques associés aux utilisateurs malveillants
June 23, 2021
The Latest Tips and Best Practices for Mitigating Threats and Malicious Insiders – Italian
June 23, 2021
Die neuesten Tipps und Best Practices zur Eindämmung von Bedrohungen und bösartigen Insidern
June 15, 2021
Mitigating Privileged Activity Threats with Exabeam
June 10, 2021
The New CISO Foundations: Building an Insider Threat Program from Scratch
June 10, 2021
The Future Role of the CISO
June 9, 2021
Have You Got Alert Fatigue? Managing Threat Inflation in the Pandemic and Beyond
June 9, 2021
Malicious Or Non-malicious? Tackling The Remote Insider Threat
June 8, 2021
How Security Leaders Can Increase Coverage of Insider Threats
April 28, 2021
The Latest Tips and Best Practices for Mitigating Threats and Malicious Insiders
April 22, 2021
Addressing Insider Risk in a Remote World – A Code42 + Exabeam
February 4, 2021
The Top 10 UEBA Use Cases for Today’s SOCs
January 22, 2021
Escaping Dante’s SOC Inferno – The Season Finale!
December 17, 2020
Heresy leads to Anger, Anger leads to Greed, Greed leads to…SOC inferno
November 19, 2020
Treachery, Fraud, and Violence – Just Another Day In the SOC?
November 17, 2020
Detecting Insider Threats: Actionable Tips to Get Ahead of Insiders
September 29, 2020
How to Securely Accelerate Your Move to the Cloud
August 24, 2020
Human Brains for Human Problems: Successfully using ML and Automation in the SOC
August 7, 2020
Building Resilience for Advanced Attacks and Insider Threats in the “New Normal”
July 9, 2020
The State of the SOC 2020: Measuring Effectiveness and Readiness
June 30, 2020
Closed Loop Integrated Security with Exabeam & Netskope
June 30, 2020
Bridging the Security Skills Gap: Human & AI Threat Intel Working Together
June 25, 2020
Adapting Security Programs for an Unprecedented Future
June 24, 2020
Machine Learning & Automation in the SOC
June 5, 2020
How to build a budget friendly security battle squad
May 28, 2020
Using the MITRE ATT&CK® Framework for Detection and Threat Hunting
May 8, 2020
Securing the Shift to Cloud-based Business Operations
April 15, 2020
Cisco and Exabeam: A Cloud-Based Approach for Insider Threat Management
April 13, 2020
SOC-from-home: Actionable Insights for Security Practitioners
April 9, 2020
Security Log Deep Dive
March 30, 2020
Eight Cybersecurity Predictions for 2020
November 26, 2019
Insider Risk Management: Adapting to the Evolving Security Landscape
November 19, 2019
How to Increase SOC Analyst Productivity and Security Effectiveness
October 15, 2019
Modern Threat Hunting And Response: How TTPs Are Changing The Game
August 7, 2019
2019 State of the SOC
July 22, 2019
Eight Steps for Migrating Your SIEM
March 4, 2019
2018 State of the SOC
December 4, 2018
Cyber Threat Intelligence Inside Your Organization
November 16, 2018
Cloud Security Monitoring and Analytics
October 11, 2018
10 Must-Have Features of a Modern SIEM
September 7, 2018
Security Symptoms vs. Causes: How Leading CISOs Develop World Class Detection and Response
August 2, 2018
Mitigating the risk of IoT security with Exabeam
May 29, 2018
How to Find Malicious Insiders: Tackling Insider Threats via Behavioral Indicators
April 27, 2018
How to do Logon Session Auditing with the Windows Security Log
February 27, 2018
Detect Insider Threats Across Your Entire Infrastructure in Real Time
February 2, 2018
Enhancing SOC Capacity by Combining Cisco and Exabeam
January 16, 2018
Digital Forensics and Incident Response 101: Triage Collection
January 5, 2018
How to Investigate Insider Threats using Web Browser Forensics
November 27, 2017
2017 Cybersecurity State of Play and Where We’re Headed
November 2, 2017
Closing the Skills Gap Chasm with Automation and Actionable Analytics
October 6, 2017
Analytics and Identity – Closing the Loop
July 6, 2017
Counteracting a Ransomware Attack: What You Need to Know
May 11, 2017
Step-By-Step Incident Response for Top 3 Security Scenarios
April 18, 2017
7 Ways UEBA Breaks Down Barriers in Traditional Cyber Defense
March 13, 2017
The San Fran Muni Ransomware Attack: What Really Happened
January 30, 2017
Bracing for the Next Big Attack? How to Build an Effective Incident Response Plan
January 24, 2017
How to Make the Case for SOC Automation
November 21, 2016
How Security Analysts Master Incident Response with Behavioral Analytics
September 22, 2016
25 User Behavior Analytics that Indicate Malicious Insider or Compromised Account
August 30, 2016
Applying Data Science to User and Entity Behavior Analytics
June 15, 2016
How to Leverage Behavioral Analytics to Reduce Insider Threat
June 7, 2016