Webinars Archives - Exabeam

Content Library

Discover more about the Exabeam Security Operations Platform, learn about the latest in SecOps, and find resources to help mature your SOC. Browse by content type or explore our featured picks below.
Already a customer?

If you’re looking for documentation or training materials follow the links below.

See our documentation
See our training material

Webinars


Recent

Webinars

Three Ways to Get More Value from Microsoft Sentinel

May 15, 2024 | 10 a.m. PT / 1 a.m. ET

Read More

All Webinars

Three Ways to Get More Value from Microsoft Sentinel
May 15, 2024 | 10 a.m. PT / 1 a.m. ET

Read More

Three Ways to Get More Value from Microsoft Sentinel (APJ)
May 15, 2024 | 11 a.m. SGT

Read More

Three Ways to Get More Value from Microsoft Sentinel (EMEA)
May 15, 2024 | 10 a.m. GMT

Read More

Unlock the Secrets of Cybersecurity Investments 
February 12, 2024

Read More

Unlock the Secrets of Cybersecurity Investments (EMEA) 
March 27 | 10:00 a.m. GMT

Read More

Unlock the Secrets of Cybersecurity Investments (APJ) 
March 27 | 11:00 a.m. SGT

Read More

Critical Security Lessons Airlines Need to Know
January 21, 2024

Read More

Business Rewards vs. Security Risks of Generative AI – Executive Panel
January 8, 2024

Read More

A CISO’s Guide to the AI Opportunity in Security Operations
September 29, 2023

Read More

Using Cribl Observability Pipelines to Optimize Cloud-Native SIEM
August 3, 2023

Read More

Bots in SOCs: The Rise of AI in Security Operations Centers
August 2, 2023

Read More

Leveraging AI to Monitor, Analyse and Respond to Threats
July 21, 2023

Read More

Exabeam and RiverSafe: Inside Out – Mastering the Art of Insider Threat Defence
July 21, 2023

Read More

CISO Q&A — Solving Insider Threats
July 13, 2023

Read More

Taking Your SIEM Solution to the Next Level – The Power of SIEM in the Cloud
July 6, 2023

Read More

What is the Future of AI in IT and Security?
June 22, 2023

Read More

The Hidden Threat: Understanding Insider Risks
March 13, 2023

Read More

Not all SIEMs are Created Equal
February 22, 2023

Read More

Overcoming the Limitations of Addressing Insider Threat: Real Solutions for Real Security Challenges with Exabeam
February 16, 2023

Read More

Using Behavior Analytics to Stave Off Compromised Credential Attacks
January 9, 2023

Read More

Google Cloud Marketplace Video Series: The SIEM Leader for Security Operations
November 16, 2022

Read More

How to Build an Insider Threat Program with Exabeam
October 17, 2022

Read More

Introducing Exabeam SIEM: Cloud-native SIEM at Hyperscale
October 17, 2022

Read More

Exabeam Security Log Management: Powerful and Affordable Log Management Solution, Purpose-built for Security
October 17, 2022

Read More

Overview of Exabeam’s SIEM & Security Analytics Product Innovations
October 7, 2022

Read More

The CISOs Response Plan After a Breach
June 22, 2022

Read More

Exabeam & Pentera: Ein unschlagbares Duo
May 4, 2022

Read More

A CISO’s Guide to Communicating Risk
April 27, 2022

Read More

Maturing the CISO Role
April 15, 2022

Read More

Planning Before the Breach: You Can’t Protect What You Can’t See
February 4, 2022

Read More

The Responsibility of Risk
February 3, 2022

Read More

Supply Chain Breaches and other OT/IoT Scenarios
February 3, 2022

Read More

Fantastic Attack Types and How to Find Them
February 3, 2022

Read More

Start Your SOC Workflow with Exabeam Alert Triage
January 30, 2022

Read More

The 5 Claims Your SIEM Vendor Should Never Make… And They Did
January 24, 2022

Read More

Protecting Your Blindspots Against Insider Threats and Other Attacks, Featuring Forrester
January 19, 2022

Read More

See How We Protect Your Business From Insider Threats
January 19, 2022

Read More

Mapping AI to Your Security Posture and Avoiding Overlooked Threats
January 18, 2022

Read More

How Do You Know if Your SOC is Relevant?
January 18, 2022

Read More

Moving Past Feeds and Speeds: Creating an Outcome Based SOC
October 8, 2021

Read More

Top Three Reasons to Replace Your Existing SIEM with Exabeam
August 26, 2021

Read More

Top Five Reasons to Augment your Existing SIEM with Exabeam Fusion XDR
August 23, 2021

Read More

Differentiating Legitimate Activity from Adversarial Behavior to Detect Account Manipulation using Exabeam
August 20, 2021

Read More

Safeguard Your Most Precious Assets by Mitigating Privileged User Attacks with Exabeam
August 10, 2021

Read More

Want to Up Your Game Against Lateral Movement?
August 3, 2021

Read More

Curious About the Best Defense Against Compromised Credentials?
July 27, 2021

Read More

Looking to Automate Your Threat Detection, Investigation and Response (TDIR)?
July 20, 2021

Read More

Tips en best practices voor het detecteren en mitigeren van bedreigingen en ‘malicious’ insiders
June 30, 2021

Read More

Les derniers tips & pratiques pour réduire les risques associés aux utilisateurs malveillants
June 23, 2021

Read More

The Latest Tips and Best Practices for Mitigating Threats and Malicious Insiders – Italian
June 23, 2021

Read More

Die neuesten Tipps und Best Practices zur Eindämmung von Bedrohungen und bösartigen Insidern
June 15, 2021

Read More

Mitigating Privileged Activity Threats with Exabeam
June 10, 2021

Read More

The New CISO Foundations: Building an Insider Threat Program from Scratch
June 10, 2021

Read More

The Future Role of the CISO
June 9, 2021

Read More

Have You Got Alert Fatigue? Managing Threat Inflation in the Pandemic and Beyond
June 9, 2021

Read More

Malicious Or Non-malicious? Tackling The Remote Insider Threat
June 8, 2021

Read More

How Security Leaders Can Increase Coverage of Insider Threats
April 28, 2021

Read More

The Latest Tips and Best Practices for Mitigating Threats and Malicious Insiders
April 22, 2021

Read More

Addressing Insider Risk in a Remote World – A Code42 + Exabeam
February 4, 2021

Read More

The Top 10 UEBA Use Cases for Today’s SOCs
January 22, 2021

Read More

Escaping Dante’s SOC Inferno – The Season Finale!
December 17, 2020

Read More

Heresy leads to Anger, Anger leads to Greed, Greed leads to…SOC inferno
November 19, 2020

Read More

Treachery, Fraud, and Violence – Just Another Day In the SOC?
November 17, 2020

Read More

Detecting Insider Threats: Actionable Tips to Get Ahead of Insiders
September 29, 2020

Read More

How to Securely Accelerate Your Move to the Cloud
August 24, 2020

Read More

Human Brains for Human Problems: Successfully using ML and Automation in the SOC
August 7, 2020

Read More

Building Resilience for Advanced Attacks and Insider Threats in the “New Normal”
July 9, 2020

Read More

The State of the SOC 2020: Measuring Effectiveness and Readiness
June 30, 2020

Read More

Closed Loop Integrated Security with Exabeam & Netskope
June 30, 2020

Read More

Bridging the Security Skills Gap: Human & AI Threat Intel Working Together
June 25, 2020

Read More

Adapting Security Programs for an Unprecedented Future
June 24, 2020

Read More

Machine Learning & Automation in the SOC
June 5, 2020

Read More

How to build a budget friendly security battle squad
May 28, 2020

Read More

Using the MITRE ATT&CK® Framework for Detection and Threat Hunting
May 8, 2020

Read More

Securing the Shift to Cloud-based Business Operations
April 15, 2020

Read More

Cisco and Exabeam: A Cloud-Based Approach for Insider Threat Management
April 13, 2020

Read More

SOC-from-home: Actionable Insights for Security Practitioners
April 9, 2020

Read More

Security Log Deep Dive
March 30, 2020

Read More

Eight Cybersecurity Predictions for 2020
November 26, 2019

Read More

Insider Risk Management: Adapting to the Evolving Security Landscape
November 19, 2019

Read More

How to Increase SOC Analyst Productivity and Security Effectiveness
October 15, 2019

Read More

Modern Threat Hunting And Response: How TTPs Are Changing The Game
August 7, 2019

Read More

2019 State of the SOC
July 22, 2019

Read More

Eight Steps for Migrating Your SIEM
March 4, 2019

Read More

2018 State of the SOC
December 4, 2018

Read More

Cyber Threat Intelligence Inside Your Organization
November 16, 2018

Read More

Cloud Security Monitoring and Analytics
October 11, 2018

Read More

10 Must-Have Features of a Modern SIEM
September 7, 2018

Read More

Security Symptoms vs. Causes: How Leading CISOs Develop World Class Detection and Response
August 2, 2018

Read More

Mitigating the risk of IoT security with Exabeam
May 29, 2018

Read More

How to Find Malicious Insiders: Tackling Insider Threats via Behavioral Indicators
April 27, 2018

Read More

How to do Logon Session Auditing with the Windows Security Log
February 27, 2018

Read More

Detect Insider Threats Across Your Entire Infrastructure in Real Time
February 2, 2018

Read More

Enhancing SOC Capacity by Combining Cisco and Exabeam
January 16, 2018

Read More

Digital Forensics and Incident Response 101: Triage Collection
January 5, 2018

Read More

How to Investigate Insider Threats using Web Browser Forensics
November 27, 2017

Read More

2017 Cybersecurity State of Play and Where We’re Headed
November 2, 2017

Read More

Closing the Skills Gap Chasm with Automation and Actionable Analytics
October 6, 2017

Read More

Analytics and Identity – Closing the Loop
July 6, 2017

Read More

Counteracting a Ransomware Attack: What You Need to Know
May 11, 2017

Read More

Step-By-Step Incident Response for Top 3 Security Scenarios
April 18, 2017

Read More

7 Ways UEBA Breaks Down Barriers in Traditional Cyber Defense
March 13, 2017

Read More

The San Fran Muni Ransomware Attack: What Really Happened
January 30, 2017

Read More

Bracing for the Next Big Attack? How to Build an Effective Incident Response Plan
January 24, 2017

Read More

How to Make the Case for SOC Automation
November 21, 2016

Read More

How Security Analysts Master Incident Response with Behavioral Analytics
September 22, 2016

Read More

25 User Behavior Analytics that Indicate Malicious Insider or Compromised Account
August 30, 2016

Read More

Applying Data Science to User and Entity Behavior Analytics
June 15, 2016

Read More

How to Leverage Behavioral Analytics to Reduce Insider Threat
June 7, 2016

Read More