IBM Security QRadar SIEM: Deep dive into ML in SIEM to Baseline Network Activity Webinar

 View Only

IBM Security QRadar SIEM: Deep dive into ML in SIEM to Baseline Network Activity Webinar 

12 days ago

Watch the On-Demand Webinar Today

The slides are available to download below.

Summary

As attackers become more sophisticated in their techniques, IOC and signature-based threat detection are no longer adequate. Organizations must also be able to detect subtle changes within the network, user, or system behavior that may indicate existing unknown threats while minimizing false positives. Advanced analytics and AI are critical for automatically detecting new or unknown threat activity across networks.

QRadar SIEM uses network threat analytics (NTA) to enhance the detection capability of your QRadar environment while enabling “threat hunting” across your networks.

In this webinar, we will focus on:

  • How ML baselines network environments to analyze network activity
  • Demo: We’ll take a look at the new NTA dashboard, deep dive into findings from MITRE, scoring, flow records and how to navigate them, how to take advantage of network maps, how to do filters and quick searches, and how to pivot out of NTA

Key Speakers



Jackie Lehmann - Program Director, Product Marketing QRadar XDR Suite & NDR



Amber Borgersen - PM GTM Strategy & Enablement, QRadar SIEM

Travis Miller - Security Specialist

Statistics

0 Favorited
3 Views
0 Files
0 Shares
0 Downloads