Company

Live, on-demand and industry events

Live Events

Learn how Vectra AI lets Ticketmaster automate threat hunting

1 November 2017, 9:30 a.m. PDT

Don't miss this 30 minute session with Beau Canada, vice president of information security at Ticketmaster, as he will explain how artificial intelligence in the Vectra cybersecurity platform automates the hunt for hidden cyber attackers inside the organization's network. Learn how AI has helped secure transactions with more than 400 million fans and protects the brand identity of more than 20 countries. 

Register Today

Vectra Bootcamp

15 November 2017, 9:30 a.m. PDT

The Vectra Bootcamp offers a live 30-minute introduction to the Vectra product and its underlying technology. In this session we will provide a foundation for understanding how Vectra can help you detect even the most advanced threats while making your security team faster and more efficient. We will provide a live demonstration and include interactive Q&A to answer any questions you may have.

Register Today

Industry Events

15th Annual Information Security Summit

Nov 2-3, Cleveland I-X Center

Attend Vectra RSM Chris Haley's session Addressing the Cyber Security Talent Shortage through Automation at the 15th Annual Information Security Summit. 

Register Here

On-Demand Webcasts

Ransomware keeps working 24/7, why aren't you?

Join Vectra and Demisto as they discuss turning threat detections into action by integrating with other leading security solutions to stop in-progress cyber attacks and quarantine compromised host devices. 

Register Today

How AI detects and mitigates attacks in the software-defined data center

Join Vectra and VMware as they discuss cybersecurity challenges in virtualized environments and how their integration improves visibility into hidden cyber attacks in data centers, enabling faster threat detection, response and mitigation.

Register Today

Post-Intrusion Report, 1Q 2017

The 2017 Post-Intrusion Report reveals cyber attack detections and trends from nearly 200 Vectra enterprise customers across 13 different industries. By examining attacker behaviors, Vectra shows where potential exposure and risk exist inside networks and uncovers strong indicators of potentially damaging data breaches.

Register Today

Are you drowning looking for threats in a data lake?

Dan Basile, executive director of the Security Operations Center at the Texas A&M University System, talks about core capabilities of the SOC and how to make it smarter using artificial intelligence. 

Register Today

How to quickly detect and stop hidden cyber attackers in the public cloud

Join Vectra and Gigamon for this compelling look at how you can detect and respond faster to cyber attackers that hide in your physical, virtual and cloud network infrastructures.

Register Today

Ransomware pandemic special

On Friday, May 12, 2017 a ransomware attack spread very rapidly among unpatched Windows systems worldwide.

Advances in AI augmenting security teams, is seeing the industry shift to identifying attacker behavior in real time. Attend this webinar to learn more about the attack and how Vectra®Networks automates the hunt for hidden cyber attacks.

Register Today

Automatically quarantine endpoints based on network attack behavior detections

Join Albert Caballero, information security officer for HBO Latin America, to learn how to automatically pivot from real-time attack behavior detections in the Vectra UI to Carbon Black Response to expedite forensic investigation and isolate compromised hosts.

Register Today

Automatically correlate attacker behavior detections and Splunk events

Join Albert Caballero, chief information security officer for HBO Latin America, to learn how to automatically correlate real-time attacker behaviors detected by the Vectra cybersecurity platform with events in Splunk Enterprise.

Register Today

Why data center attackers are aiming low

While most data center security has focused on protecting the virtualized layers, real-world attackers are increasingly subverting the data center's physical infrastructure. This webcast analyzes the reality of data center cybersecurity. 

Register Today

Insider threats – How to prevent, detect and remediate insider attacks

Join Vectra for a discussion about insider threats and what cybersecurity professionals are doing to prevent, detect and remediate insider attacks.

Register Today

The expanding role of data analytics in threat detection

The SANS Institute

Recent SANS studies on malware, intrusion prevention and cyber threat intelligence agree that almost every organization, no matter how well prepared, is infected with malware to some degree and that many show signs of malicious activity.


This webinar provides insight and guidance about:
- The characteristics of the technologies being used in this modern age of intelligence-driven threat detection
- How this new type of threat detection differs from more traditional methods
- How data analytics affects existing security frameworks and complement critical security controls"

Register Today

Shouldn’t intrusion detection systems actually detect intrusions?

InformationWeek/DarkReading

IDS has lost its ability to spot cyber intrusions. Sophisticated attackers are using more evasive, strategic intrusions to spread rapidly through networks. This webinar analyzes new approaches to IDS and how they detect today’s most advanced cyber attacks.

Register Today

How to detect hidden cyberattack communications inside today’s networks

InformationWeek/DarkReading

Today’s cyber attackers survive by hiding their attack communications from the prying eyes of security. It’s a critical part of their attack arsenal and it lets them patiently manage and propagate attacks throughout your network, undetected.

Register Today

Building resilient security with network-based threat detection

Securosis

Prevention alone is not enough. IDS, SIEM tools and other traditional threat detection methods aren’t solving the problem, either. Join host Mike Rothman, president of Securosis, who will share perspectives from his research report, Network-Based Threat Detection. Vectra CSO Gunter Ollmann will also share real-world examples and observations from the field.

Register Today

The new rules of engagement for breach detection

Forrester

Forrester Principal Analyst John Kinderwag will explain the new rules of engagement for automating the response to network breaches. Also, Wade Williamson, director of threat analytics at Vectra, will expose real-world cyber-attack techniques and reveal new detection methodologies that can identify active threats before data is stolen.

Register Today

Hostage crisis survival: The ransomware pandemic

Tune-in to hear Jacob Sendowski, Ph.D., senior product manager at Vectra Networks and Wade Williamson, direct of threat analytics at Vectra Networks discuss ransomware, the implications for enterprises, and steps that can be taken to help IT organizations address the risks.

Register Today

Making cybersecurity manageable with high-fidelity security

EMA

Join David Monahan, research director at leading IT analyst firm Enterprise Management Associates (EMA), and Wade Williamson, director of threat analytics at Vectra Networks, to learn how to implement high-fidelity security to manage today’s most challenging threats, efficiently and effectively.

Register Today

The hidden role of IoT in cyber attacks

Networked IoT devices – printers, cameras and even advanced devices like MRI scanners – can pose an alarming cybersecurity risk. While they don’t fit the bill of a traditional network host, they represent fruitful targets and vectors for cyber attackers.

In this live webinar, we will dive into examples of how attackers target and use IoT device vulnerabilities to their advantage, and how IT security organizations can stop this emerging threat.

Register Today

Protecting healthcare organizations from cyber attacks

Connie Barrera, CISO of the internationally recognized Jackson Health System in Miami, will talk about the rising tide of cyber attacks and medical device vulnerabilities that are threatening healthcare organizations and how automated threat management has played a key role in mitigating this ominous problem – without requiring additional headcount.

Register Today

Detecting and preventing cyberattacks in your network-University Business

In this webinar with University Business magazine, Vectra and Barry University discuss the importance of real-time threat detection to stop cyber attackers as they spy, spread and steal critical assets from the network. 

Register Today