Levi, Ray & Shoup, Inc.


Recorded Event - The Power of Humans in Cyber Security

Arctic Wolf and LRS will discuss how HUMANS are the first and last line of defense in Cyber Security. We will be discussing their SPiDR’s (Security Posture in Depth Reviews) and how they change the game with our customers and how they help customers on their overall SECURITY JOURNEY! In addition, we will discuss how Arctic Wolf’s SOC provides 24x7 monitoring and triage of all security alerts and events to ease your burden and help you sleep at night. Finally, we will also discuss WHY “Humans” are important for Zero Day Exploit detection and resolution.

Replay Link: https://arcticwolf.zoom.us/rec/share/MECbNnXz16Ix-IFSVV5vzkcq1BmXX7mOUrRbXXZJSdcm1WcZPWlTWJkPmkvUrgq8.b_Ngm7JTgjz3F8rE

2020 Recorded Events - Fundamentals of Cyber Security

A three part web series on the Fundamentals of Cyber Security. In this series we will discuss the Foundations of Security, how to respond if you do find a security violation, and how to investigate your security environment and identify incidents.

Speaker: Frank Welder is a Cyber Security Professional that over the past 10 years has helped customers focus their security strategy and operations. He has worked with customers in North America with a blend of helping their define their necessities and implementing with industry tools and best practices.

June 16, 2020 - Investigating your Security Environment and Incidents

    • See the Entire Field and drill down to what matters
    • Understand the tools of the trade:
      • QRadar Adviser for Watson
      • i2

Click Here to view a recording of this past webinar

May 19, 2020 - Now that you have found the violation of your security Policy - how do you respond?

    • What does Investigate and Respond Look like?
      • QRadar and Resilient
      • Cloud Pak for Security

Click Here to view a recording of this past webinar

April 21, 2020 - Foundations for Security and Watching the Wire

  • Security Use Cases and Demo (QRadar)
    • Cloud Provider
    • Ransomware
    • User Behavior

Click Here to view a recording of this past webinar

Endpoint Security Basics and Why it Should Be Part of Every Organizations Security Strategy

IBM BigFix helps corporations and government agencies achieve smarter, faster endpoint management. It combines endpoint and security management into a single solution that enables IT to see and manage physical and virtual endpoints including servers, desktops, roaming laptops and specialized equipment, such as point-of-sale devices, ATMs and self-service kiosks. As threats emerge, the software allows you to rapidly remediate, protect and report on endpoints in real-time. By automating time-intensive tasks across complex networks, they control costs while reducing risk and supporting compliance. IBM BigFix can be deployed in days for any network size or configuration, providing a very rapid return on investment (ROI).

Register to view a recorded LRS® IT Solutions webinar on the IBM® BigFix platform. 


Topics covered:

  • Perennial endpoint issues
  • BigFix patches
  • Competitive differentiators
  • Success stories