Securing the Cloud with SIEM

Manage webcast
Marc Blackmer, Senior Product Marketing Manager, Solutions at HP Enterprise Security
Organizations are adopting cloud services at a very fast pace, driven by the cost effectiveness, speed/time to market and better performance and availability cloud adoption provides. However the security of data and access in the cloud is still a major cause for concern. Even if the organization is comfortable with a cloud service provider’s security posture, they are often surprised to find they are ultimately responsible for securing their own data. Fortunately security event and information management (SIEM) solutions are able to extend information and access controls to cloud in addition to physical and virtual environments. This webinar will dive into the various options available to organizations to help them ensure a secure cloud services environment.
May 24 2012
39 mins
Securing the Cloud with SIEM
More from this community:

Cloud Computing

  • Live and recorded (4709)
  • Upcoming (91)
  • Date
  • Rating
  • Views
  • Channel
  • Channel profile
  • For Security Sake: Consolidate Your Secure Remote Access Infrastructure Jul 14 2015 5:00 pm UTC 60 mins
    Prakash Mana, Director of Product Management, Citrix; Akhilesh Dhawan, Principal Product Marketing Manager, Citrix
    Securely managing a cohesive network infrastructure of essential enterprise apps and data has never been more challenging. In this webinar, we will cover day-in-the-life scenarios, highlighting challenges faced by IT teams in providing secure remote access to support mobility and security via centrally hosted applications, data and systems. We will then discuss how consolidating multiple access gateways, including mobile-specific gateways and classic SSL VPNs, with Citrix NetScaler with Unified Gateway helps provide One URL for secure remote access while reducing TCO, simplifying IT, strengthening security and ensuring a high-definition experience for both mobile and traditional application users.
  • Why Your Firewall Strategy Isn’t Working: All About Internal Network Firewalls Jul 9 2015 6:00 pm UTC 45 mins
    John Maddison, VP of Product Marketing, Fortinet
    No one is trying to reinvent the wheel here, but lets call a spade a spade. The level of threats are increasing, they are advanced, they are persistent and they are costly, so its no surprise traditional firewalls that focus on borders are just not working like they used to. The truth is the internal network is no longer a “trusted” environment, whether a malicious outsider, evil insider or unknowing participant, once inside, threats can spread and do maximum damage. Internal firewalls, while not a new concept, are finally taking hold and the results are a game changer for network protection.

    Fortinet is proud to present, Why Your Firewall Strategy Isn’t Working, Let’s Talk About Internal Network Firewalls, a deep dive into why INFW is the new “must have” in the ever shifting threat landscape.

    - Discover how multiple layers of defense are the new standard for highly-sophisticated attacks that are getting past border defenses.
    - Learn how INFW is different as a compliment to existing Firewalls and various deployment scenarios
    - Understand how a single device can work efficiently in multiple segments

    Don’t Miss, Why Your Firewall Strategy Isn’t Working, Let’s Talk About Internal Network Firewalls, and learn how an Internal Network Firewall can provide the necessary inside-out network protection you need to protect your critical data against advanced threats.
  • Mac Security for Business Jul 8 2015 5:00 pm UTC 60 mins
    Dave Howard, Instructional Designer and Don Lewis, Solutions Marketing Manager
    Learn how to protect the Mac platform in your business.
  • Hackers, Attackers, and Criminals -The never ending, dynamic and evolving threat Jul 8 2015 3:00 pm UTC 45 mins
    Carlos A. Fernandes, CISSP, CEO, Agile Cybersecurity Solutions
    Cybercrime continues to increase, with nearly 100% of Forbes Global 2000 companies reporting data breaches within the last 12 months.
    It is estimated that over 200 nations have Intelligence capabilities and their #1 target is the United States. Cyber tools, used for exploitation, can also be used for cyber attacks. These capabilities are being built by the 1,000s. The result is that most US corporations have been penetrated. Furthermore, most network security appliances may stop a novice attack but they are no match for a sophisticated threat actor. The presentation will explore the evolving threat, why we should care, and what we can and cannot do to counter this never ending, dynamic and evolving threat.
  • Data Immunization: A New Approach to Protect Against the Insider Threat Jul 8 2015 3:00 pm UTC 45 mins
    Eyal Manor, VP Product Management, Secure Islands
    Organizations spend millions to protect data from outside threats, but are investing far less to protect themselves against attacked from inside. Security experts agree that there is currently no way of completely block hacks or prevent insiders from leaking information. But is the situation completely hopeless?

    This session will present a new paradigm for keeping sensitive data safe by classifying and protecting it at the source. How to enhance the performance of DLP? How to enable collaboration and BYOD in a secure manner? How can you track all organizational data and pinpoint risk? How can you make the threat of data theft and loss irrelevant?

    Join our session to learn the answer.
  • Cloud Attack: Unsharing Your Business in The Cloud Jul 8 2015 3:00 pm UTC 45 mins
    Jason Hart, VP Cloud Solutions - Gemalto
    In this presentation we will examine real cases that show how vulnerable cloud and virtual environments can be without the correct controls. You will see how easily controls can be bypassed and compromised, why software keys are simply not good enough, and how your personal life threatens your business and work life. Join us on July 8th to learn what we call, unsharing your data.
  • Myth or Reality: Insider Threat Victims DON'T Have Their Heads in the Cloud Jul 8 2015 2:00 pm UTC 45 mins
    Evelyn de Souza, Data Governance Workgroup Chair, Cloud Security Alliance & Data Privacy and Compliance Leader, Cisco Systems
    We can safely predict that an insider threat targeting cloud will be the cause of a major data breach over the next 12 months. While cloud insider threats consistently rank as a top concern, they have not been decomposed and mitigated like enterprise exploits. We will uncover threat vectors and behavioural traits and present new techniques for discovering and mitigating cloud insider threats. This webcast will also include a breakdown and comparison of different cloud models.

    Attendees will also learn:

    • Techniques for reconstructing audit trails to help with the deconstructing of an insider threat

    • Ways to quickly recover from the effects of an insider threat to minimize business disruption and impact
  • Complex Incident Response Investigations: How to Minimise Breach Impact Jul 8 2015 1:00 pm UTC 60 mins
    Rafe Pilling, Senior Security Researcher, Dell SecureWorks
    How prepared are you for a data breach?

    With the threat environment growing more complex, and the rise in advanced and targeted attacks, how does your response plan hold up? Threat actors have changed their tactics; so must you.

    During this webcast, Rafe Pilling, Senior Security Researcher for Dell SecureWorrks Counter Threat Unit (CTU), will share advice based on real-world examples to help ensure your organisation is infinitely better prepared to respond to a security breach.

    Key topics covered include:

    · A view of the evolving threat landscape and how this could impact you


    · Examples of critical mistakes Dell SecureWorks has viewed in real-world cases


    · Developing a robust incident response plan


    · Maximising the value of current controls and improving your overall security posture
  • Insider Threats – Real Problems and Real Solutions Jul 8 2015 10:00 am UTC 45 mins
    Peter Wood, CEO, First Base Technologies
    Malicious attacks and accidental breaches by insiders present a real threat to organisations of all types. Insiders are uniquely positioned with legitimate access to data, networks and premises, allowing them to effectively bypass firewalls and intrusion detection systems. Pete and his team have conducted hundreds of simulated insider attacks and have found common themes emerge, regardless of business sector or size of business. In this presentation, discover the critical weaknesses that insiders exploit and the key, practical steps to defending against the insider threat.
  • Data-centric Security & Encryption: Keeping Your Critical Data Safe Jul 7 2015 4:45 pm UTC 45 mins
    Albert Biketi, VP & GM, HP Security, Atalla
    Data’s coming at us at a pace never before imagined. Without data-centric protection that secures your sensitive information throughout its entire lifecycle, you’re at risk. The use of data-centric security and encryption solution from HP Atalla and HP Security Voltage can help you rest assured that your data remains inaccessible, even if captured, lost, or stolen. Data breaches are inevitable – get prepared. Join this webinar to learn how to best protect your structured and unstructured data at rest, in motion, and in the cloud. Data-centric security will help you neutralize the potential damage from security breaches.
  • Verisign iDefense 2015 Cyber Threats and Trends Jul 7 2015 3:00 pm UTC 45 mins
    Dee Richartz, Technology Strategist, Verisign
    Our personal and professional attack surfaces have never been greater, and they are only expected to grow as organizations and individuals continue to increase their reliance on the digitally connected world for a variety of tasks.

    Throughout 2014, and into 2015, Verisign iDefense® Security Intelligence Services observed cyber criminals increasing their focus on attacking point-of-sale (PoS) systems and developing and deploying new banking malware. Global events continue to drive a higher frequency and severity of hacktivist activities and pro-state cyber operations. Vulnerable legacy and open-source operating systems continued to complicate the security of critical networks.

    This report presents an overview of the key cyber security trends Verisign has noted and expects to see throughout the remainder of 2015. It features conclusions drawn from Verisign iDefense research and analysis covering cyber-crime, hacktivism and vulnerabilities.
  • The first 24 hours after a breach Jul 7 2015 3:00 pm UTC 45 mins
    Ondrej Krehel, CTO and Founder, LIFARS, LLC
    This session will be about the process that takes place once a data breach occurs. The pressure is extremely high and various teams have to come together in this time of emergency, including incident response team, the board and the executive management, the PR team, risk management and legal. Goals are to strategize and minimize the damage, contain the threat, and ensure that the business continues running in spite of a major incident and at the same time public concerns and pressure are addressed in an efficient manner.

    Talk points:

    Getting the call
    Arriving on scene (first observations and attacker profile analysis)
    Crisis management with key internal tenants
    Evidence collection and preservation, digital forensic investigation and analysis
  • BYOx - Again! Jul 7 2015 1:00 pm UTC 45 mins
    Steve Durbin, Managing Director, ISF Ltd
    As the trend of employees using smartphones and tablets as corporate access devices in the workplace grows, businesses of all sizes continue to see information security risks being exploited. These risks stem from both internal and external threats including mismanagement of the device itself, external manipulation of software vulnerabilities and the deployment of poorly tested, unreliable business applications.

    During this webinar Steve Durbin, Managing Director of ISF, will explain why it is important for organisations to embrace these new technologies to develop and deploy effective enterprise-wide strategies and to safeguard their data.
  • Detecting Malicious Insiders Through Behavioural and Operational Analytics Jul 7 2015 12:00 pm UTC 45 mins
    Vinoth Sivasubramanian, CISO, Alaacart
    Combating insider threats is an extremely daunting task. Even more challenging is to unearth and defend crimes that could be committed by potential malicious insiders who are organized and enjoy a high degree of trust. This presentation shall discuss the current state of insider threats, the detection mechanisms available, why they are not enough and also suggest practical methods that can help detect and prevent potential frauds. Elucidated through a case study, this presentation shall walk you through on how we developed and implemented a framework using BIG DATA technology, user attributes and proven methods of behavioral science to unearth potential malicious insiders. With a detection rate of 90 percent, this is a highly adaptable model and gets easily integrated within your SIEM/Incident management and delivers great Return on Investment.
  • Promoting an Information Security Culture Jul 7 2015 12:00 pm UTC 45 mins
    Shan Lee, Head of Information Security, Just Eat
    Shan Lee is the Head of Information Security at JUST EAT Plc where he is passionate about promoting a "Security Culture" in what is a fast moving and rapidly expanding, multinational environment.

    In this presentation he will touch upon the following subjects: security culture, awareness, education, and the problems around the real threat being the (non-malicious) employees that don't even realise their online behaviour is a problem.
  • Get Results from Your Awareness Activities Using the Security Culture Framework Jul 7 2015 11:00 am UTC 45 mins
    Kai Roer, Founder The Roer Group, Security Culture Coach and Author
    For more than two decades organizations worldwide have failed at creating the security awareness we have aimed for. Instead of continuing doing things we already know are failing to give us the results we need, Mr. Roer and his team set out to analyse what the key elements in successful awareness programs are, and what the major reasons for failure are. The research project was the basis to create the Security Culture Framework, a free and open methodology on organizing successful awareness campaigns that creates lasting cultural change. Today, the framework is being used by a large number of organizations around the world, to build and maintain security culture. In this talk, Mr. Roer will walk you through the four basic principles of the Security Culture Framework, and explain how to be successful when building security culture.
  • CyberSecurity: It's time to be prepared - Cyber Defence Strategies & Cyber Resil Jul 7 2015 10:00 am UTC 45 mins
    Tarun Samtani CISSP, Information Security Architect, Ebuyer UK
    It's not about IF, but WHEN - This statement has been over hyped by media and Sales people love it as they want to sell you something. There is a lot of negative news around cyber security and rightly because Data breaches have become a part of our daily news. BUT 90% of the breaches could have been avoided according to a recent report by Online Trust Alliance 2015 had best practices and security controls been applied correctly.

    So what can we do about it?

    From this webinar, I would like to bring some cyber defence strategies into play which i have been researching on lately. There is no silver bullet to Cyber Security. "You dont need another Security product".

    Prepare for the worse by having a sound cyber resilience strategy in place.

    Takeaways from this webinar -

    a) Best Practice - Defence in Depth
    b) Cyber Defence strategy models
    c) Cyber Resilience Framework
  • SIEM Detection & Response Cases Jun 30 2015 5:00 pm UTC 45 mins
    Tom Clare, Director, Arctic Wolf
    Before tackling a SIEM project to improve detection and response, learn from these case studies as their scenario likely matches yours. To firebreak your network brings together technologies, processes and people in the right balance across four phases. More than a security point solution or another box, you need to turn craft into a discipline to improve detection and response.

    Learn from your peers about the following:
    - Before environment and issues
    - Transition effort, cost and impact
    - After environment and benefits
    - Best practices for managed SIEM
    - Your network and next steps
  • Risk Mitigation Services in Cyber Insurance Underwriting Jun 30 2015 4:00 pm UTC 60 mins
    Tracie Grella, Advisen; Neeraj Sahni, FINEX; Ira Scharf, BitSight Technologies
    Cyber insurance is becoming an increasingly competitive market. In order to differentiate their offerings, underwriters are beginning to offer unique risk mitigation services to their insureds. But with all the noise in this space, how do risk managers find and choose the policy that is best for them?

    In this webinar hosted by Advisen, Tracie Grella, Global Head of Professional Liability at the world's largest insurer, AIG, Neeraj Sahni, Vice President, FINEX North America—Cyber and Technology Risks at Willis, and Ira Scharf, General Manager of Cyber Insurance at BitSight Technologies, to learn how underwriters, brokers and technology firms are working together to bring risk mitigation services to their clients

    Join this webinar to learn:

    - How cyber coverage has evolved
    - How the insurance market is bringing value related to cyber risks
    - How risk mitigation services lower expected costs and help insurers do a better job of underwriting
    - Why risk mitigation services and cyber insurance create a safer cyber ecosystem
  • DDoS Attacks: More Dangerous to You; Never Easier to Launch Jun 30 2015 3:00 pm UTC 60 mins
    Christina Richmond, Program Director, IDC and Joe Loveless, Product Marketing, Neustar
    If your organization cannot afford downtime from DDoS attacks, join this timely discussion from Neustar, with special guest perspective from IDC’s Christina Richmond. Explore the complexity and purpose behind today’s attacks and what you can do to defend your Internet presence. You will learn:

    · What the DDoS threat environment looks like today
    · Why “smokescreening” is a particular danger
    · Where attacks can have impact across your organization
    · How you can take steps to thwart DDoS threats
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Securing the Cloud with SIEM
  • Live at: May 24 2012 5:00 pm
  • Presented by: Marc Blackmer, Senior Product Marketing Manager, Solutions at HP Enterprise Security
  • From:
Your email has been sent.
or close
You must be logged in to email this