SIEM is Dead: Changing The Approach to Enterprise Security Monitoring
A wise man once said "If you keep doing what you're doing, you keep getting what you're getting" and this applies to enterprise monitoring as well. Let's face it, the landscape of threats and risks has outpaced our efforts to monitor and respond to them. The SIEM market is into its second decade already, and is showing signs of its age. Keeping up with the evolving threatscape means making changes in how we observe and react to our attackers. The adversary continues to change their game in response to our defenses and it is time we changed our methods as well. Join (ISC)2 and RSA Security on July 19, 2012 at 1:00pm Eastern for a roundtable webinar where we explore models and methods for improving our situational awareness.
RecordedJul 19 201262 mins
Your place is confirmed, we'll send you email reminders
Dave Lewis, Global Security Advocate, Akamai Technologies; Chris Nicodemo, Global Dir of App Sec & Architecture, Time;
Moving and integrating multiple applications across both on-premise and into the cloud is a daunting task. Whether it is the "lift and shift" of existing workloads into IaaS or the federation of identities between your traditional enter isle and SaaS providers, the task is monumental. Join Trend Micro and (ISC)2 on August 11, 2016 at 1:00PM for a spirited roundtable webinar where we'll dig into the important security implications of your cloud strategy and how to ensure that you are considering all of the angles as you make the change.
Darrin Reynolds, Reynolds Privacy; Graham Jackson, General Counsel, (ISC)2; Harvey Nusz, CISO, 4IT Security
The EU's General Data Protection Regulation (GDPR) was adopted on April 14, 2016 and threw infosecurity and privacy teams into chaos. While teams were trying to get their arms around the new regulations and rules, the UK voted to leave the EU, throwing another big wrinkle into the mix. What does all of this mean to you and your compliance and regulation efforts? What does the Brexit vote mean for the GDPR and for the UK's infosecurity and privacy rules? Imperva sponsors an (ISC)2 From the Trenches webinar discussion on this and answers questions from the audience on July 28, 2016 at 1:00PM Eastern.
John Carnes, Anthem; Terry Olaes; Rob Ayoub, IDC; Brandon Dunlap, Brightfly
Detecting and investigating malicious or unintentional activity is a time consuming effort and an inefficient use of our limited resources. All too frequently, we discover something is amiss and realize that problem has existed for a long time, yet it's just come to your attention. How can an organization increase the speed of detection of malicious activity? Can detection and investigation processes benefit from "hitting the afterburners"? Join RSA Security and (ISC)2 on June 30, 2016 at 1:00PM Eastern for a discussion on detection and investigation visibility and what to leverage to make threat detection effective.
Scott Montgomery, VP & CTO, Intel Security; Doug Cahill, Sr. Analyst, ESG; John Yeoh, Senior Research Analyst, CSA
IaaS, PaaS, SasS? Private, Public, Hybrid? Regardless of the deployment model, you likely have some key services and data spread across some combination of all of these, not to mention what is still on premises. How can your security team keep tabs on all of this? There needs to be uniform management, visibility and control of the various clouds or vulnerabilities and errors are going to put data at risk. Join Intel Security and (ISC)2 on June 16, 2016 at 1:00PM Eastern for a Roundtable discussion on this issue and how to manage your clouds.
Greg Mayfield, Director, Product Marketing, Blue Coat; Spencer Wilcox, Excelon; Sammy Basu, Warner Bros. Entertainment Group;
Starting in earnest after the "Snowden Revelations" 2013, more and more service providers such as Google, Yahoo and Amazon have been embracing SSL by default. Whether in search, cloud services or webmail access, these providers have been instrumental in their support of a more secure and obfuscated web. But what does that mean for the enterprise information security professional? While the providers have "seen the light", have we become blinded by it? To ensure the inspection and subsequent protection of data streams in and out of our organizations, we need the ability to inspect encrypted traffic for policy violations or other malicious activity while still ensuring multi- jurisdictional rights to privacy. Join Blue Coat and (ISC)2 on May 26, 2016 for a roundtable discussion exploring methods and mechanisms for addressing SSL inspections and the search for malicious activity.
Ted Sherrill, Oracle; Graham Jackson, (ISC)2; Harvey Nusz, 4IT Security
The General Data Protection Regulation (GDPR) is being instituted to improve data protection and privacy for individuals in the European Union (EU). Additionally, it addresses the export of data outside the EU, which will impact all multi-national businesses operating in the EU. Almost 3/4 of US Privacy professional believe that this is the most significate change to privacy regulations in the last 20 years. What should an organization be doing now to prepare for this new regulation to avoid non-compliance, fines and increased spending? Join Oracle and (ISC)2 on April 14, 2016 at 1:00PM Eastern for a discussion on this new regulation and how your organization could be impacted.
Steven Hernandez, CISSP, Vice Chair, (ISC)2 Board of Directors
In this infosession (ISC)² Board of Directors, Vice Chair, Steven Hernandez, discusses the challenges that CISSPs are seeing in their workforce today and how creating a culture of security within your organization can help fill the cybersecurity workforce shortage.
Mike Pittenger, VP, Product Strategy, Black Duck; John Overbaugh, CISSP, CISO, CyberVista; Brandon Dunlap
Open source software and code has become common place in application development, as have the use of vulnerability assessment tools. After all, no one wants to be the victim of the next Heartbleed, Poodle or Logjam. But vulnerability assessment tools, while helpful, have blind spots. How can you ensure that you are protecting your networks and applications from newly disclosed vulnerabilities? Join Black Duck Software and (ISC)2 on March 22nd, 2016 at 1:00PM Eastern for a discussion on VA Tools, Open Source Assets and secure application development.
Christian Macdonald, Solutions Architect, Intel Security; Brad Antoniewicz, Principal Consultant, Foundstone; JJ Thompson
It's an infosecurity department's worst nightmare. There's been a breach and information is missing. After determining what's been compromised, you need to discover how the data was accessed and exfiltrated from your enterprise. Threats vary from system to system and include malicious insiders, organized crime and accidental disclosure. Data involved can include customer and/or employee information, intellectual property and financial records. Join Intel Security and (ISC)2 on March 17, 2016 at 1:00PM Eastern for a look into Intel Security's recent Data Exfiltration Study and discover how data is being stolen, what the bad guys are focusing on and what detection and prevention technologies might be working.
Spencer Wilcox, Constellation Energy; Patrick Miller, EnergySec; Chris Walcutt; Black & Veatch; Brandon Dunlap
Train like you fight. Fight like you train. We could do well to heed this old military axiom and regularly drill for a variety of incident scenarios in the most realistic means as possible. During this (ISC)2 roundtable, we will explore the role of incident management simulation and testing from the world of critical infrastructure and provide some concrete and immediately actionable methods you begin incorporating into your own preparedness program. As the saying goes, “No plan survives first contact with the enemy,” so please join us On February 11, 2016 at 1:00PM Eastern in learning how to become a more resilient organization in the face of disaster.
Ondrej Krehel, CISSP, Founder & CEO/Paul Kluber, CISSP, Digital Forensics Examiner, Lifars, LLC
A major company has been hacked, suffering a data breach. How do companies the size of Sony handle such situations? Various departments, including legal, tech and PR come together to meet with the management and workout a plan on how to handle the crisis. This presentation will focus on both -- companies with a data breach response plan and those without one. We'll shed some light on what the first 24 hours post-breach looks like for a major company.
Regional Directors Dan Waddell (NCR), Clayton Jones (APAC); Adrian Davis (EMEA) & Gina Van Dijk (LATAM)
As a truly global organization, (ISC)2 membership stretches to over 110,000 members in over 160 countries. To help serve the needs of the membership, (ISC)2 has regional offices to oversee the operations and efforts in North America (NA), Asia-Pacific (APAC), Europe, Middle East, & Africa (EMEA) and Latam America (Latam). These offices are managed by regional directors with their own teams to offer regional support and resources and to be the voice of the region. On January 28, 2016 at 1:00PM Eastern you'll have the opportunity to discover what's going on in each of these regions as we gather our three Regional Directors Dan Waddell (NA), Clayton Jones (APAC), Adrian Davis (EMEA) and Gina Van Dijk (Latam) for a view into what they have planned for 2016.
Mike Flouton, VP & Global Head of Solutions Marketing, BAE Systems; Robert Westervelt; IDC; Sonny Discini; Brandon Dunlap
Corporate e-mail. It’s safe to say that no organization can survive without it. Making sure it’s available, compliant and secure can be challenging for any security team. Add Office 365 and the Cloud to the mix and the potential issues multiply significantly. E-Mail protection services can make the tasks much less complicated by providing protection against inside and outside threats, reducing downtime and adding encryption. Join BAE Systems and (ISC)2 on January 21, 2016 at 1:00PM Eastern – our first ThinkTank of the year – where we’ll discuss e-mail protection services, Office 365 and the Cloud and how to keep your e-mail up and running.
Anurag Kahol, CTO, BitGlass; Adam Gordon, CISSP, CISO/CTO, New Horizons Computer Learning Center; Mike Webb, SmartVault
As more companies jump on the cloud bandwagon and migrate core services to cloud apps like Office 365, native app security has proved lacking. Enter Cloud Access Security Brokers. CASBs augment corporate identity and access controls to Cloud services, enabling better visibility, more granular data security, threat protection and compliance. What are the best strategies when making the move to public cloud applications? Join Bitglass and (ISC)2 on December 3, 2015 at 1:PM where we will discuss CASBs and how they can help secure cloud apps like Office 365.
Dan Kennedy, Research Director for Information Security at 451 Research
Last year we spoke about enterprise perceptions towards advanced persistent threats, or as 451 Research terms them adaptive persistent threats. The acknowledgement that there are threat classes that can not be rebuffed by preventative security controls has led to a refocus on security monitoring for many enterprise heads of information security, but the approach is not without its challenges, including notably complexity and manpower. Join Dan Kennedy, Research Director for Information Security at 451 Research on November 10, 2015 to review portions of two end user studies on enterprise perception towards major security monitoring platforms: SIEM and IDS/IPS. The presentation will draw on results of over two thousand surveys conducted with enterprise information security managers.
Javvad Malik CISSP®, Security Advocate, Alien Vault
I used to be a security professional, but even my boss didn’t remember my name. My brilliant ideas weren’t listened to, I was never invited to speak at conferences and not even my mother visited my blog." In this talk, we've distilled the key skills and traits taken from personal experience as well as industry professionals to present strategies you can employ to increase your stock internally within an organization as well as within the industry. Simply being hard working and skilled in your job is not enough.
Ismael Valenzuela, IR Technical Practice Mgr, Foundstone; Mat Gangwer, Rook Security; Jack Walsh, ICSA Labs;
While some indicators of compromise (IoCs) can be incredibly helpful in gaining visibility into the details and breadth of a breach, others can be noise. How do you decipher the difference between the good, the bad and the just plain ugly? Join Intel Security and (ISC)2 on November 5 at 1:00PM Eastern for a discussion on IoCs as we discuss what threat intelligence provides the most value along with where IoCs are going and should go next to better enable investigations and defend organizations.
Dave Lewis, CISSP, Global Security Advocate, Akamai Technologies
This talk will examine the tools, methods and data behind the DDoS attacks that are prevalent in news headlines. Using information collected, the speaker will demonstrate what attackers use to cause their mischief and mayhem and examine the timeline and progression of attackers as they move from the historical page defacers to the motivated DDoS attacker. We'll also look at motivations and rationale to detect patterns and build better protections.
It’s probably not too often that you’ll get this perspective. Star Wars was really all about information disclosure threats! You’ll want to find out more as noted presenter and author Adam Shostack, references one of George Lucas’ epic sagas to deliver lessons on threat modeling. Not only was the Death Star badly threat modeled, the politics between Darth Vader and Gran Moff Tarkin distracted incidence response after the plans were stolen. This session will provide you with proven foundations for effective threat modeling as you develop and deploy systems. Adam will help you understand what works for threat modeling and how various approaches conflict or align. The force is strong with this session.
Jim Taylor, Oracle; Darin Reynolds, John Carnes, Brandon Dunlap, Moderator
By 2020, more than 7bn inhabitants of Earth will be using over 35bn devices to communicate, collaborate, negotiate and perform transactions.
To put it into perspective, there are only about 8.7bn connected devices now.
The surge will come quickly and organizations will scramble to take advantage of monetizing this digitally connected world. Identities are at the forefront as the digital passport to an online world of goods and services because a single view of an individual customer is the key to knowing that person better and building a deeper personal and business relationship with them. Join Oracle and (ISC)² on October 8, 2015 at 1:00PM Eastern to learn about the new identity economy.
Die zunehmende Digitalisierung, der Einsatz moderner bildgebender Analyseverfahren sowie die
gesetzlichen Verpflichtungen zur Speicherung von Gesundheitsdaten lassen den Speicherbedarf
im Gesundheitswesen explodieren und stellen eine große Herausforderung an die effiziente Abläufe und Datenabfragen dar.
•Softwarebasierte Speicherlösungen – wie SUSE Enterprise Storage – bieten eine sichere und kostengünstige Alternative, ohne Kompromisse bei Funktionalitäten und Sicherheit.
•Die Einführung von SAP Anwendungen ermöglicht schnellen Zugriff und intelligente Abfragen in Echtzeit. SUSE Enterprise Linux für SAP Applications ist die führende Plattform für SAP und SAP HANA Anwendungen.
In diesem Webinar geben unsere Experten einen Überblick zu diesen Themen speziell im Gesundheitssektor und stehen für Ihre Fragen zur Verfügung. In weiteren Webinaren werden die Themen vertieft.
A few years ago, kik might have seemed like just another messaging app. Today it boasts 275 million users and its very own Bot Shop a platform for companies like Sephora and Weather.com to display their bot prowess. More and more smart companies are sitting up and paying attention, as Yahoo, Facebook, and others get into the messaging bot game.
Today most bots center around the conversational interface offered by Facebook Messenger and the likes of kik, but who knows what tomorrow might mean?
Join our VB Live event as our panel of experts talks about what smart companies know about bots. From messaging to shopping, bots are increasingly part of the business landscape.
In this webinar, you’ll learn to:
* Understand the importance of bots to brands
* Know bot landscape and what it means for your business
* Recognize the potential synergies and pitfalls between bots and brands
* Paul Gray, Director of Platform Services, Kik
* Jon Cifuentest, Analyst, VentureBeat
* Rachael Brownell, Moderator, VentureBeat
Register for this free executive leadership live event today!
Amazon’s S3 (Simple Storage Service) is recognized as the de facto standard interface for interacting with object stores. Deploying an object solution at scale requires rich and robust security that both protects data on the infrastructure and ensures only the right level of access is granted to end users. Join us for the second of our S3 webinars, when we discuss all things security related. You will learn:
- Accessing S3 resources using access keys and signing.
- How to use Identity and Account Management.
- Supporting external users.
- Using code to manage access permissions.
- How data is protected in-flight and at rest.
- Encryption choices; using S3, Key management or customer supplied keys
Join our highly-anticipated keynote presentation from Neil McEvoy, CEO of Cloud Best Practices! In this discussion, we will discuss the enterprise shift from Virtualization to Containerization: news, tools, vendors, open standards, best practices, and case studies. From Virtualization to Multi-Cloud Broker, you will learn the process of planning transformation through Enterprise Cloud best practices.
You will come away with a solid understanding of how to build and manage Cloud Aware application design- the newest microservices model for enterprise applications. We will also cover enterprise software-defined networks and how to integrate virtualized network functions.
For any cloud, virtualization and enterprise professionals, this is the event for you!
Join this webinar to see how the CloudPhysics Public Cloud Planning Rightsizer identifies opportunities to lower your costs of running applications on the public cloud.
The Public Cloud Planning Rightsizer automatically identifies on-premises virtual machines (VMs) that are over-provisioned with more resources (such as CPU and memory) than they use. This lets you optimize instance matching to the ideal cloud instances. Rightsizing reveals the verifiable cost of running workloads in the cloud. Now you can answer the question, “will we save money by migrating applications to the cloud?”
This webinar shows how Public Cloud Planning Rightsizer collects resource utilization data from each VM on a fine-grained basis, and then analyzes those data across time to discover the VM’s actual resource needs. Imagine an on-premises VM configured with 8 vCPUs: if the Rightsizer shows that it has never used more than 2 vCPUs, you can Rightsize that VM to a smaller instance in the cloud, saving substantial funds.
If you’re running Hadoop for big data analytics this webinar is for you!
Currently, there are two competing architectures for how to implement Hadoop Distributed File System (HDFS). The original HDFS approach utilizes storage co-located with the compute servers, but that can often present challenges of wasted compute and/or storage when you scale. An emerging alternative relies on dedicated storage resources shared by the compute cluster, providing a cost-effective and reliable solution.
Join Engineering Fellow and Chief Data Scientist Janet George, as she compares and contrasts these two approaches and provides definitive quantities guidelines to planners and architects to help identify the best solutions for your Big Data and analytic needs.
Between these two methods, we’ll compare and contrast:
-Data Reliability and Bit Loss
-Cost of Capacity
Ransomware is currently one of the most disruptive security challenges for enterprises. As it moves from an individual employee's PC to the corporate network, the impact can be significant. Despite research and analysis by security firms and analysts, most don't have a good idea of how a piece of ransomware actually operates, i.e. what is affected and when, what signals to look for, etc. Exabeam researchers have detonated nearly 100 strains of ransomware in the labs and produced a detailed analysis of how a ransomware attack actually unfolds, and how an organization might respond to shut it down. Join Exabeam and (ISC)2 on July 21, 2016 at 1:00PM Eastern and gain a better understanding of the mechanisms of ransomware, how to detect it and shut down an attack.
Many enterprise organizations are moving beyond antivirus software, adding new types of controls and monitoring tools to improve incident prevention, detection, and response on their endpoints. Unfortunately, some of these firms are doing so by adding tactical technologies that offering incremental benefits only.
So what’s needed?
A strategic approach that covers the entire ESG endpoint security continuum from threat prevention to incident response. A truly comprehensive solution will also include advanced endpoint security controls that reduce the attack surface and tight integration with network security, SIEM, and threat intelligence to improve threat detection and response processes.
Join ESG senior principal analyst Jon Oltsik, Intel Security, and Bufferzone on a webinar on July 21 at 10am PT/1pm ET to learn more about next-generation endpoint security requirements and strategies.