Browse communities
Browse communities
Presenting a webinar?

Securing the Cloud with SIEM

Marc Blackmer, Senior Product Marketing Manager, Solutions at HP Enterprise Security
Organizations are adopting cloud services at a very fast pace, driven by the cost effectiveness, speed/time to market and better performance and availability cloud adoption provides. However the security of data and access in the cloud is still a major cause for concern. Even if the organization is comfortable with a cloud service provider’s security posture, they are often surprised to find they are ultimately responsible for securing their own data. Fortunately security event and information management (SIEM) solutions are able to extend information and access controls to cloud in addition to physical and virtual environments. This webinar will dive into the various options available to organizations to help them ensure a secure cloud services environment.
May 24 2012
39 mins
Securing the Cloud with SIEM
More from this community:

IT Governance, Risk and Compliance

  • Live and recorded (3390)
  • Upcoming (81)
  • Date
  • Rating
  • Views
  • Risk management is an increasingly important
    business driver and stakeholders have become
    much more concerned about risk. Risk may be a
    driver of strategic decisions, it may be a cause of
    uncertainty in the organisation or it may simply be
    embedded in the activities of the organisation. An
    enterprise-wide approach to risk management
    enables an organisation to consider the potential
    impact of all types of risks on all processes,
    activities, stakeholders, products and services.
    Implementing a comprehensive approach will
    result in an organisation benefiting from what is
    often referred to as the ‘upside of risk’.
    The global financial crisis in 2008 demonstrated
    the importance of adequate risk management.
    Since that time, new risk management standards
    have been published, including the international
    standard, ISO 31000 ‘Risk management –
    Principles and guidelines’. This guide draws
    together these developments to provide a
    structured approach to implementing enterprise
    risk management (ERM)
  • L’ambiente dei tuoi clienti è sempre più complesso, Backup Exec 15 permette loro di esguire backup e recovery in modo semplice ed efficace, sempre e ovunque.
    Segui questo webinar e scopri come Backup Exec 15 può semplificare e rispondere alle esigenze delle diverse infrastrutture.
  • If your organization is reliant on a rapidly aging version of SQL Server, you need to join SQL Server experts Michael McCracken from HOSTING and Rodney Landrum, a Microsoft SQL Server MVP, from Ntirety for this in-depth discussion of the hows, whys and whats of upgrading from Microsoft SQL Server 200X to SQL Server 2014. The interactive webinar will cover:
    •The benefits of upgrading
    •Considerations to understand
    •How to smooth the transition
    •Q & A
  • Ingesting raw data into Hadoop is easy, but extracting business value leveraging exploration tools is not. Hadoop is a file system without a data model, data quality, or data governance, making it difficult to find, understand and govern data.

    In this webinar, Tony Baer, Principal Analyst of Ovum Research, will address the gaps and offer best practices in the end-to-end process of discovering, wrangling, and governing data in a data lake. Tony Baer will be followed by Oliver Claude who will explain how Waterline Data Inventory automates the discovery of technical, business, and compliance metadata, and provides a solution to find, understand, and govern data.

    Attend this webinar if you are:
    --A big data architect who wants to inventory all data assets at the field level automatically while providing secure self-service to business users
    --A data engineer or data scientist who wants to accelerate data prep by finding and understanding the best suited and most trusted data
    --A Chief Data Officer or data steward who wants to be able to audit data lineage, protect sensitive data, and identify compliance issues
  • Targeted malware, zero-day vulnerabilities and advanced persistent threats are increasingly responsible for data breaches. Why? Because they work. Most security products have a hard time protecting from advanced malware. This problem is compounded because attackers can easily mass produce new malware variants. What’s an IT person to do?

    Join us to learn key techniques to stop modern malware the first time. We will discuss:
    •What tactics work
    •Where to apply them
    •How to optimize cost, staffing and security.
  • Software defined architectures are all the buzz, helping to start conversations about transforming customer data centers from cost centers into competitive advantages. But in today’s economy, no business can afford to stand still. And a business is only as agile as its IT organization allows. An agile data center and IT department can:

    •Protect the infrastructure and easily recover if faults are found or predicted
    •Control access to data while meeting compliance and regulatory requirements
    •Deliver services quickly, resiliently, and cost-effectively

    Join us on at 10am GMT on 16th April 2015 and learn how Symantec’s view of the “Agile Data Center” covers delivering the right resources in the right way to the users. Whilst bringing a broader view on how you can introduce critical solutions and new revenues around disruptive customer events.
  • For years ClearCase was the standard for enterprise SCM. If you had a large number of developers and lots of projects ClearCase was a great choice, while ClearCase MultiSite provided basic support for distributed teams. Now industry trends are converging toward a new generation of development tools and processes. Today, continuous delivery brings agile development and DevOps together, promising much shorter development cycles and higher quality.

    Learn how moving from ClearCase to Subversion can improve your development processes and significantly reduce deployment cost and complexity. You'll also learn practical ClearCase to Subversion migration techniques.

    Topics Covered:
    • Differences and similarities between Subversion and ClearCase
    • How to merge in Subversion
    • Continuous delivery using Subversion: bringing agile and DevOps together for faster delivery and higher quality
    • ClearCase vs. Subversion in a distributed development environment
    • Migrating from ClearCase to Subversion
  • Recently cyber attacks against Industrial Control Systems (ICS) used by
    utilities and other Critical Infrastructure organizations have hit the
    newlines worldwide. Stuxnet is the best known cyber attack against an
    industrial installation, but it's not the only one.

    But what if cyber attacks were not the biggest threat to industrial
    networks and systems? Although malware is still a major point of
    interest, the sword of Damocles for critical industrial networks is
    represented by system misuse performed by disgruntled employees,
    contractors and vendors, as well as unintentional mistakes,
    network and system misconfiguration; all this could lead to the
    divergence or failure of critical processes.

    In this talk we will reshape the concept of ICS cyber security and will present our vision for a comprehensive approach to cyber security for ICS.
  • Adhering to international maritime sanctions requirements can be challenging in today’s regulatory landscape. Join Dow Jones Risk & Compliance and experts from HFW and Pole Star for a discussion on best practice in shipping compliance. Learn about regulatory developments -- including the latest UN Security Council communiques on "Sanctions compliance for the maritime transportation sector" -- and leverage case studies on the use of enhanced sanctions data and monitoring tools to mitigate sanctions risk.
  • As superfast connectivity becomes widely available, it will increase both data volume and velocity as well as new business opportunities. However, this dramatic leap forward will also result in new and potentially destructive activity online, which can affect an organisation’s defences both internally and within their supply chain. It has never been more important for businesses to assess and understand their critical infrastructure in an increasingly connected environment.

    During this webinar Steve Durbin, Managing Director of ISF Ltd, will discuss how businesses can update their resilience along with examining the role in securing the network boundary that investments in technology and third party provider programmes can play. This will necessarily include an assessment of cloud-based systems and the use of robust risk assessment methodologies.
  • Channel
  • Channel profile
  • If SIEM is Dead It’s Because You Killed It Recorded: Feb 26 2015 31 mins
    Jesse Emerson - Director, Security Intelligence & Ops Consulting
    Deploying and managing security information and event management systems can tax the brain and budget. However, if done right, these solutions can be a huge benefit to the overall security stance of an organization, providing insight into what's happening on the entire network and enabling security teams to focus on the most pressing priorities to make sure their organizations' infrastructures are safe and sound from attacks. We explore the many challenges organizations face when deploying SIEM and offer remedies that can optimize their use.
  • Applied Security Analytics Recorded: Feb 26 2015 45 mins
    Jeff McGee, Solutions Innovation Data Scientist, HP
    Many organizations are looking at using big data to detect more advanced adversaries. We are collecting more information than ever before, but what are we doing with it? In this talk, we will look at some ways you can use data science and visualization tools to get more out of the data you collect. Visualizations will let you see what is happening at a high level: A picture is worth a thousand log entries. There are data science techniques that other industries, such as advertising, have used successfully. We can apply these techniques to find patterns of behavior that are out of the ordinary, and ultimately catch more bad guys.
  • Outthinking the Bad Guys Recorded: Feb 6 2015 22 mins
    Art Gilliland, General Manager of HP Enterprise Security Products
    Businesses are spending so much money on security -- almost $47 billion in 2013 -- and yet the number of breaches continues to increase. To mitigate the risks of increasingly sophisticated, innovative and persistent threats, we need to change the way we think about our security programs. In this webcast, Art Gilliland, General Manager of HP Enterprise Security Products, talks about the challenges all enterprises face from the bad guys -- and the critical steps businesses must take to defend against today's most advanced threats.
  • Defending Against Advanced Attacks Recorded: Jan 5 2015 25 mins
    Mark Nicolett - Managing VP, Gartner
    A webinar with Gartner VP Mark Nicolett, provides solid tips to reduce your vulnerability.

    The recent data breach cost Target more than $60 million in recovery costs. And even that has been exceeded at other companies that have fallen victim to advanced targeted cyber attacks.

    View the webinar to learn:
    •How to present a hard target to hackers
    •How advanced persistent attacks work
    •How the SOC and NOC can work together
    •Best practices for security information and event management (SIEM)
  • Advancing Incident Management: The Next Evolution Recorded: Dec 18 2014 38 mins
    Mitchell Webb
    To combat advanced adversaries, we must improve our detection and response capabilities. This presentation will cover emerging processes and technologies in security operations that allow organizations of all sizes to improve their detection and response effectiveness. The capabilities presented here have been used by HP to detect and remove advanced threats for organizations across the globe.
  • Top 10 tips to be compliant and secure together Recorded: Dec 8 2014 37 mins
    Sridhar Karnam, Sr. Product Marketing Manager, ESP HQ Team
    Compliance and security are better together and there are tools and resources that can be combined to achieve both. Learn the top 10 tips - such as continuous monitoring, assessing the controls, and cost-effective audit logs - to understand and implement best practices of compliance and security together.
  • The cost of inaction—what cyber crime could cost your business Recorded: Oct 29 2014 60 mins
    Sponsored by HP Enterprise Security, Independently conducted by Ponemon Institute LLC
    The average company in the United States loses $12.7 million annually to cyber crime. Other countries are close behind. These are results from the recently completed Ponemon Institute 2014 Cost of Cyber Crime study. You know the risks, but you need the data to plan your defenses and demonstrate the cost of inaction.

    View this webinar with Dr. Larry Ponemon to get the information you need. You’ll learn:

    - What cyber crimes are most common and most costly
    - The hidden internal and external costs you incur
    - What security defenses are most effective in reducing losses
    - How businesses with a strong security posture drive down costs.
  • 5th Annual Ponemon Cost of Cyber Crime Study Results: APJ Recorded: Oct 10 2014 56 mins
    Sponsored by HP Enterprise Security, Independently conducted by Ponemon Institute LLC
    Explore cyber crime in Asia Pacific and Japan

    The cost of cyber crime is on the rise in the APJ region, according to the 2014 Cost of Cyber Crime study from the Ponemon Institute. Among 30 companies surveyed in Australia, the reported per-company cost for Internet-driven crime was $4 million, up 8.4% from 2013. In Japan, the per-company average hit $6.9 million in the study, up 5.7% from 2013.

    On the more optimistic side, companies in the region are achieving notable ROI for their investments in cyber security solutions. The average ROI for seven security technologies was 16% in Australia and 17% in Japan. For a close-up view of these and other findings from the institute’s research in Australia and Japan, join Dr. Larry Ponemon, chairman and founder of the Ponemon Institute, for our APJ Security webinar.
  • 5th Annual Ponemon Cost of Cyber Crime Study Results: Americas Recorded: Oct 9 2014 60 mins
    Sponsored by HP Enterprise Security, Independently conducted by Ponemon Institute LLC
    Explore cyber crime in the Americas

    In the 2014 Cost of Cyber Crime study, U.S. companies reported an average of $12.7 million in losses to cyber crime. That was the highest national average in the study by the Ponemon Institute. Among the 59 U.S. companies in the survey, the average cost of cyber crime climbed by more than 9% over the course of the year.

    Among other findings, the study noted that the most costly cyber crimes are those caused by denial of services, malicious insiders, and malicious code. These threats account for more than 55 percent of all cyber crime costs. For a fuller look at these and other findings from the institute’s study of U.S. companies, join Dr. Larry Ponemon, chairman and founder of the Ponemon Institute, for our AMS Security webinar
  • 5th Annual Ponemon Cost of Cyber Crime Study Results: EMEA Recorded: Oct 8 2014 59 mins
    Sponsored by HP Enterprise Security, Independently conducted by Ponemon Institute LLC
    Explore cyber crime in Europe

    For its 2014 Cost of Cyber Crime study, the Ponemon Institute expanded its focus in Europe to encompass the Russian Federation, as well as France, Germany, and the United Kingdom. Collectively, the institute surveyed 137 companies in Europe in a study that found broad differences in the reported costs of cyber crime across the region. The per-company average ranged from $3.3 million in the Russian Federation to $8.1 million in Germany.

    The study results indicate that over the course of the year, cyber crime rose 20.5% in France, 17.4% in the U.K., and 7.2% in Germany. For a closer look at these and other findings from the institute’ European research, join Dr. Larry Ponemon, chairman and founder of the Ponemon Institute, for our EMEA Security webinar.
  • Catching Insiders: It's a 'People' Problem (Technology Can Help) Recorded: Sep 17 2014 45 mins
    Jesse Hughes, Managing Principal, HP
    “Et tu, Brute? Then fall, Caesar!” A rather famous line from Shakespeare’s Julius Caesar that, whether historically accurate or not, encapsulates the terror and surprise felt at the discovery of an Insider, and serves to highlight the persistence of the problem we refer to as the Insider Threat. There has always been an Insider Threat, the hard question is, why have we not done more about it? Once we understand the ‘why’ and the ‘who’ (who are Insiders, and who are the rest), we can move on to the ‘How’ we are going to find them. In this presentation we will discuss Insider Threats, their varying levels of sophistication, and different ways in which others might use them. We then apply this understanding to enabling discovery. Join us for an interactive presentation, and discussion on this persistent security challenge.
  • A look at the common, the curious, and the future of SIEM Recorded: Aug 12 2014 26 mins
    Mary karnes, Strategic Solutions Portfolio Manager
    SIEMs can be a useful and powerful platform functioning as the cornerstone of a security program. In this webinar we will explore the various ways we see clients using SIEM technology, how customers grow and mature their SIEM capabilities over time, and a sneak peek into the more interesting ways we see SIEMs being used right now.
  • State of Security Operations 2014 Report Recorded: Jul 15 2014 7 mins
    Chris Triolo, VP ProServ, HP Enterprise Security & Charles Sterner, Senior Manager, HP Cyber Defense Center
    1 in 4 Security Operations Organizations is ineffective. See how HP assesses security operations capabilities and how they used lessons learned in building their own Cyber Defense Center.
  • Top 10 ways to Solve Your Security Puzzle with ArcSight Logger Recorded: Jul 2 2014 34 mins
    Sridhar Karnam
    Organization’s today are faced with a key business challenge –massive amounts of useful data is being lost every second! According to IDC’s ‘The Digital Universe’, only 3% of data is actually being tagged for Big Data value. How do you ensure your business is handling Big Data challenges? This presentation highlight the top 10 ways HP ArcSight Logger can solve your security challenges. ArcSight’s newly released Logger is the fastest search engine on the planet for machine data. The universal log management solution collects, stores, and analyzes all of your Big Data for security event management and is used for IT operations, compliance, flow analytics, email security, weblog analysis, and more. ArcSight unifies your entire IT data through a unique technology called normalization and categorization, and then correlates the events across the devices in real-time. Find out how Logger can enable your business to stop the bleed and turn data into actionable security decisions.
  • From zero to SOC in 10 steps Recorded: Jun 17 2014 49 mins
    Paul Brettle, Pre-Sales Manager, HP
    In this presentation, we will look at what it takes to become a success when trying to address security monitoring and alerting. It is commonly regarded that log management, monitoring and alerting is seen as a corporate or enterprise solution due to is complexity and costs, but this presentation will address the steps that any organization can take to go from zero to hero. Building on a easily followed process and step by step guide, we will cover the way that organizations can move from one step to the next, managing costs and complexity at each stage. Starting with the basic steps needed to build a foundation, a SOC can be build up and deliver real value and capability without excessive cost or complexity.
  • Compliance. Check. Now what? Recorded: May 27 2014 40 mins
    Jesse Emerson, Global Director of Security Intelligence and Operations Consulting (SIOC) HP
    Organizations are tasked with various compliance standards – from PCI to HIPAA - yet less than 1/3 of organizations are achieving their compliance objectives with their security operations centers.  Those that have achieved compliance are still falling short on maturity and effectiveness.  The 2014 State of Security report compiles information from 90+ maturity assessment performed over 5 years. Hear the revelations behind the report and what you can do to move your security organization from mere compliance to true effectiveness.
  • 5 Steps to Improve Your Incident Response Plan Recorded: May 20 2014 57 mins
    Ted Julian, CMO, Co3 Systems & Richard White, Principal, HP Security Intelligence & Operational Consulting, MBA CISSP CHP
    In today’s world, your organization needs an incident response plan to cover disasters, cyber-attacks, and other threats. While simply having a plan will help you check the box on the audit, it doesn’t guarantee effectiveness in a real-world situation. An Incident Response Assessment—done through fire drills, desktop exercises, functional scenarios, and full scale exercises—will help your organization truly validate the effectiveness of your plan.

    IR assessments are meant to:
    • Evaluate plans, policies, and procedures
    • Find weaknesses in the plan and gaps in resources
    • Improve coordination and communication internally and externally
    • Define and validate roles and responsibilities
    • Train personnel in their roles and responsibilities
  • Closing the Book on Heartbleed - and Avoiding Future Sad Stories Recorded: May 14 2014 61 mins
    Joanna Burkey, TippingPoint DVLabs Manager, and Joe Sechman, Manager, Software Security Research for HP
    The Heartbleed vulnerability in OpenSSL forced millions of users to changed passwords and enterprises to rapidly patch thousands of servers.Because of all the publicity there continues to be a lot of CXO-level awareness around cyber security and now is the perfect time to recommend strategies for avoiding or mitigating the next Heartbleed - and there *will* be a next one. There were many lessons learned during Heartbleed than can be used to bolster your plans and your presentations to management to gain funding.
    In this SANS Special webcast, John Pescatore, SANS Director of Emerging Security Trends will present an overview on the details around Heartbleed and an update on the current status, risks and industry efforts around software security. He will then moderate a panel of vendor experts in a discussion around lessons learned from dealing with Heartbleed and best practices for mitigating or shielding the risks due to vulnerabilities in open source and other third party software. Panelists will include Joanna Burkey, TippingPoint DVLabs Manager, and Joe Sechman, Manager, Software Security Research for HP.
  • How to Act with Laser Clarity Against Threats that Matter Recorded: Apr 25 2014 4 mins
    Eric Schou, Director of Product Marketing, HP ArcSight
    Organizations, regardless of size, are under attack every day. The bad guys are sophisticated, organized, specialized, and they collaborate. The question is no longer have I been breached, but how many times and to what severity. HP ArcSight provides the clarity you need to find and fix the threats that matter faster.

    Watch now to learn how. 
  • How much is cyber crime costing your business? Recorded: Mar 13 2014 3 mins
    HP Enterprise Security
    Cyber criminals continue to steal data and interrupt business at alarming rates. The average annualized cost of cyber crime is $7.2 million per company per year, with a range of $375K to a staggering $58 million, according to a global study by the Ponemon Institute. That’s an increase in cost of 30 percent over last year’s global results. The most costly criminal activities come from malicious insiders, denial-of-service and web-based attacks – and no industry is immune. Fortunately, there are ways to fight back.

    In this short video you’ll learn:
    *How proactive security measures can save millions of dollars
    *What seven security technologies are key to winning the cyber crime war
    *Where to get more information and guidance
Protect your business with security analytics and compliance solutions
Your organization, regardless of its size, must turn security and log data into actionable intelligence to make smarter, more efficient decisions. This channel features presentations that help answer your security questions. For example, you can learn how to manage business risk, monitor your IT infrastructure and automate compliance. Take your security knowledge a step forward with best practices in the latest security trends like Big Data Security Analytics, combating Advanced Persistent Threats and understanding the costs of cyber crime.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Securing the Cloud with SIEM
  • Live at: May 24 2012 5:00 pm
  • Presented by: Marc Blackmer, Senior Product Marketing Manager, Solutions at HP Enterprise Security
  • From:
Your email has been sent.
or close
You must be logged in to email this