Protect your business with security analytics and compliance solutions
Your organization, regardless of its size, must turn security and log data into actionable intelligence to make smarter, more efficient decisions. This channel features presentations that help answer your security questions. For example, you can learn how to manage business risk, monitor your IT infrastructure and automate compliance. Take your security knowledge a step forward with best practices in the latest security trends like Big Data Security Analytics, combating Advanced Persistent Threats and understanding the costs of cyber crime.
Best practices to improved protection from advanced threatsTJ Alldridge, Product Marketing Manager, HP TippingPointAdvanced threats and targeted attacks are wreaking havoc in our networks and desktop machines. High-profile attacks seem to make headlines every few weeks. While no security solution is 100% effective, join us to discuss best practices that could bring your security effectiveness closer to that goal.Read more >
Security maturity models can take a variety of forms; they can be embedded on-premises or delivered as a managed third-party service. As such modeling has advanced over the past decade, the need for improved detection and mitigation of attacks has extended well beyond large businesses. A burgeoning underground populated by sophisticated data thieves, state-sponsored hacking collectives, and ideologically motivated hacktivists, is engaged in the systematic plundering and disruption of IT operations at companies of all sizes. This webcast will outline the drivers behind this imperative, summarize the robust approaches security vendors are adopting, and lay out a roadmap for shoring up the security postures of organizations, whatever their size.
Adapting the ArcSight case user interface to your business and using it to collect meaningful metrics.
An insight on maximizing ArcSights case and metrics capabilities. Designing an intuitive custom case user interface tailored to your business. Optimize case management to promote cross collaboration, escalation and organization. Collecting and using case data to drive meaningful operational metrics.
The old school of cyber defense emphasized securing infrastructure and restricting data flows, but data needs to run freely to power our organizations. The new school of cyber defense calls for security that is agile and intelligent. It emphasizes protecting the interactions between our users, our applications, and our data.
The world has changed, and we must change the way we secure it. Join Frank Mong, VP & General Manager of Security Solutions, and hear why you need to secure your: Cloud services, data (wherever it is), and apps (wherever they run).
The idea of a "hunt team" is becoming quite popular. Everyone building a hunt team wants the best and fastest data stores, visualization engines, and pre-canned data science algorithms to magically (and very quickly) find needles in haystacks. But let’s be honest, we can’t afford to get exactly what we want. And if we could afford it, what we exactly want doesn’t even exist for us to buy at this time. In this talk, we'll look at how you can use visualizations and basic statistics with your existing tools to catch more bad guys.
Simplifying Compliance and Forensic Requirements with HP ArcSight Logger
The ever-increasing amount of logging output that IT organizations need to retain to have an accurate picture of what happened in their systems-and when-is a classic "big data" problem. Data categorization and normalization are imperative when sifting through a mass of data that can exceed a petabyte, while eliminating false negatives can aid a forensic investigation. This webcast focuses on HP ArcSight Logger 6, featuring a review of the product by SANS senior analyst Dave Shackleford.
Sign up for this webcast and be among the first to receive an advance copy of a SANS whitepaper discussing Dave's review of HP ArcSight Logger 6.
In the world of information security, the past isn’t dead; it isn’t even the past. The 2015 edition of HP’s annual security-research analysis reveals a threat landscape still populated by old problems and known issues, even as the pace of new developments quickens. In 2014, well-known attacks and misconfigurations existed side-by-side with mobile and connected devices (the “Internet of Things”) that remained largely unsecured. As the global economy continues its recovery, enterprises continued to find inexpensive access to capital; unfortunately, network attackers did as well, some of whom launched remarkably determined and formidable attacks over the course of the year.
The 2015 edition of the HP Cyber Risk Report, drawn from innovative work by HP Security Research (HPSR), examines the nature of currently active vulnerabilities, how adversaries take advantage of them, and how defenders can prepare for what lies ahead. Jewel Timpe, HPSR’s senior manager of threat research, describes the report’s findings and explains how this intelligence can be used to better allocate security funds and personnel resources for enterprises looking toward tomorrow.
Deploying and managing security information and event management systems can tax the brain and budget. However, if done right, these solutions can be a huge benefit to the overall security stance of an organization, providing insight into what's happening on the entire network and enabling security teams to focus on the most pressing priorities to make sure their organizations' infrastructures are safe and sound from attacks. We explore the many challenges organizations face when deploying SIEM and offer remedies that can optimize their use.
Many organizations are looking at using big data to detect more advanced adversaries. We are collecting more information than ever before, but what are we doing with it? In this talk, we will look at some ways you can use data science and visualization tools to get more out of the data you collect. Visualizations will let you see what is happening at a high level: A picture is worth a thousand log entries. There are data science techniques that other industries, such as advertising, have used successfully. We can apply these techniques to find patterns of behavior that are out of the ordinary, and ultimately catch more bad guys.
Businesses are spending so much money on security -- almost $47 billion in 2013 -- and yet the number of breaches continues to increase. To mitigate the risks of increasingly sophisticated, innovative and persistent threats, we need to change the way we think about our security programs. In this webcast, Art Gilliland, General Manager of HP Enterprise Security Products, talks about the challenges all enterprises face from the bad guys -- and the critical steps businesses must take to defend against today's most advanced threats.