Securing the Cloud with SIEM

Manage webcast
Marc Blackmer, Senior Product Marketing Manager, Solutions at HP Enterprise Security
Organizations are adopting cloud services at a very fast pace, driven by the cost effectiveness, speed/time to market and better performance and availability cloud adoption provides. However the security of data and access in the cloud is still a major cause for concern. Even if the organization is comfortable with a cloud service provider’s security posture, they are often surprised to find they are ultimately responsible for securing their own data. Fortunately security event and information management (SIEM) solutions are able to extend information and access controls to cloud in addition to physical and virtual environments. This webinar will dive into the various options available to organizations to help them ensure a secure cloud services environment.
May 24 2012
39 mins
Securing the Cloud with SIEM
More from this community:

IT Service Management

  • Live and recorded (2600)
  • Upcoming (52)
  • Date
  • Rating
  • Views
  • NTT Com Security would like to invite you to join us and our partner LogRhythm on July 28th, 2015 from 2:00-3:00 p.m. EST for a webinar addressing the current and ongoing cyber-threat to Financial and Insurance institutions.
  • This live demo will show you how you can seamlessly blend business communications into your cloud work environment, transforming Microsoft Office 365 into an enterprise-grade communications hub with an easy-to-use interface that is very simple for end-users to deploy and IT to manage.

    Make it easy for employees to initiate PSTN calls and SMS, view screen pops with relevant information, automatically log the calls, and more -- without ever leaving Office 365. You’ll also see how easy it is to add new users and make changes as your business evolves with RingCentral’s cloud based communications system.

    Our expert presenter will walk you through how it works and answer your questions. You’ll see:

    •How to place calls with one click from within Office 365
    •Views of customer profile and communications history
    •Automated ticket creation from calls
  • This live demo will show you how you can seamlessly blend business communications into your cloud work environment, creating an enterprise-grade communications hub with an easy-to-use interface that is very simple for end-users to deploy and IT to manage.

    Make it easy for employees to initiate PSTN calls and SMS, view screen pops with relevant information, automatically log the calls, and more -- without ever leaving their favorite apps. You’ll also see how easy it is to add new users and make changes as your business evolves with RingCentral’s cloud based communications system.

    Our expert presenter will walk you through how it works and answer your questions. You’ll see:

    •How to place calls with one click from within your business apps
    •Views of customer profile and communications history
    •Automated ticket creation from calls
    •And more!
  • Number porting is a meticulous process. You want to do the right thing at the right time, or you could throw off your transition schedule. We’ll take you through the timeline and point out the pitfalls so that you can transition to your new cloud phone system without a hitch.
  • Für die intelligente IT von morgen – Highlights und Features von FNT Command 10

    Die tiefgreifenden Entwicklungen der Trends wie „Big Data“, „Cloud“ und „Internet of Things“ ebnen bereits heute den Weg für die IT der Zukunft. Aufgrund der steigenden Komplexität der zu verwaltenden Infrastrukturen besteht für Verantwortliche in IT, Telekommunikation und Rechenzentren die größte Herausforderung darin, die benötigten Informationen zum richtigen Zeitpunkt abrufen zu können.

    Aus diesem Grund wurden die neuen Funktionalitäten von FNT Command 10 mit dem Fokus entwickelt, jeden Anwender in seinem individuellen Aufgabenbereich optimal zu unterstützen. Claudia Lehmann, Product Marketing Manager, stellt Ihnen die neuen Highlights vor, mit denen Sie einen völlig neuen Einblick in Ihre Daten erhalten können.
  • Over 90% of targeted attacks start with email. Criminals create very convincing emails to trick your users into clicking on a link, opening an attachment, or replying with their credentials. The attack methods criminals employ with phishing emails are constantly changing and so must your email security to block these attacks before damage occurs. Learn about the newest trends in phishing email attacks and how to protect your organization.
  • Employee self-service is often viewed by IT as a 'knight in shining armor' since it can provide quicker employee access to both help and new services, while taking some of the pressure off overworked corporate IT service desks. However, for many organizations, their initial attempts to introduce self-service have been more white elephant than white knight – with low employee adoption and utilization rates – often due to an overemphasis on the technology.

    Thankfully now, after many hard lessons have been learned, some organizations are finally getting self-service right. In this webinar, we’ll share how they’ve succeeded, by:

    * Exploring the variety of challenges and potential pitfalls with self-service – including technology, management, and end-user perspectives
    * Offering practical advice and good practice on how to design, launch, manage, and encourage the use of an employee self-service facility for IT (or any other corporate service provider)
    * Providing sensible actions that will help you to either get started with, or to improve upon, self-service within your organization
  • The economic significance of application management is often underrated. Did you know that about 40% of IT budgets is spent on keeping applications up and running, up to date and under control? But are you getting enough value out of your investments?

    This webinar explores application support, maintenance/renewal and strategy.
    Takeaways:
    - overview of the whole Application Management domain and its relationships with the business and other IT disciplines and external service providers
    - better understanding of the costs and benefits of Application Management and how to influence them
    - frameworks, standards and trends and how to benefits from them
  • Do any of these comments sound familiar?

    - “Only the new people find value in our knowledge base.”
    - “Once our teams learn how to resolve something, they don’t need to use the knowledge base.”
    - “It takes longer to find it in the knowledge base than it does to figure it out.”
    - “Our knowledge base is out dated and cumbersome to use.”
    - "I’ll ask (insert name here), he / she will know the answer.”
    If so, you may be stuck in the knowledge-engineering rut. The Knowledge-centered-support methodology is a proven best practice that overcomes these challenges. Attend this session to learn about the KCS methodology and how you can use it to:

    -reduce the time to resolution
    -standardize answers to your customers
    -lower support costs
    -increase customer satisfaction
    -increase employee job satisfaction

    KCS becomes the way you resolve incidents, answer questions, share your knowledge with peer staff, and in short get people back to work. Because it is part of the Incident process, it is always current and accurate and enables your teams to continually support an expanding breadth of services.

    Additionally, you will hear about the journey of the University of Phoenix, and parent company Apollo Education Group, in moving out of old-school knowledge engineering, “ivory tower” knowledge approaches, and into the realm of real-time knowledge management – using KCS to empower front-line staff content administration, and manage knowledge by positive peer-to-peer relationships. We will discuss the use of the Knowledge-Centered Support (KCS) methodology in a highly-regulated business environment, to capture, structure, and reuse knowledge as new incidents occur and the business environment changes. Our chat will discuss the methods utilized, uncover the “ditches” to avoid, and present the metrics used to measure and prove success.
  • Channel
  • Channel profile
  • The New School of Cyber Defense Recorded: Jul 13 2015 58 mins
    Frank Mong, Vice President & General Manager of HP Security Solutions
    The old school of cyber defense emphasized securing infrastructure and restricting data flows, but data needs to run freely to power our organizations. The new school of cyber defense calls for security that is agile and intelligent. It emphasizes protecting the interactions between our users, our applications, and our data.

    The world has changed, and we must change the way we secure it. Join Frank Mong, VP & General Manager of Security Solutions, and hear why you need to secure your: Cloud services, data (wherever it is), and apps (wherever they run).
  • Hunting Today: Using existing technology to hunt cyber threats Recorded: Jun 23 2015 28 mins
    Jeff McGee, HP Solutions Innovation Data Scientist
    The idea of a "hunt team" is becoming quite popular. Everyone building a hunt team wants the best and fastest data stores, visualization engines, and pre-canned data science algorithms to magically (and very quickly) find needles in haystacks. But let’s be honest, we can’t afford to get exactly what we want. And if we could afford it, what we exactly want doesn’t even exist for us to buy at this time. In this talk, we'll look at how you can use visualizations and basic statistics with your existing tools to catch more bad guys.
  • Think Like a Bad Guy, Act Like a Good Guy. Recorded: May 8 2015 2 mins
    HP Enterprise Security
    Watch now to learn more how the HP Enterprise Security products work together to fight off the bad guys.
  • Simplifying Compliance and Forensic Requirements with HP ArcSight Logger Recorded: Apr 24 2015 61 mins
    Dave Shackleford, SANS Analyst and Sri Karnam, HP ArcSight Product Marking Manager
    Simplifying Compliance and Forensic Requirements with HP ArcSight Logger

    The ever-increasing amount of logging output that IT organizations need to retain to have an accurate picture of what happened in their systems-and when-is a classic "big data" problem. Data categorization and normalization are imperative when sifting through a mass of data that can exceed a petabyte, while eliminating false negatives can aid a forensic investigation. This webcast focuses on HP ArcSight Logger 6, featuring a review of the product by SANS senior analyst Dave Shackleford.

    Sign up for this webcast and be among the first to receive an advance copy of a SANS whitepaper discussing Dave's review of HP ArcSight Logger 6.
  • HP Cyber Risk Report 2015: The Past is Prologue Recorded: Mar 12 2015 28 mins
    Jewel Timpe, Senior Manager- Threat Research, HP Security Research
    In the world of information security, the past isn’t dead; it isn’t even the past. The 2015 edition of HP’s annual security-research analysis reveals a threat landscape still populated by old problems and known issues, even as the pace of new developments quickens. In 2014, well-known attacks and misconfigurations existed side-by-side with mobile and connected devices (the “Internet of Things”) that remained largely unsecured. As the global economy continues its recovery, enterprises continued to find inexpensive access to capital; unfortunately, network attackers did as well, some of whom launched remarkably determined and formidable attacks over the course of the year.

    The 2015 edition of the HP Cyber Risk Report, drawn from innovative work by HP Security Research (HPSR), examines the nature of currently active vulnerabilities, how adversaries take advantage of them, and how defenders can prepare for what lies ahead. Jewel Timpe, HPSR’s senior manager of threat research, describes the report’s findings and explains how this intelligence can be used to better allocate security funds and personnel resources for enterprises looking toward tomorrow.
  • If SIEM is Dead It’s Because You Killed It Recorded: Feb 26 2015 31 mins
    Jesse Emerson - Director, Security Intelligence & Ops Consulting
    Deploying and managing security information and event management systems can tax the brain and budget. However, if done right, these solutions can be a huge benefit to the overall security stance of an organization, providing insight into what's happening on the entire network and enabling security teams to focus on the most pressing priorities to make sure their organizations' infrastructures are safe and sound from attacks. We explore the many challenges organizations face when deploying SIEM and offer remedies that can optimize their use.
  • Applied Security Analytics Recorded: Feb 26 2015 45 mins
    Jeff McGee, Solutions Innovation Data Scientist, HP
    Many organizations are looking at using big data to detect more advanced adversaries. We are collecting more information than ever before, but what are we doing with it? In this talk, we will look at some ways you can use data science and visualization tools to get more out of the data you collect. Visualizations will let you see what is happening at a high level: A picture is worth a thousand log entries. There are data science techniques that other industries, such as advertising, have used successfully. We can apply these techniques to find patterns of behavior that are out of the ordinary, and ultimately catch more bad guys.
  • Outthinking the Bad Guys Recorded: Feb 6 2015 22 mins
    Art Gilliland, General Manager of HP Enterprise Security Products
    Businesses are spending so much money on security -- almost $47 billion in 2013 -- and yet the number of breaches continues to increase. To mitigate the risks of increasingly sophisticated, innovative and persistent threats, we need to change the way we think about our security programs. In this webcast, Art Gilliland, General Manager of HP Enterprise Security Products, talks about the challenges all enterprises face from the bad guys -- and the critical steps businesses must take to defend against today's most advanced threats.
  • Defending Against Advanced Attacks Recorded: Jan 5 2015 25 mins
    Mark Nicolett - Managing VP, Gartner
    A webinar with Gartner VP Mark Nicolett, provides solid tips to reduce your vulnerability.

    The recent data breach cost Target more than $60 million in recovery costs. And even that has been exceeded at other companies that have fallen victim to advanced targeted cyber attacks.

    View the webinar to learn:
    •How to present a hard target to hackers
    •How advanced persistent attacks work
    •How the SOC and NOC can work together
    •Best practices for security information and event management (SIEM)
  • Advancing Incident Management: The Next Evolution Recorded: Dec 18 2014 38 mins
    Mitchell Webb
    To combat advanced adversaries, we must improve our detection and response capabilities. This presentation will cover emerging processes and technologies in security operations that allow organizations of all sizes to improve their detection and response effectiveness. The capabilities presented here have been used by HP to detect and remove advanced threats for organizations across the globe.
  • Top 10 tips to be compliant and secure together Recorded: Dec 8 2014 37 mins
    Sridhar Karnam, Sr. Product Marketing Manager, ESP HQ Team
    Compliance and security are better together and there are tools and resources that can be combined to achieve both. Learn the top 10 tips - such as continuous monitoring, assessing the controls, and cost-effective audit logs - to understand and implement best practices of compliance and security together.
  • The cost of inaction—what cyber crime could cost your business Recorded: Oct 29 2014 60 mins
    Sponsored by HP Enterprise Security, Independently conducted by Ponemon Institute LLC
    The average company in the United States loses $12.7 million annually to cyber crime. Other countries are close behind. These are results from the recently completed Ponemon Institute 2014 Cost of Cyber Crime study. You know the risks, but you need the data to plan your defenses and demonstrate the cost of inaction.

    View this webinar with Dr. Larry Ponemon to get the information you need. You’ll learn:

    - What cyber crimes are most common and most costly
    - The hidden internal and external costs you incur
    - What security defenses are most effective in reducing losses
    - How businesses with a strong security posture drive down costs.
  • 5th Annual Ponemon Cost of Cyber Crime Study Results: APJ Recorded: Oct 10 2014 56 mins
    Sponsored by HP Enterprise Security, Independently conducted by Ponemon Institute LLC
    Explore cyber crime in Asia Pacific and Japan

    The cost of cyber crime is on the rise in the APJ region, according to the 2014 Cost of Cyber Crime study from the Ponemon Institute. Among 30 companies surveyed in Australia, the reported per-company cost for Internet-driven crime was $4 million, up 8.4% from 2013. In Japan, the per-company average hit $6.9 million in the study, up 5.7% from 2013.

    On the more optimistic side, companies in the region are achieving notable ROI for their investments in cyber security solutions. The average ROI for seven security technologies was 16% in Australia and 17% in Japan. For a close-up view of these and other findings from the institute’s research in Australia and Japan, join Dr. Larry Ponemon, chairman and founder of the Ponemon Institute, for our APJ Security webinar.
  • 5th Annual Ponemon Cost of Cyber Crime Study Results: Americas Recorded: Oct 9 2014 60 mins
    Sponsored by HP Enterprise Security, Independently conducted by Ponemon Institute LLC
    Explore cyber crime in the Americas

    In the 2014 Cost of Cyber Crime study, U.S. companies reported an average of $12.7 million in losses to cyber crime. That was the highest national average in the study by the Ponemon Institute. Among the 59 U.S. companies in the survey, the average cost of cyber crime climbed by more than 9% over the course of the year.

    Among other findings, the study noted that the most costly cyber crimes are those caused by denial of services, malicious insiders, and malicious code. These threats account for more than 55 percent of all cyber crime costs. For a fuller look at these and other findings from the institute’s study of U.S. companies, join Dr. Larry Ponemon, chairman and founder of the Ponemon Institute, for our AMS Security webinar
  • 5th Annual Ponemon Cost of Cyber Crime Study Results: EMEA Recorded: Oct 8 2014 59 mins
    Sponsored by HP Enterprise Security, Independently conducted by Ponemon Institute LLC
    Explore cyber crime in Europe

    For its 2014 Cost of Cyber Crime study, the Ponemon Institute expanded its focus in Europe to encompass the Russian Federation, as well as France, Germany, and the United Kingdom. Collectively, the institute surveyed 137 companies in Europe in a study that found broad differences in the reported costs of cyber crime across the region. The per-company average ranged from $3.3 million in the Russian Federation to $8.1 million in Germany.

    The study results indicate that over the course of the year, cyber crime rose 20.5% in France, 17.4% in the U.K., and 7.2% in Germany. For a closer look at these and other findings from the institute’ European research, join Dr. Larry Ponemon, chairman and founder of the Ponemon Institute, for our EMEA Security webinar.
  • Catching Insiders: It's a 'People' Problem (Technology Can Help) Recorded: Sep 17 2014 45 mins
    Jesse Hughes, Managing Principal, HP
    “Et tu, Brute? Then fall, Caesar!” A rather famous line from Shakespeare’s Julius Caesar that, whether historically accurate or not, encapsulates the terror and surprise felt at the discovery of an Insider, and serves to highlight the persistence of the problem we refer to as the Insider Threat. There has always been an Insider Threat, the hard question is, why have we not done more about it? Once we understand the ‘why’ and the ‘who’ (who are Insiders, and who are the rest), we can move on to the ‘How’ we are going to find them. In this presentation we will discuss Insider Threats, their varying levels of sophistication, and different ways in which others might use them. We then apply this understanding to enabling discovery. Join us for an interactive presentation, and discussion on this persistent security challenge.
  • A look at the common, the curious, and the future of SIEM Recorded: Aug 12 2014 26 mins
    Mary karnes, Strategic Solutions Portfolio Manager
    SIEMs can be a useful and powerful platform functioning as the cornerstone of a security program. In this webinar we will explore the various ways we see clients using SIEM technology, how customers grow and mature their SIEM capabilities over time, and a sneak peek into the more interesting ways we see SIEMs being used right now.
  • State of Security Operations 2014 Report Recorded: Jul 15 2014 7 mins
    Chris Triolo, VP ProServ, HP Enterprise Security & Charles Sterner, Senior Manager, HP Cyber Defense Center
    1 in 4 Security Operations Organizations is ineffective. See how HP assesses security operations capabilities and how they used lessons learned in building their own Cyber Defense Center.
  • Top 10 ways to Solve Your Security Puzzle with ArcSight Logger Recorded: Jul 2 2014 34 mins
    Sridhar Karnam
    Organization’s today are faced with a key business challenge –massive amounts of useful data is being lost every second! According to IDC’s ‘The Digital Universe’, only 3% of data is actually being tagged for Big Data value. How do you ensure your business is handling Big Data challenges? This presentation highlight the top 10 ways HP ArcSight Logger can solve your security challenges. ArcSight’s newly released Logger is the fastest search engine on the planet for machine data. The universal log management solution collects, stores, and analyzes all of your Big Data for security event management and is used for IT operations, compliance, flow analytics, email security, weblog analysis, and more. ArcSight unifies your entire IT data through a unique technology called normalization and categorization, and then correlates the events across the devices in real-time. Find out how Logger can enable your business to stop the bleed and turn data into actionable security decisions.
  • From zero to SOC in 10 steps Recorded: Jun 17 2014 49 mins
    Paul Brettle, Pre-Sales Manager, HP
    In this presentation, we will look at what it takes to become a success when trying to address security monitoring and alerting. It is commonly regarded that log management, monitoring and alerting is seen as a corporate or enterprise solution due to is complexity and costs, but this presentation will address the steps that any organization can take to go from zero to hero. Building on a easily followed process and step by step guide, we will cover the way that organizations can move from one step to the next, managing costs and complexity at each stage. Starting with the basic steps needed to build a foundation, a SOC can be build up and deliver real value and capability without excessive cost or complexity.
Protect your business with security analytics and compliance solutions
Your organization, regardless of its size, must turn security and log data into actionable intelligence to make smarter, more efficient decisions. This channel features presentations that help answer your security questions. For example, you can learn how to manage business risk, monitor your IT infrastructure and automate compliance. Take your security knowledge a step forward with best practices in the latest security trends like Big Data Security Analytics, combating Advanced Persistent Threats and understanding the costs of cyber crime.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Securing the Cloud with SIEM
  • Live at: May 24 2012 5:00 pm
  • Presented by: Marc Blackmer, Senior Product Marketing Manager, Solutions at HP Enterprise Security
  • From:
Your email has been sent.
or close
You must be logged in to email this