Securing the Cloud with SIEM

Marc Blackmer, Senior Product Marketing Manager, Solutions at HP Enterprise Security
Organizations are adopting cloud services at a very fast pace, driven by the cost effectiveness, speed/time to market and better performance and availability cloud adoption provides. However the security of data and access in the cloud is still a major cause for concern. Even if the organization is comfortable with a cloud service provider’s security posture, they are often surprised to find they are ultimately responsible for securing their own data. Fortunately security event and information management (SIEM) solutions are able to extend information and access controls to cloud in addition to physical and virtual environments. This webinar will dive into the various options available to organizations to help them ensure a secure cloud services environment.
May 24 2012
39 mins
Securing the Cloud with SIEM
Join us for this summit:
More from this community:

IT Service Management

Webinars and videos

  • Live and recorded (1961)
  • Upcoming (51)
  • Date
  • Rating
  • Views
  • Join us for a 30-minute live session every Friday, where we’ll tour the RingCentral interface, discuss the latest innovations and features available on the RingCentral platform, and share best practices on leveraging cloud communications for your business. This session features a live demo of RingCentral Office and an open Q&A session led by a Sales Engineer. This week tune in and learn how your employees can hold multi-point HD video meetings around the world, anytime and anywhere with RingCentral Meetings.
  • Join salesforce.com customer kCura as they describe the value of having a communities platform to create frictionless service experiences with law firms, government agencies, and litigation service providers. Learn how a self-service community experience enables customers to help each other and themselves, letting service teams focus on the big issues. All of these benefits ultimately translate into a frictionless and unified experience for all their customers!

    George Orr is the VP of Client Services for kCura. He leads strategic and implementation initiatives designed to enhance the online experience of customers.
  • Over the past several years, ITSM has evolved dramatically. What was considered mature and effective Service Management a short time ago is barely sufficient today. Does this get you thinking about what is next for ITSM and whether your Service Management solution is the one to take you to the next level? Good! Let’s get together and talk about it. We will look at industry best practices, lessons learned and what you should consider in your future plans to get to the next frontier of ITSM.

    Join George Spalding, Executive Vice President of Pink Elephant, as he presents his thoughts about how we got HERE and what he believes are the next best moves to get us THERE – in the future of ITSM. George Spalding won the 2012 Ron Muns Lifetime Achievement Award from HDI, is one of the world’s most insightful IT Service Management and Support experts and has spent several years as a consultant to the White House, the Smithsonian Institute, and the Federal Bureau of Investigation. George is an ITIL Expert, he is a regular author of IT articles and white papers, and is a presenter at global ITSM conferences and events.
  • Over the past several years, ITSM has evolved dramatically. What was considered mature and effective Service Management a short time ago is barely sufficient today. Does this get you thinking about what is next for ITSM and whether your Service Management solution is the one to take you to the next level? Good! Let’s get together and talk about it. We will look at industry best practices, lessons learned and what you should consider in your future plans to get to the next frontier of ITSM.

    Join George Spalding, Executive Vice President of Pink Elephant, as he presents his thoughts about how we got HERE and what he believes are the next best moves to get us THERE – in the future of ITSM. George Spalding won the 2012 Ron Muns Lifetime Achievement Award from HDI, is one of the world’s most insightful IT Service Management and Support experts and has spent several years as a consultant to the White House, the Smithsonian Institute, and the Federal Bureau of Investigation. George is an ITIL Expert, he is a regular author of IT articles and white papers, and is a presenter at global ITSM conferences and events.
  • The Operations Bridge is “the” solution for IT Operations to effectively address the challenges they face when it comes to managing the new style of IT: complex composite applications, virtualized environments, cloud-based services, big data, and a variety of management solutions from different vendors. In this session, you will learn how the HP Operations Bridge solution allows you to take up those challenges and consolidate all your existing IT monitoring solutions, providing a unique solution to maximize efficiency and improve runtime and performance of your IT services.
  • Enterprises are realizing that the opportunity of data analytics is maximum when the data is fresh and represents the "current reality" of operations or customer experience. The business value of data dramatically falls with its age.

    As IT and line-of-business executives begin to operationalize Hadoop and MPP based batch Big Data analytics, it's time to prepare for the next wave of innovation in data processing.

    Join this webinar on analytics over real-time streaming data.

    You will learn about:
    •How business value is preserved and enhanced using Real-time Streaming Analytics with numerous use-cases in different industry verticals
    •Technical considerations for IT leaders and implementation teams looking to integrate Real-time Streaming Analytics into enterprise architecture roadmap
    •Recommendations for making Real-time Streaming Analytics – real – in your enterprise
    •Impetus StreamAnalytix – an enterprise ready platform for Real-time Streaming Analytics
  • Problem Management is a game changer. It is critical in developing real quality in service delivery. However, very few organisations actually get this aspect of ITSM working well.

    This fourth session in the ITSM Goodness series will look at how we spend too much time focussing on efficient ‘fire-fighting’ (Incident Management), rather than looking at avoiding recurrence or eradicating faults altogether - ultimately a better solution for customer and provider alike. Often there are some simple misunderstandings around what Problem Management is or what is required to make it work. Also it can be difficult to find the right people to make Problem Management happen, particularly as it is not a simple linear process that can be ‘industrialised’ like Incident Management. This session provides simple clear guidelines on what is needed and how to make Problem Management work well for your organisation.

    This 8-part monthly series is designed to provide real-time value to newcomers and take to the next level those already familiar with the approach.

    ITSM Goodness is an approach created by Barclay Rae to deliver practical, proven, successful and accessible advice and guidance for ITSM and IT professionals. The focus is clear and simple – on achieving the right business outcomes from IT, and how this is delivered, via the Customer Experience.
  • The foundation of success for any company is an outstanding customer experience, but we all know the journey toward creating an amazing service culture is a challenging one. While a great culture doesn’t happen overnight, it IS attainable (really!) with the right approach. Join Joel Daly, HOSTING’s COO, as he discusses HOSTING’s journey: the obstacles, the companies we admire, and the process we undertook to reach excellent service.
  • For many IT Service Organisations the selection of their ITSM toolset is one of the most important, and expensive, decisions they can make. Causing huge disruption and extra work as staff are moved from one system to another. The ITSM toolset is like the engine that drives an IT department and its ability to ensure work is prioritised, integrated and moved between support teams. It is utterly critical to the running of an IT department, but if its so important why do so many IT departments only keep a toolset for 3-5 years before moving to another one and starting the process again?

    Join Peter Hubbard, Principal ITSM Consultant at Pink Elephant, as he shares his experiences on what happens during an ‘out of the box’ toolset implementation program, along with his advice and guidance on avoiding typical pitfalls that many implementations could easily avoid.

    Learn about the critical importance of People, Process and Product working in harmony to make sure that your toolset selection and implementation program delivers real business value quickly.

    Learn why ‘Out of the box’ is a dangerous phrase, and there is no such thing in the real world. Peter will be join by Michael Jenkins, a veteran toolset implementer with over 20 such projects behind him as they discuss what happens in an ‘out of the box’ implementation.

    They will discuss how to pick a toolset, the value of use cases, what happens on the vendor ‘demo day’ and what sort of actions you can be undertaking prior to the chosen vendor starting their implementation in order to speed up the process and make sure that your most expensive ITSM decision returns real value.
  • There’s a sea change taking place in service and how consumer ‘journeys’ are taking place. Howard Kendall, founder of the SDI, has spent much time keeping track of what is really going on, how customer expectations are changing, and how we can use leverage this in the service desk industry.

    Join Howard for an informative discussion on how service desk can successfully rise to the challenge of delivering excellent customer service, meeting, and possibly surpassing, the expectations of the customers they support. Howard will provide some top tips that will help to win the hearts and minds of service desk customers and build stronger relationships with end-user constituents, elevating the position of the service desk within the IT organisation.
  • Channel
  • Channel profile
Up Down
  • How do you find a needle in a haystack? Uncover Big Data Security Analytics Recorded: Apr 15 2014 38 mins
    Advanced targeted cyber attacks have hit some of the world’s largest businesses. The attacks weren't blocked because they don’t match any known attack signature. Each one is unique, custom created to penetrate the target network and steal data.

    A new video featuring Gartner Distinguished Analyst, Neil MacDonald, and HP’s Eric Schou, explains how Big Data Security Analytics can help find and block targeted cyber attacks. View it to learn:

    How advanced targeted cyber attacks are different from traditional threats
    How Big Data techniques can spot attacks when traditional defenses fall short
    What you should be doing now to take advantage of Big Data Security Analytics
  • Cybercrime video Recorded: Mar 13 2014 3 mins
    Cyber criminals continue to steal data and interrupt business at alarming rates. The average annualized cost of cyber crime is $7.2 million per company per year, with a range of $375K to a staggering $58 million, according to a global study by the Ponemon Institute. That’s an increase in cost of 30 percent over last year’s global results. The most costly criminal activities come from malicious insiders, denial-of-service and web-based attacks – and no industry is immune. Fortunately, there are ways to fight back.

    In this short video you’ll learn:
    *How proactive security measures can save millions of dollars
    *What seven security technologies are key to winning the cyber crime war
    *Where to get more information and guidance
  • How do you find a needle in a haystack? Uncover Big Data Security Analytics Recorded: Mar 13 2014 31 mins
    "There are no “signatures” for advanced targeted cyber attacks, because each attack is unique. Cyber criminals custom create them to penetrate your network and steal your data, so traditional cyber defenses can fall short and leave you unprotected. Neil McDonald, Gartner Group Distinguished Analyst, explains how Big Data Security Analytics (BDSA) can sift through mountains of information and, by understanding what legitimate activity looks like, identify suspect activity that represents security risk and warrants further investigation. And HP’s Eric Schou tells how HP ArcSight Security Information and Event Management (SIEM) platform applies these techniques to protect HP ArcSight customers.
  • How To Stop Target-Like Breaches In Their Tracks Recorded: Feb 24 2014 54 mins
    Using the Target breach as a case study, this webinar will demonstrate how timely detection and threat intelligence integrated with incident response management could have stopped the attack cold.
  • Top 5 Truths About Big Data Hype and Security Intelligence Recorded: Feb 19 2014 4 mins
    With the explosion in security data, Big Data security analytics (BDSA) is widely acknowledged as the future of security information and event management (SIEM). But BDSA is a specialized application of Big Data. This webinar shows how BDSA is different:
    - There’s more to BDSA than just “big.”
    - BDSA requires real-time processing of security data.
    - BDSA requires more than just Big Data technology.
  • Stay out of the headlines for breaches / non-compliance with security analytics Recorded: Jan 23 2014 62 mins
    Tight alignment between compliance and security capabilities can make each component stronger than it would be by itself. Organizations that blend the two not only more effectively combat targeted attacks and data breaches, but also more easily meet compliance requirements and avoid expensive fines. Learn how leading organizations are leveraging continuous monitoring and incident response management to achieve a more secure and compliant enterprise.
  • How Evolving SIEM Defends Against Advanced Persistent Threats Recorded: Jan 16 2014 61 mins
    The threat landscape is constantly evolving, with Advanced Persistent Threats and zero-day exploits challenging our best abilities to keep systems and data safe and secure. As a result the way we monitor and manage security events is also evolving – and SIEM, which used to be synonymous with log management has evolved to meet today’s threats and prepare for tomorrow’s as well. Join our complimentary webinar sponsored by Dark Reading and HP to hear from Forrester security expert Edward Ferrara who will discuss how SIEM is evolving and how to best take advantage of the new security tools that puts at your disposal.

    Attend this event to learn:

    •How SIEM is evolving in conjunction with the threat landscape
    •Ways application monitoring impacts security management
    •The role of Big Data in correlating security events
    •What do to now to be prepared for the evolution of SIEM
    Register now for this important event and bring your questions for our panel of experts to address during the live Q&A following the presentation.
  • Managed security service provider builds intelligent analysis on HP solution Recorded: Jan 6 2014 4 mins
    TELUS, a leading provider of managed security solutions in Canada, needed to safeguard the internal core network of multiple business units while supporting its managed security solutions business. HP ArcSight is the platform for building out future services from intelligent analysis and forensics capabilities to managed services and malware analysis. HP TippingPoint and HP ArcSight operate synergistically, with the IPS providing a critical log source for the SIEM system.
  • Paychex prioritizes security events to protect their business Recorded: Dec 5 2013 3 mins
    Paychex needed to derive logs from a vast number of devices and create a single, enterprise-wide view of security information and events. The customer has had phenomenal success with obtaining intelligence from different sources, pulling it into HP ArcSight, and making use of it. With HP Fortify SSC integrated into the software development lifecycle, application security has improved greatly.
  • Don't mess it up - here's how to get it right Recorded: Nov 12 2013 54 mins
    Based on an anonymized breach scenario, this webinar will define a framework for the broader incident response (IR) process
  • 2013 4th Annual Cost of Cyber Crime Study Results: Asia Recorded: Oct 31 2013 60 mins
    2013 Cost of Cyber Crime Study: Australia & Japan

    Join us for the 2013 results presentation of the second annual Cost of Cyber Crime study for Australia and Japan. Conducted by Ponemon Institute and sponsored by HP Enterprise Security, a total of 64 Australian and Japanese organizations participated. According to the findings, cyber attacks increased 12 percent in Australia and 32 percent in Japan. The costs associated with this increase in Australia were $772,903 and ¥265 million in Japan. “Findings from the report also show that each week Australian and Japanese organizations experienced on average 1.4 successful attacks per company”
  • 2013 4th Annual Cost of Cyber Crime Study Results: Europe Recorded: Oct 30 2013 62 mins
    2013 Cost of Cyber Crime Study: UK, Germany & France

    Join us for the 2013 results presentation of the second annual Cost of Cyber Crime study for the United Kingdom and Germany. For the first time, the research was conducted in France. Conducted by Ponemon Institute and sponsored by HP Enterprise Security, a total of 110 UK, German and French organizations participated. According to the findings, cyber attacks increased 16 percent in the UK and 21 percent in Germany. The costs associated with this increase in the UK and Germany were £904,886 and €830,169, respectively. For the first time, it was determined that the average cost of a cyber attack in France was €3.89 million. Findings from the report also show that each week UK and German organizations experienced on average 1.3 successful attacks per company. French organizations experienced an average of 1 cyber attack per company.
  • 2013 4th Annual Cost of Cyber Crime Study Results: Americas Recorded: Oct 29 2013 61 mins
    Join us for the 2013 results presentation of the 4th Annual Cost of Cyber Crime Study, conducted by Ponemon Institute and sponsored by HP Enterprise Security. This study, based on a benchmark sample of U.S. organizations, shows that cyber attacks not only increased 12 percent last year, the costs associated with those attacks increased by an average of 26 percent or $2.6 million per organization. Findings from the report also show that each week, an organization can expect two of the many cyber attacks launched against it to succeed.

    Join us for this important webinar and learn how:
    • All industries and all sizes of organizations fall victim to cyber crime, but to different degrees.
    • Denial of service, malicious insiders and web-based attacks comprise the most costly crimes.
    • Attacks can be mitigated by SIEM, enterprise governance, application security testing and other prevention-focused strategies and technologies.
  • Insiders, Outsiders and Big Data Recorded: Sep 11 2013 46 mins
    The challenges you face today in protecting your organization from insiders, outsiders, and hacktivists include incomplete threat intelligence, minimal visibility into unstructured data, and insufficient context. In addition, modern network security systems generate such an enormous volume of events that it is hard to take action on all of them. Learn about techniques and technologies that you can use to handle high volumes of structured and unstructured data to derive true intelligence from today’s modern security systems.
  • Top 5 Truths about Big Data Hype and Security Intelligence Recorded: Jul 17 2013 89 mins
    Big Data security analytics (BDSA) is the subject of exuberant predictions, and some claim it will replace SIEM. However, Gartner analyst, Anton Chuvakin points out that no available BDSA solutions have yet come close to these speculations.

    Hype aside, however, it is clear that the principles of BDSA are the key to advanced security intelligence, and that Big Data requirements are nothing new to SIEM technology.

    Join Sri Karnam of HP for this webinar and learn five important facts about BDSA:

    1. There’s More to Big Data than “Big.”
    2. There’s more to BDSA than technology.
    3. BDSA has to happen in real time.
    4. There’s a risk that data silos will persist in Big Data repositories.
    5. The “3 Vs” of Big Data—volume, velocity, and variety—are not new to SIEM.

    Karman will show you how Enterprise SIEMs have been dealing with the challenges of the 3 Vs in security data for years, and how HP ArcSight SIEM solutions can give you BDSA specialized for event data and can support additional information types that you can use for the detection of real-time threats.
  • Top 5 myths of SIEM Recorded: Jul 9 2013 24 mins
    While security threats continue to mount, many organizations have deployed or have considered deploying security information and event management (SIEM) solutions in order to combat data theft and cyber-attacks across the enterprise. SIEM solutions are essential for helping security analysts perform forensic analysis and detect threats, as well as meet industry compliance requirements.

    In this presentation, we will review some common misperceptions surrounding SIEM technology to help IT Security Professionals separate truth from fiction behind common myths about SIEM. Without proper information, Security Executives sometimes have a hard time justifying SIEM investments to their management. Worse yet, a SIEM solution that is not deployed properly may not produce the desired results. Prevent this from happening by learning the top 5 myths of SIEM.
  • Business Driven Continuous Compliance Recorded: Jun 13 2013 40 mins
    While a key driver for adapting security technologies, compliance is still a huge burden for most organizations. In the presentation we will discuss novel approaches to both lower the cost of compliance and derive relevant business value from the process. Changing the compliance process from a periodical manual process into a continuous automated process ensures real time visibility into your compliance posture as well as the ability to react in real time to compliance issues rather than just after the fact. By overlaying the information collected with your enterprise IT asset model, the real time compliance information can also contribute to business driven risk management and help in making the right investment decisions in information security.
  • Gaining Threat Intelligence and Combating the Four Most Common Attack Vectors Recorded: Jun 12 2013 36 mins
    The HP Security Research team (HPSR) is hard at work monitoring the threat landscape for new campaigns, profiling actors to understand their motivations, identifying the tools they use and determining how credible certain threats might be. It’s part of a long-term strategy for developing a new threat intelligence-sharing model. Why is that important? It will provide real-time info from the larger security community-- enterprises like yours, industry security organizations and security vendors-- that can be used to automate and catch these breaches immediately.

    Learn about HP’s findings, including these culprits: injection flaws, DDoS, various phishing techniques and zero day vulnerabilities. How can you address the inevitable breaches that will occur?
  • PCI DSS 2.0 - Section 10: Creating a successful logging and monitoring program Recorded: May 1 2013 37 mins
    PCI is an ongoing process in which each year should build upon the previous. Too many organizations treat PCI compliance as a box that must be checked, but not the ongoing maturity process it was designed to be. PCI has 12 requirements; we will focus on building a foundation to support Section 10: the requirement to track and monitor all access to cardholder data. This session will provide an overview of the proper way to institute a PCI logging and monitoring program. The topics covered will include policy and standards, proper organizational and team alignment, as well as real world examples of successful PCI logging programs. The intended audience for this session is anyone in charge of or working in a PCI regulated organization. The session will be led by Colin Henderson, Principal Security Consultant with HP.
  • Enhance Your Security Operations with Big Data Recorded: Mar 13 2013 37 mins
    More and more security operations centers are transforming their operations from being reactive, to proactive and even predictive. Hear how big data technologies like Autonomy IDOL can be leveraged with traditional security monitoring tools for Social Network Monitoring and Data Loss Prevention (data in motion) to drive value and empower a “next generation SOC.”
Protect your business with security analytics and compliance solutions
Your organization, regardless of its size, must turn security and log data into actionable intelligence to make smarter, more efficient decisions. This channel features presentations that help answer your security questions. For example, you can learn how to manage business risk, monitor your IT infrastructure and automate compliance. Take your security knowledge a step forward with best practices in the latest security trends like Big Data Security Analytics, combating Advanced Persistent Threats and understanding the costs of cyber crime.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Securing the Cloud with SIEM
  • Live at: May 24 2012 5:00 pm
  • Presented by: Marc Blackmer, Senior Product Marketing Manager, Solutions at HP Enterprise Security
  • From:
Your email has been sent.
or close
You must be logged in to email this