Hi [[ session.user.profile.firstName ]]

Security Analytics and Compliance

  • Date
  • Rating
  • Views
  • Beat hackers through visibility, precision and quick response Beat hackers through visibility, precision and quick response Travis Grandpre, HPE Director of ArcSight Product Marketing and Justin Kelso, HPE ArcSight Recorded: Oct 18 2016 40 mins
    As organizations scale, growing in size across physical and virtual borders, they rely on intelligent security operations to maintain the integrity of their security posture. Critical to building Intelligent Security Operations is the ability to gain visibility across boundaries, which means insight into not just networks and IT, but also operational data and IoT devices. This kind of visibility requires managing and maintaining the integrity of millions of events per second that are required to provide credible insights powering the Intelligent Security Operations.

    But visibility without context can become a distraction to resource constrained security operations’ intent on focusing on what matters and remediating threats. Providing context to the collected data through real-time correlation and analytics generated alerts helps to prioritize security analyst tasks, optimizing resources and saving time. Machine learning enrichment of data through the addition of user, entity and security context, helps security operations teams to run efficiently.

    These capabilities together empower you to track alerts and investigate threats at the speed of the attacker.

    Learn how ArcSight plans to lay the foundation for intelligent security operations by providing an open architecture to leverage your data for better detection, investigation and response to threats, while maintaining integrity.
  • SIEM is dead. Long Live the SIEM! SIEM is dead. Long Live the SIEM! Michael Mackrill, Security & Intelligence Operations Consulting Recorded: Feb 23 2016 16 mins
    SIEMs have been around for years and many companies are wondering if they actually got a return on their investment. Meanwhile, multiple vendors are claiming that their latest tool can do everything that a SIEM can and more! Can the SIEM survive?

    We believe that the SIEM is not dead. SIEM is evolving. It must be remembered though that a SIEM is a living, breathing creature that must be cared, fed and interacted with in order to thrive. SIEMs have gotten more robust and can be used to interact with other security programs in ways that they couldn’t a few years ago. Companies need to utilize the SIEM as their central pane of glass to see the threats to their environment and use integration with other tools to help ensure the security of their electronic data.
  • 6th Annual Ponemon Cost of Cyber Crime Global Study Results 6th Annual Ponemon Cost of Cyber Crime Global Study Results Dr. Larry Ponemon, chairman and founder of the Ponemon Institute Recorded: Dec 10 2015 45 mins
    On average, the 58 United States companies participating in the 2015 Cost of Cyber Crime study lost $15 million due to cyber crime, an increase of 19 percent from $12.7 million in last year's study. And other countries are close behind. These are results from the recently completed Ponemon Institute 2015 Cost of Cyber Crime study. You know the risks, but you need the data to plan your defenses and demonstrate the cost of inaction.

    For a fuller look at these and other findings from the institute’s study, join Dr. Larry Ponemon, chairman and founder of the Ponemon Institute, to learn:

    -What cyber crimes are most common and most costly
    -The hidden internal and external costs you incur
    -What security defenses are most effective in reducing losses
    -How businesses with a strong security posture drive down costs
  • The cost of inaction—what cyber crime could cost your business The cost of inaction—what cyber crime could cost your business Dr. Larry Ponemon, Chairman of the Ponemon Institue & Brett Wahlin, VP and CISO of HP Recorded: Oct 19 2015 62 mins
    Cyber Crime cost US companies an average of $15 million in 2015 – a significant increase from a year earlier. It’s a troubling trend unearthed by the Ponemon Institute’s 2015 Cost of Cyber Crime study. You know the risks, but you need the data to plan your defenses and demonstrate the cost of inaction. In this Webinar Dr. Larry Ponemon and

    HP CISO Brett Wahlin will explain how to craft an effective preemptive security strategy. You’ll learn:


    -What cyber crimes are most common and most costly
    -The hidden internal and external costs you incur
    -What security defenses are most effective in reducing losses
    -How businesses with a strong security posture drive down costs
  • HPE Security ArcSight Analytics HPE Security ArcSight Analytics Justin Kelso, Regional Product Management Director, G.R “Chip”- Mesec Product Manager, Tim Wenzlau Product Manager Recorded: Oct 16 2015 53 mins
    Analytics, as they pertain to the security space, are a new horizon for most. With the universal rise in interest in applying analytics to security data and use cases many organizations are overwhelmed by the difficulties surrounding those technologies. Whether it is the cost and rarity of expert manpower, scale and speed of the data, or the immaturity of many of the technologies; many organizations need help making sense of this new frontier and how and where to apply it to their data sets. HPE Security ArcSight has taken the lead in making this emerging technology more readily consumable through the targeted use of analytics for particular datasets and use cases. In this vein HPE Security ArcSight has launched two security analytics offerings: User Behavior Analytics, and DNS Malware Analytics. Please join us in this webcast to learn more about these technologies and how they are making big impacts for security organizations of all sizes.

    Speaker #1
    Justin Kelso
    Regional Product Management Director, AMS, HPE Security ArcSight

    Speaker #2
    G.R “Chip” Mesec
    Product Manager ,DNS Malware Analytics, HPE Security ArcSight

    Speaker #3
    Tim Wenzlau
    Product Manager, User Behavior Analytics, HPE Security ArcSight
  • The Value of Adopting and Improving Security Maturity Models The Value of Adopting and Improving Security Maturity Models Eric Schou, Director, Product Marketing at HP Enterprise Security Products Recorded: Aug 20 2015 60 mins
    Security maturity models can take a variety of forms; they can be embedded on-premises or delivered as a managed third-party service. As such modeling has advanced over the past decade, the need for improved detection and mitigation of attacks has extended well beyond large businesses. A burgeoning underground populated by sophisticated data thieves, state-sponsored hacking collectives, and ideologically motivated hacktivists, is engaged in the systematic plundering and disruption of IT operations at companies of all sizes. This webcast will outline the drivers behind this imperative, summarize the robust approaches security vendors are adopting, and lay out a roadmap for shoring up the security postures of organizations, whatever their size.
  • Adapting the ArcSight case user interface to your business Adapting the ArcSight case user interface to your business Sean Clapper, HP ArcSight, Security Intelligence & Operations Consulting Recorded: Aug 6 2015 54 mins
    Adapting the ArcSight case user interface to your business and using it to collect meaningful metrics.

    An insight on maximizing ArcSights case and metrics capabilities. Designing an intuitive custom case user interface tailored to your business. Optimize case management to promote cross collaboration, escalation and organization. Collecting and using case data to drive meaningful operational metrics.
  • The New School of Cyber Defense The New School of Cyber Defense Frank Mong, Vice President & General Manager of HP Security Solutions Recorded: Jul 13 2015 58 mins
    The old school of cyber defense emphasized securing infrastructure and restricting data flows, but data needs to run freely to power our organizations. The new school of cyber defense calls for security that is agile and intelligent. It emphasizes protecting the interactions between our users, our applications, and our data.

    The world has changed, and we must change the way we secure it. Join Frank Mong, VP & General Manager of Security Solutions, and hear why you need to secure your: Cloud services, data (wherever it is), and apps (wherever they run).
  • Hunting Today: Using existing technology to hunt cyber threats Hunting Today: Using existing technology to hunt cyber threats Jeff McGee, HP Solutions Innovation Data Scientist Recorded: Jun 23 2015 28 mins
    The idea of a "hunt team" is becoming quite popular. Everyone building a hunt team wants the best and fastest data stores, visualization engines, and pre-canned data science algorithms to magically (and very quickly) find needles in haystacks. But let’s be honest, we can’t afford to get exactly what we want. And if we could afford it, what we exactly want doesn’t even exist for us to buy at this time. In this talk, we'll look at how you can use visualizations and basic statistics with your existing tools to catch more bad guys.
  • Think Like a Bad Guy, Act Like a Good Guy. Think Like a Bad Guy, Act Like a Good Guy. HP Enterprise Security Recorded: May 8 2015 2 mins
    Watch now to learn more how the HP Enterprise Security products work together to fight off the bad guys.