Hi [[ session.user.profile.firstName ]]
Sort by:
    • Beyond the Sticker Price: Factors Impacting the Total Cost of Ownership of SIEM Beyond the Sticker Price: Factors Impacting the Total Cost of Ownership of SIEM Michael Suby, Vice President of Research at Frost & Sullivan Recorded: Aug 24 2016 1:00 pm UTC 36 mins
    • Unfortunately many organizations today are losing the race against the hacker community by a large margin. As noted in the Verizon 2016 Data Breach Investigation Report, the percent of compromises that transpired in “days or less” has risen from 67% to 84% over the last 10 years. Over this same time period, the percent of compromise discoveries that occurred in “days or less” also improved, but not enough to narrow the time gap between compromise and discovery. In other words, the bad guys are accelerating their exploits faster than the good guys are accelerating their ability to discover.

      The path to narrowing the time gap between compromise and discovery, and then neutralising business-impacting incidents, is through a comprehensive and mission-oriented Security Information and Event Management (SIEM). A well-designed SIEM not only advances security objectives, but it also works to direct personnel and process for maximum impact. With limited resources and a rising number of attacks, not all solutions are created equal. You need to ensure they are getting the best bang for your buck.

      In this webinar, Michael Suby, vice president of research at the global research and consulting organization Frost & Sullivan, will discuss the factors that contribute to SIEM’s total cost of ownership.

      You’ll learn:

      • How to calculate the total cost of ownership of a SIEM
      • The basic functionality that every SIEM should have to confidently breeze through preliminary activities
      • The SIEM attributes that will have a lasting impact on your organization’s cost efficiency in effectively managing risk

      Join us to learn the features that should be on the top of your scorecard when evaluating a SIEM for either first-time deployment or replacement.

      Read more >
    • Beyond the Sticker Price: Factors Impacting the Total Cost of Ownership of SIEM Beyond the Sticker Price: Factors Impacting the Total Cost of Ownership of SIEM Michael Suby, Vice President of Research at Frost & Sullivan Recorded: Aug 18 2016 7:00 pm UTC 35 mins
    • Unfortunately many organizations today are losing the race against the hacker community by a large margin. As noted in the Verizon 2016 Data Breach Investigation Report, the percent of compromises that transpired in “days or less” has risen from 67% to 84% over the last 10 years. Over this same time period, the percent of compromise discoveries that occurred in “days or less” also improved, but not enough to narrow the time gap between compromise and discovery. In other words, the bad guys are accelerating their exploits faster than the good guys are accelerating their ability to discover.

      The path to narrowing the time gap between compromise and discovery, and then neutralizing business-impacting incidents, is through a comprehensive and mission-oriented Security Information and Event Management (SIEM). A well-designed SIEM not only advances security objectives, but it also works to direct personnel and process for maximum impact. With limited resources and a rising number of attacks, not all solutions are created equal. You need to ensure they are getting the best bang for your buck.

      In this webinar, Michael Suby, vice president of research at the global research and consulting organization Frost & Sullivan, will discuss the factors that contribute to SIEM’s total cost of ownership.

      You’ll learn:

      • How to calculate the total cost of ownership of a SIEM
      • The basic functionality that every SIEM should have to confidently breeze through preliminary activities
      • The SIEM attributes that will have a lasting impact on your organization’s cost efficiency in effectively managing risk

      Join us to learn the features that should be on the top of your scorecard when evaluating a SIEM for either first-time deployment or replacement.

      Read more >
    • SIEM is dead. Long Live the SIEM! SIEM is dead. Long Live the SIEM! Michael Mackrill, Security & Intelligence Operations Consulting Recorded: Feb 23 2016 4:40 pm UTC 16 mins
    • SIEMs have been around for years and many companies are wondering if they actually got a return on their investment. Meanwhile, multiple vendors are claiming that their latest tool can do everything that a SIEM can and more! Can the SIEM survive?

      We believe that the SIEM is not dead. SIEM is evolving. It must be remembered though that a SIEM is a living, breathing creature that must be cared, fed and interacted with in order to thrive. SIEMs have gotten more robust and can be used to interact with other security programs in ways that they couldn’t a few years ago. Companies need to utilize the SIEM as their central pane of glass to see the threats to their environment and use integration with other tools to help ensure the security of their electronic data.

      Read more >
    • How UBA and Machine Learning Can Turbocharge SIEM How UBA and Machine Learning Can Turbocharge SIEM 451 Group, Niara, Intel Security Upcoming: Oct 12 2016 5:00 pm UTC 60 mins
    • Many enterprises have leveraged the correlation, visualization and case management of SIEM to drive the workflow of their Security Operations Center and much of the daily activity of the security team. With the introduction of big data scale, machine learning-based analytics and instantly-accessible forensic data, Network and User Behavior Analytics is a terrific complement to SIEM. Intel and Niara will explain how these new capabilities can be seamlessly introduced to SIEM and demonstrate both enhanced attack detection as well as accelerated investigations and response directly from the McAfee Enterprise Service Management (ESM) console.

      Read more >
    • Symantec Advanced Threat Protection (ATP) Integration with SIEM/Workflow Symantec Advanced Threat Protection (ATP) Integration with SIEM/Workflow Alan Lee, Senior Manager, Product Management, Advanced Threat Protection, Symantec Upcoming: Oct 20 2016 5:00 am UTC 45 mins
    • Symantec Advanced Threat Protection (ATP) – the industry’s leading network, email and endpoint protection solution – is upgrading its capabilities again this October. The new release of Symantec ATP adds Security Information and Event Management (SIEM) and workflow integration with Public API, Splunk, Service Now and more.

      This upcoming webinar explores how these new integrations can simplify threat management by giving you a better view of your security posture, enabling your security teams to quickly detect and respond to internal and external attacks, minimising the risk to safeguard your business.

      Join our upcoming webinar and learn about:
      •The importance of workflow for Incidence Response
      •How ATP uses data from Symantec Global Intelligence Network to detect potential targeted attacks
      •How integrating ATP with your SIEM solution allows for a unified view into your environment to help uncover attacks
      •The integrated incident response process that supports security incident investigation and remediation
      •The follow up actions required to close an incident

      Read more >
    • Selecting a SIEM: Experiences from the Trenches Selecting a SIEM: Experiences from the Trenches Justin Everett: Williams Companies Dave Wiseman: Saint Luke's Health System.VP and Chief Information Security Officer: Recorded: May 13 2015 3:00 pm UTC 55 mins
    • Today’s cyber threat landscape demands a fresh look at security intelligence. Whether you have a first generation SIEM (e.g., ArcSight, enVision, Q1 Labs, etc.) in place today and are concerned about blind spots or are overwhelmed by its complexity, or you’re considering deploying a SIEM for the first time, this panel discussion will give you practical insights from SIEM veterans that will help you refine your security intelligence strategy.

      Watch a moderated panel discussion featuring security experts who will discuss:

      -Cyber security dynamics fueling the need for improved Security Intelligence
      -Visibility and functional gaps to be aware of in first generation SIEMs
      -Selecting a SIEM: Key considerations and requirements
      -Migration considerations when moving to a new SIEM
      -Assessing the staffing requirements for a new SIEM deployment


      "Panelists:
      Justin Everett: Security Analyst, Williams Companies
      Dave Wiseman: Director of Information Security, Saint Luke's Health System
      VP and Chief Information Security Officer, Fortune 500 Healthcare Services Company"

      Read more >
    • Rev Up Your SIEM with These Top 8 High Value Security Event Sources Rev Up Your SIEM with These Top 8 High Value Security Event Sources Randy Franklin Smith: Windows Security Subject Matter Expert Erick Ingleby: Product Manager, LogRhythm, Inc. Recorded: Jun 18 2015 3:00 pm UTC 97 mins
    • The secret to catching intruders with your SIEM is to feed it as much information as possible, the infosec world has been doing a better and better job by scaling SIEM technology up and integrating nearly every raw audit log from network devices, operating systems and even applications. But these logs are more raw data than refined information. It's time to make sure you are also feeding your SIEM the high value sources of security information from all the other security technologies and products on your network. You want your SIEM to have deep and wide visibility. Visibility at every level of your technology stack and across your entire network.

      When you look at the event log spectrum ranging from raw log data to high level/value security information - nothing is higher level, more refined and actionable than security technologies such as your:

      -Anti-malware
      -Endpoint security
      -Network IDS/IPS/forensics
      -Next generation firewall
      -Vulnerability scanners
      -Threat intelligence
      -Identity management
      -Access control

      The list goes on. In this webinar learn the different opportunities to feed your SIEM extra nutritious event feeds from all the different security technologies on your network. Also, look at real world scenarios and explore how to correlate high level security information like this with the low level stuff coming from more traditional logs.

      Read more >