Hi [[ session.user.profile.firstName ]]
Sort by:
    • Beyond the Sticker Price: Factors Impacting the Total Cost of Ownership of SIEM Beyond the Sticker Price: Factors Impacting the Total Cost of Ownership of SIEM Michael Suby, Vice President of Research at Frost & Sullivan Upcoming: Aug 24 2016 1:00 pm UTC 45 mins
    • Unfortunately many organizations today are losing the race against the hacker community by a large margin. As noted in the Verizon 2016 Data Breach Investigation Report, the percent of compromises that transpired in “days or less” has risen from 67% to 84% over the last 10 years. Over this same time period, the percent of compromise discoveries that occurred in “days or less” also improved, but not enough to narrow the time gap between compromise and discovery. In other words, the bad guys are accelerating their exploits faster than the good guys are accelerating their ability to discover.

      The path to narrowing the time gap between compromise and discovery, and then neutralising business-impacting incidents, is through a comprehensive and mission-oriented Security Information and Event Management (SIEM). A well-designed SIEM not only advances security objectives, but it also works to direct personnel and process for maximum impact. With limited resources and a rising number of attacks, not all solutions are created equal. You need to ensure they are getting the best bang for your buck.

      In this webinar, Michael Suby, vice president of research at the global research and consulting organization Frost & Sullivan, will discuss the factors that contribute to SIEM’s total cost of ownership.

      You’ll learn:

      • How to calculate the total cost of ownership of a SIEM
      • The basic functionality that every SIEM should have to confidently breeze through preliminary activities
      • The SIEM attributes that will have a lasting impact on your organization’s cost efficiency in effectively managing risk

      Join us to learn the features that should be on the top of your scorecard when evaluating a SIEM for either first-time deployment or replacement.

      Read more >
    • Beyond the Sticker Price: Factors Impacting the Total Cost of Ownership of SIEM Beyond the Sticker Price: Factors Impacting the Total Cost of Ownership of SIEM Michael Suby, Vice President of Research at Frost & Sullivan Recorded: Aug 18 2016 7:00 pm UTC 35 mins
    • Unfortunately many organizations today are losing the race against the hacker community by a large margin. As noted in the Verizon 2016 Data Breach Investigation Report, the percent of compromises that transpired in “days or less” has risen from 67% to 84% over the last 10 years. Over this same time period, the percent of compromise discoveries that occurred in “days or less” also improved, but not enough to narrow the time gap between compromise and discovery. In other words, the bad guys are accelerating their exploits faster than the good guys are accelerating their ability to discover.

      The path to narrowing the time gap between compromise and discovery, and then neutralizing business-impacting incidents, is through a comprehensive and mission-oriented Security Information and Event Management (SIEM). A well-designed SIEM not only advances security objectives, but it also works to direct personnel and process for maximum impact. With limited resources and a rising number of attacks, not all solutions are created equal. You need to ensure they are getting the best bang for your buck.

      In this webinar, Michael Suby, vice president of research at the global research and consulting organization Frost & Sullivan, will discuss the factors that contribute to SIEM’s total cost of ownership.

      You’ll learn:

      • How to calculate the total cost of ownership of a SIEM
      • The basic functionality that every SIEM should have to confidently breeze through preliminary activities
      • The SIEM attributes that will have a lasting impact on your organization’s cost efficiency in effectively managing risk

      Join us to learn the features that should be on the top of your scorecard when evaluating a SIEM for either first-time deployment or replacement.

      Read more >
    • SIEM is dead. Long Live the SIEM! SIEM is dead. Long Live the SIEM! Michael Mackrill, Security & Intelligence Operations Consulting Recorded: Feb 23 2016 4:40 pm UTC 16 mins
    • SIEMs have been around for years and many companies are wondering if they actually got a return on their investment. Meanwhile, multiple vendors are claiming that their latest tool can do everything that a SIEM can and more! Can the SIEM survive?

      We believe that the SIEM is not dead. SIEM is evolving. It must be remembered though that a SIEM is a living, breathing creature that must be cared, fed and interacted with in order to thrive. SIEMs have gotten more robust and can be used to interact with other security programs in ways that they couldn’t a few years ago. Companies need to utilize the SIEM as their central pane of glass to see the threats to their environment and use integration with other tools to help ensure the security of their electronic data.

      Read more >
    • Selecting a SIEM: Experiences from the Trenches Selecting a SIEM: Experiences from the Trenches Justin Everett: Williams Companies Dave Wiseman: Saint Luke's Health System.VP and Chief Information Security Officer: Recorded: May 13 2015 3:00 pm UTC 55 mins
    • Today’s cyber threat landscape demands a fresh look at security intelligence. Whether you have a first generation SIEM (e.g., ArcSight, enVision, Q1 Labs, etc.) in place today and are concerned about blind spots or are overwhelmed by its complexity, or you’re considering deploying a SIEM for the first time, this panel discussion will give you practical insights from SIEM veterans that will help you refine your security intelligence strategy.

      Watch a moderated panel discussion featuring security experts who will discuss:

      -Cyber security dynamics fueling the need for improved Security Intelligence
      -Visibility and functional gaps to be aware of in first generation SIEMs
      -Selecting a SIEM: Key considerations and requirements
      -Migration considerations when moving to a new SIEM
      -Assessing the staffing requirements for a new SIEM deployment


      "Panelists:
      Justin Everett: Security Analyst, Williams Companies
      Dave Wiseman: Director of Information Security, Saint Luke's Health System
      VP and Chief Information Security Officer, Fortune 500 Healthcare Services Company"

      Read more >
    • Rev Up Your SIEM with These Top 8 High Value Security Event Sources Rev Up Your SIEM with These Top 8 High Value Security Event Sources Randy Franklin Smith: Windows Security Subject Matter Expert Erick Ingleby: Product Manager, LogRhythm, Inc. Recorded: Jun 18 2015 3:00 pm UTC 97 mins
    • The secret to catching intruders with your SIEM is to feed it as much information as possible, the infosec world has been doing a better and better job by scaling SIEM technology up and integrating nearly every raw audit log from network devices, operating systems and even applications. But these logs are more raw data than refined information. It's time to make sure you are also feeding your SIEM the high value sources of security information from all the other security technologies and products on your network. You want your SIEM to have deep and wide visibility. Visibility at every level of your technology stack and across your entire network.

      When you look at the event log spectrum ranging from raw log data to high level/value security information - nothing is higher level, more refined and actionable than security technologies such as your:

      -Anti-malware
      -Endpoint security
      -Network IDS/IPS/forensics
      -Next generation firewall
      -Vulnerability scanners
      -Threat intelligence
      -Identity management
      -Access control

      The list goes on. In this webinar learn the different opportunities to feed your SIEM extra nutritious event feeds from all the different security technologies on your network. Also, look at real world scenarios and explore how to correlate high level security information like this with the low level stuff coming from more traditional logs.

      Read more >
    • Leveraging Next-Gen SIEM For Security Intelligence: A Buyer’s Perspective Leveraging Next-Gen SIEM For Security Intelligence: A Buyer’s Perspective Paul Lynch, Director of Data Security & Networks, American Board of Internal Medicine Recorded: May 19 2015 5:00 pm UTC 47 mins
    • Chartered with securing both the PII of over 250,000 physicians and a vast amount of highly valued intellectual property amidst a rapidly evolving threat landscape, Paul Lynch, Director of Data Security and Networks at the American Board of Internal Medicine (ABIM), recognized the need to move beyond a traditional SIEM, and employ a more holistic approach to Security Intelligence.

      In this CISO Executive Network webinar, Mr. Lynch will share with you the path he took to go from defining ABIM’s core security intelligence requirements to making his ultimate selection. The path included establishing a detailed score card for evaluating various SIEM solutions, moving from eight vendors’ to a short list of four, then testing and ultimately selecting a unified platform for ABIM.

      Whether you have an existing SIEM platform and are overwhelmed by its complexity, inadequate visibility to today’s advance threats or the manpower required to manage it, or you’re considering deploying SIEM for the first time, you’ll benefit greatly by joining us for this webinar.

      Key themes to be covered include:
      • SIEM for Security vs. IT Operations – understanding and prioritizing your options
      • Establishing a score card to evaluate vendors and solutions
      • How to leveraging market research and outside perspectives to inform your decision
      • Considering total cost of ownership (price, deployment, implementation, usability, management)

      Read more >