Hi [[ session.user.profile.firstName ]]

This is Security: Nothing is what it SIEMs

Companies of every size and across every industry need to have a solution to defend against cyber attacks. For medium-sized and budget-constrained companies especially – the array of security technologies and solution and the volume of cyber threats can make the challenge seem overwhelming.

Organisations suffer trying to manage raw data, security events and false positive incidents with limited context, overworked staff, and a lack of threat landscape knowledge. There is a better way to improve your security without the time, effort, and cost of purchasing and integrating multiple tools, a traditional SIEM or expensive traditional security outsourcing vendors.

A seamless combination of platform, threat intelligence, and expert services can provide a simpler, most cost-effective approach to security for all infrastructure and workloads across physical, virtual and cloud environments.

Get the inside scoop on a new approach to threat management that gives you the right level of coverage for the right resources. Join our Principal Security Architect, Dan Pitman to learn more about this more effective approach to cybersecurity and threat management.

Highlights Include:
• Insights from Alert Logic's 2018 Critical Watch Report
• Realities for scaling threat detection & response across on-prem to cloud environments
• Understand how today’s vulnerabilities are being exploited
• Find out how to achieve the right level of leverage for the optimal level of investment
Recorded Mar 21 2019 49 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Dan Pitman, Principal Security Architect, Alert Logic
Presentation preview: This is Security: Nothing is what it SIEMs

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • AWS Security Reinforced Jul 18 2019 3:00 pm UTC 60 mins
    Jeremy Breland, Principal Solution Architect and Dan Pitman, Principal Security Architect
    Key AWS RE:INFORCE Highlights and Security Guidance for Your AWS Workloads

    Join Alert Logic’s Jeremy Breland (Principal Solution Architect) and Dan Pitman (Principal Security Architect) as they discuss the news and goings on at the inaugural AWS RE:INFORCE conference focused on security, identity, and compliance. Learn about the conference, news you may have missed and Alert Logic’s take on the event as well as receive up to date guidance on how to approach security on your AWS Workloads.

    Key takeaways include:

    • Up-to-date security strategy and challenges in AWS
    • AWS Security Responsibilities
    • re:Inforce announcements and news
  • Critical New Insights About the SMB Threatscape Recorded: Jul 11 2019 43 mins
    Alert Logic
    Cybercriminals increasingly target small and midsized businesses with fewer security resources. With smaller budgets and real staff constraints, many organizations are seeking ways to be ‘security smart’ as they address risks and respond to attacks. And they need better help from security vendors — not just best practices and platitudes. As a result, SMBs are causing innovation in the security market by demanding new solutions like Managed Detection and Response (MDR) as they shift away from a DIY threat management model. The Critical Watch Report 2019: SMB Threatscape provides important insights based on security threat research, attack trends and findings from the Alert Logic Security Operations and Threat Intelligence teams.

    Attend this webinar to learn about the real threats and vulnerabilities facing your organization today and strategies to help you stay secure.

    Key takeaways include:

    - Overview of attacks, vulnerabilities & common attack pattern types seen in SMBs
    - Threat intelligence: Does your company need a partner?
    - What’s available on the Dark Web and what companies should do now
    - DIY Threat Intelligence: Analyzing the true costs
    - Avoiding “tool overload”: Tips to help SMBs address risk with clarity vs. confusion
  • Five Recommendations to Strengthen Your Security Program Recorded: Jul 1 2019 59 mins
    Jack Danahy - SVP, Security
    Cyber attack methods have evolved aggressively to become more targeted, more sophisticated, and more frequent. For this webinar we have distilled 5 of the most common and urgent problems that enterprises face, and will share our analysis of the issues and practical recommendations for addressing them within your own security program.

    Join Jack Danahy, SVP, Security, as he outlines steps to:

    •Track and combat the evolving threat landscape
    •Increase visibility and resistance at the attack surface
    •Battle alert fatigue and the security talent shortage
    •Define a cyber-risk baseline and process for your security program

    Attendees will receive a Security Workbook with steps to take within the next 30 days to assess and improve their enterprise security program.
  • Defending Against Cyber Threats: Hack Attack Recorded: Jun 27 2019 17 mins
    Graeme McMillan, Solutions Architect, Alert Logic
    Data breaches are now a common global occurrence, causing real economic damage to businesses. Lost revenue, damaged reputations, disrupted operations, and significant costs to recover, cyber attackers are adapting their techniques at a much faster pace than most businesses. These once less sophisticated cyber criminals now have easier access to automated exploits that were previously only available to highly skilled nation-state actors.

    Unfortunately protecting an organisation against a cyber threat becomes impossible if you don’t know that the threat exists. So how do you protect your organisations against known and unknown threats? Security is constantly changing. To stay ahead of cyber threats, you need to leverage software plus services to augment your security team and capabilities.

    Join this webinar to hear about emerging threats and the current state of web application vulnerabilities. Learn about the most impactful web app attacks as well as remediation strategies. And take away best practices on how to ensure secure continuity in the cloud.

    Highlights Include:
    • Cyber Hack Demo
    • Insights from Alert Logic's 2018 Critical Watch Report
    • Understand how today’s vulnerabilities are being exploited
    • Realities for scaling threat detection & response across on-prem to cloud environments

    An exciting and very important demonstration for anyone who develops applications, manages websites or is interested in security.
  • This is Security: Stories from the SOC Recorded: May 29 2019 49 mins
    Dan Pitman, Principal Security Architect, Alert Logic Steffan Jones, Manager, Security Operations Centre
    Security Operations Center (SOC) analysts are people who understand security, technology and the business – they watch your back 24/7 – and they’ve seen it all.. A SOC provides proactive threat monitoring, threat detection, and advice to stop cyber threats in their tracks.

    Staying continuously ahead of elusive assaults is a daily challenge security professionals face and you may be surprised at what goes on behind the scenes to keep you safe. To win, you need the capabilities of a modern, fully-staffed SOC. With the Alert Logic threat intelligence team, you get an army of researchers on your side, creating the cutting-edge security data necessary to protect your organisation against the latest cyber threats. 24/7 expert defense, with no added staff, and no more sleepless nights (not only in Seattle).

    In this webinar, our cyber threat experts will walk through:

    • The critical role a SOC plays in a defensive cybersecurity strategy across any platform
    • Techniques used to defend against attempted cyber attacks and breaches
    • Strategies to help you proactively identify and address high risk areas
    • Our SOC gives you the edge over cyber adversaries. Join us and learn how.
  • Five Recommendations to Strengthen Your Security Program Recorded: May 16 2019 60 mins
    Jack Danahy - SVP, Security
    Cyber attack methods have evolved aggressively to become more targeted, more sophisticated, and more frequent. For this webinar we have distilled 5 of the most common and urgent problems that enterprises face, and will share our analysis of the issues and practical recommendations for addressing them within your own security program.

    Join Jack Danahy, SVP, Security, as he outlines steps to:

    •Track and combat the evolving threat landscape
    •Increase visibility and resistance at the attack surface
    •Battle alert fatigue and the security talent shortage
    •Define a cyber-risk baseline and process for your security program

    Attendees will receive a Security Workbook with steps to take within the next 30 days to assess and improve their enterprise security program.
  • Another Bucket Bites the Dust... Simplifying AWS Cybersecurity Recorded: May 16 2019 54 mins
    Dan Pitman, Principal Security Architect, Alert Logic
    With the rapid rise of web application attacks, which is the number one source of data breaches, securing cloud-based web applications is a challenge. In order to fully protect your web applications in the cloud, it is important to know the risks, select the right security tool, and understand your role in the shared responsibility for security.

    Securing your AWS workload can mean many different things, ranging from locking down your environment via the AWS best practices list, to completely outsourcing the security management and responsibility to another company. While every company’s security journey is different, everyone can agree that the need to monitor and improve security posture is becoming increasingly important.

    Start here with Dan Pitman, Principal Security Architect, Alert Logic as he lists the top considerations to better protect your AWS workloads and applications. Learn the core fundamentals to a stronger AWS cloud security strategy.

    Register now and gain key security takeaways, including:
    • Guidelines to security risk: understanding your AWS environment and the exposures your web apps face
    • Learnings from top configuration vulnerabilities involving root, S3, IAM, security groups, and more
    • How security incidents differ on hybrid networks versus public-cloud installations
    • Threat detection capabilities and creating an effective incident response plan
  • Defending Against Cyber Threats: Hack Attack Recorded: May 16 2019 18 mins
    Graeme McMillan, Solutions Architect, Alert Logic
    Data breaches are now a common global occurrence, causing real economic damage to businesses. Lost revenue, damaged reputations, disrupted operations, and significant costs to recover, cyber attackers are adapting their techniques at a much faster pace than most businesses. These once less sophisticated cyber criminals now have easier access to automated exploits that were previously only available to highly skilled nation-state actors.

    Unfortunately protecting an organisation against a cyber threat becomes impossible if you don’t know that the threat exists. So how do you protect your organisations against known and unknown threats? Security is constantly changing. To stay ahead of cyber threats, you need to leverage software plus services to augment your security team and capabilities.

    Join this webinar to hear about emerging threats and the current state of web application vulnerabilities. Learn about the most impactful web app attacks as well as remediation strategies. And take away best practices on how to ensure secure continuity in the cloud.

    Highlights Include:
    • Cyber Hack Demo
    • Insights from Alert Logic's 2018 Critical Watch Report
    • Understand how today’s vulnerabilities are being exploited
    • Realities for scaling threat detection & response across on-prem to cloud environments

    An exciting and very important demonstration for anyone who develops applications, manages websites or is interested in security.
  • This is Security: Nothing is what it SIEMs Recorded: Apr 29 2019 48 mins
    Dan Pitman, Principal Security Architect, Alert Logic
    Companies of every size and across every industry need to have a solution to defend against cyber attacks. For medium-sized and budget-constrained companies especially – the array of security technologies and solution and the volume of cyber threats can make the challenge seem overwhelming.

    Organizations suffer trying to manage raw data, security events and false positive incidents with limited context, overworked staff, and a lack of threat landscape knowledge. There is a better way to improve your security without the time, effort, and cost of purchasing and integrating multiple tools, a traditional SIEM or expensive traditional security outsourcing vendors.

    A seamless combination of platform, threat intelligence, and expert services can provide a simpler, most cost-effective approach to security for all infrastructure and workloads across physical, virtual and cloud environments.

    Get the inside scoop on a new approach to threat management that gives you the right level of coverage for the right resources. Join our Principal Security Architect, Dan Pitman to learn more about this more effective approach to cybersecurity and threat management.

    Highlights Include:
    • Insights from Alert Logic's 2018 Critical Watch Report
    • Realities for scaling threat detection & response across on-prem to cloud environments
    • Understand how today’s vulnerabilities are being exploited
    • Find out how to achieve the right level of leverage for the optimal level of investment
  • Cybersecurity in Financial Services: No one can afford a cyber attack Recorded: Apr 25 2019 53 mins
    Dan Pitman, Principal Security Architect
    Financial organisations fall victim to cyber-attacks more frequently than any other industries. The growth in volume and sophistication of cyber-threats, combined with regulatory changes, mean that financial institutions are having to improve their IT security postures notably.

    Facing modern cyber-threats head-on requires organisations to follow well-defined processes and mature IT security tools that need to be closely monitored and managed. Additionally, financial businesses handle highly confidential data that must be stored in a compliant manner and managed securely. A seamless combination of platform, threat intelligence, and expert services can provide a simpler, most cost-effective approach to security for all infrastructure and workloads across physical, virtual and cloud environments.

    Get the inside scoop on a new approach to threat management that gives financial organisations the right level of coverage for the right resources. Join our Principal Security Architect, Dan Pitman, to learn more about this more effective approach to cybersecurity and threat management in the financial world.

    Highlights Include:
    • The state of cybersecurity at financial institutions
    • Integrating security and compliance within Financial Services
    • Understand how today’s vulnerabilities are being exploited
    • Find out how to achieve the right level of leverage for the optimal level of investment
  • This is Security: Stories from the SOC Recorded: Apr 11 2019 50 mins
    Dan Pitman, Principal Security Architect, Alert Logic Steffan Jones, Manager, Security Operations Centre
    Security Operations Center (SOC) analysts are people who understand security, technology and the business – they watch your back 24/7 – and they’ve seen it all.. A SOC provides proactive threat monitoring, threat detection, and advice to stop cyber threats in their tracks.

    Staying continuously ahead of elusive assaults is a daily challenge security professionals face and you may be surprised at what goes on behind the scenes to keep you safe. To win, you need the capabilities of a modern, fully-staffed SOC. With the Alert Logic threat intelligence team, you get an army of researchers on your side, creating the cutting-edge security data necessary to protect your organisation against the latest cyber threats. 24/7 expert defense, with no added staff, and no more sleepless nights (not only in Seattle).

    In this webinar, our cyber threat experts will walk through:

    • The critical role a SOC plays in a defensive cybersecurity strategy across any platform
    • Techniques used to defend against attempted cyber attacks and breaches
    • Strategies to help you proactively identify and address high risk areas
    • Our SOC gives you the edge over cyber adversaries. Join us and learn how.
  • HIPAA Compliance – Are You Staying Healthy? Recorded: Apr 10 2019 35 mins
    Tony Bailey, Director, Product Marketing
    The medical/healthcare industry accounted for more than 23 percent of total cybersecurity breaches*.

    But, keeping up-to-date with HIPAA requirements to help protect data can be difficult. And selecting technologies so your organization can implement security controls to comply with HIPAA regulations can be overwhelming.

    We can help you break it down. In this webinar we will walk through:

    • The current state of HIPAA compliance, and how businesses are stacking up
    • Top reasons for HIPAA compliance failures and how to avoid them
    • A customer example that’s using Alert Logic for their HIPAA compliance project

    And, we’ll share how Alert Logic can help you stay healthy with your HIPAA compliance projects with low cost and effective threat management for achieving and maintain compliance over time with less effort and cost.

    *Identity Theft Resource Center
    https://www.idtheftcenter.org/images/breach/2017Breaches/2017AnnualDataBreachYearEndReview.pdf
  • Cybersecurity in Retail: A Necessity Recorded: Mar 28 2019 52 mins
    Dan Pitman, Principal Security Architect, Alert Logic
    The retail industry faces a challenging cyber threat environment. Retailers store more consumer data than ever before, across an increasing range of digital platforms, providing cybercriminals with more valuable data to target and more doorways to access it. As retailers invest in new technologies to collect and manage customer data, there is a corresponding rise in the need to navigate the regulatory issues unique to these technologies and to maintain effective system controls to ensure the security of the collected data.

    As hacker techniques are becoming more widespread and sophisticated, it is important to have a comprehensive cyber security strategy in place. The impact of these data breaches can be catastrophic, especially in retail where brand reputation and loyalty are the keys to success. For retailers, more detection capability is necessary. They need access to more diverse, detection-based security controls to give them broader visibility of malicious activity in their network.

    In this live webinar, Dan Pitman at Alert Logic, will analyse the current UK Retail cyber threat landscape and the new approach to threat management that gives you the right level of coverage for the right resources to help you overcome the challenges of retail cyber security.

    • Trends in UK Cyber Crime targeting the Retail and eCommerce Sector
    • Understand what cyber attackers are really after, why, and how they’re getting what they want
    • Realities for scaling threat detection & response across on-prem to cloud environments
  • Why You No Longer Need a SIEM Tool Recorded: Mar 26 2019 58 mins
    Matt Selheimer, Chief Strategist
    How to handle evolving threats and expanding compliance risks when you have resource constraints.

    For years, organizations have struggled with the high-cost and long time-to-value of implementing Security Information and Event Management (SIEM) tools. Even worse, you may have tried an expensive cybersecurity outsourcing vendor that failed to deliver little more than yet another alert stream.

    Join this webinar instead of being held back by the past. Because the good news is there’s a new approach that seamlessly combines an award-winning security platform, cutting-edge threat intelligence, and 24x7 expert defenders that doesn’t take months or years to implement – with starting costs far less than one FTE a year – yes, you read that right.

    It’s a risk-based approach that gives you the right level of security and compliance coverage for cloud, hybrid, and on-premises environments.

    You really should check it out, unless you want to keep trying to make that SIEM tool work…
  • This is Security: Nothing is what it SIEMs Recorded: Mar 21 2019 49 mins
    Dan Pitman, Principal Security Architect, Alert Logic
    Companies of every size and across every industry need to have a solution to defend against cyber attacks. For medium-sized and budget-constrained companies especially – the array of security technologies and solution and the volume of cyber threats can make the challenge seem overwhelming.

    Organisations suffer trying to manage raw data, security events and false positive incidents with limited context, overworked staff, and a lack of threat landscape knowledge. There is a better way to improve your security without the time, effort, and cost of purchasing and integrating multiple tools, a traditional SIEM or expensive traditional security outsourcing vendors.

    A seamless combination of platform, threat intelligence, and expert services can provide a simpler, most cost-effective approach to security for all infrastructure and workloads across physical, virtual and cloud environments.

    Get the inside scoop on a new approach to threat management that gives you the right level of coverage for the right resources. Join our Principal Security Architect, Dan Pitman to learn more about this more effective approach to cybersecurity and threat management.

    Highlights Include:
    • Insights from Alert Logic's 2018 Critical Watch Report
    • Realities for scaling threat detection & response across on-prem to cloud environments
    • Understand how today’s vulnerabilities are being exploited
    • Find out how to achieve the right level of leverage for the optimal level of investment
  • Extend your Attack Surface Coverage with No SIEM Required Recorded: Mar 13 2019 52 mins
    Alert Logic
    Attend this webinar to learn about new capabilities that Alert Logic has added that extends attack surface coverage for Endpoint, Multi-Cloud, and Dark Web. Get broader detection and response for less effort and lower cost with no SIEM required.
  • Why You No Longer Need a SIEM Tool Recorded: Feb 27 2019 58 mins
    Matt Selheimer, Chief Strategist
    How to handle evolving threats and expanding compliance risks when you have resource constraints.

    For years, organizations have struggled with the high-cost and long time-to-value of implementing Security Information and Event Management (SIEM) tools. Even worse, you may have tried an expensive cybersecurity outsourcing vendor that failed to deliver little more than yet another alert stream.

    Join this webinar instead of being held back by the past. Because the good news is there’s a new approach that seamlessly combines an award-winning security platform, cutting-edge threat intelligence, and 24x7 expert defenders that doesn’t take months or years to implement – with starting costs far less than one FTE a year – yes, you read that right.

    It’s a risk-based approach that gives you the right level of security and compliance coverage for cloud, hybrid, and on-premises environments.

    You really should check it out, unless you want to keep trying to make that SIEM tool work…
  • PCI DSS Compliance – Are You Making the Grade? Recorded: Feb 26 2019 22 mins
    Tony Bailey - Director, Product Marketing; Malcolm Palmer - Senior Product Manager
    Learn About Required Capabilities to Meet PCI Compliance Controls

    How confident are you when it comes to your PCI compliance? Recent surveys show that only 55% of companies are PCI compliant. And 100% of breached PCI certified companies failed their PCI compliance audit.

    With PCI, it's not enough to achieve compliance. You need to maintain that compliance over time. Experts estimate that 80% of businesses fail their interim PCI compliance assessment and less than 1/3 manage to maintain complete compliance year over year.

    Join us to learn:

    • Top reasons companies fail a PCI audit
    • Challenges of running a fully-compliant PCI program
    • What to do if you fail a PCI audit
    • Ways to leverage security frameworks to meet your compliance goals

    Join our experts as they discuss the challenges around PCI compliance and share how Alert Logic’s platform plus intelligence and experts can help with PCI compliance and complexity.
  • (EMEA) Emerging Threats, Hackers and Attackers: Stories from the SOC Recorded: Feb 21 2019 48 mins
    Tom Gorup - Vice President, Security Operations and Ben Nguyen - Security Analyst
    Get Inside the Front Lines of Cyber Defense with the SOC Analysts Who Live There

    Cyber attacks are ever-evolving and it can feel like you are struggling just to keep up. It’s time to get ahead of the game.

    Join us for the latest attack trends and threat insights from Alert Logic’s own SOC analysts. You’ll hear what’s happening on the front lines of cyber security defense, and which attack vectors are worth watching out for. We’ll also discuss the costs of running your own SOC and share some alternative approaches to get 24/7 dedicated coverage and better intelligence than you can access on your own.

    Staying continuously ahead of elusive assaults is a daily challenge security professionals face. To win, you need proactive threat monitoring, threat detection, and advice to stop threats quickly. You need the capabilities of a modern, fully-staffed SOC. With the Alert Logic threat intelligence team, you get an army of researchers on your side, creating the cutting-edge security data necessary to protect your organisation against the latest threats. 24/7 expert defense, with no added staff, and no more sleepless nights.
  • Emerging Threats, Hackers and Attackers: Stories from the SOC Recorded: Feb 19 2019 48 mins
    Tom Gorup - Vice President, Security Operations; Ben Nguyen - Security Analyst
    Get Inside the Front Lines of Cyber Defense with the SOC Analysts Who Live There

    Cyber attacks are ever-evolving and it can feel like you are struggling just to keep up. It’s time to get ahead of the game.

    Join us for the latest attack trends and threat insights from Alert Logic’s own SOC analysts. You’ll hear what’s happening on the front lines of cyber security defense, and which attack vectors are worth watching out for. We’ll also discuss the costs of running your own SOC and share some alternative approaches to get 24/7 dedicated coverage and better intelligence than you can access on your own.

    Staying continuously ahead of elusive assaults is a daily challenge security professionals face. To win, you need proactive threat monitoring, threat detection, and advice to stop threats quickly. You need the capabilities of a modern, fully-staffed SOC. With the Alert Logic threat intelligence team, you get an army of researchers on your side, creating the cutting-edge security data necessary to protect your organization against the latest threats. 24/7 expert defense, with no added staff, and no more sleepless nights.
Security. Compliance. Cloud.
Your company’s security depends on being able to detect threats and respond to attacks quickly. But most organizations investigate less than 4 percent of all events they receive.

Alert Logic has a better way.

A SIEMless connected solution that brings together an award-winning platform, cutting-edge threat intelligence, and expert defenders:
- Flexible coverage tailored to your individual business needs
24/7 SOC and expert remediation advice
- Simple pricing with a lower total cost than assembling your own solutions or traditional outsourcing
-Evolving threats, expanding compliance risks, and resource constraints require a new approach

For more information about Alert Logic, visit https://www.alertlogic.com or follow us on Twitter @alertlogic

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: This is Security: Nothing is what it SIEMs
  • Live at: Mar 21 2019 3:00 pm
  • Presented by: Dan Pitman, Principal Security Architect, Alert Logic
  • From:
Your email has been sent.
or close