Using CyberSecurity Analytics to Secure the Enterprise

Logo
Presented by

Chairman: John Colley, Managing Director, (ISC)2 EMEA, Speaker: Josyula Rao, Senior Manager, Security Research Scientist

About this talk

Over the last decade, the problem of CyberSecurity has become the most pressing and challenging security problem of our time. As CyberSecurity threats and attacks grow in frequency and the enterprise risk escalates rapidly, businesses and governments are searching for innovative technologies to combat the problem more effectively. Enterprise customers today have deployed numerous security controls including security sensors such as intrusion prevention and detection systems as well as security tooling for identity, access and audit management. These systems enable enterprises to manage their security posture, generating a multitude of event alert streams as well as logs and audit records that contain potentially actionable intelligence that today is typically not fully mined nor available in real-time. The inability to consolidate and correlate these events and data automatically at line speeds and present them to the security analyst in a semantically-meaningful manner robs security analysts and administrators of a valuable tool to defend enterprise networks.

Related topics:

More from this channel

Upcoming talks (6)
On-demand talks (383)
Subscribers (69237)
(ISC)² Security Briefings EMEA offers members in Europe, the Middle East and Africa a chance to learn about the latest trends, tools and best practices in cyber, information, software and infrastructure security while earning CPEs