Hi [[ session.user.profile.firstName ]]

How can you ensure that your logging infrastructure is GDPR compliant?

Since the GDPR is just around the corner, Balabit, a One Identity business, is holding a webinar session for facing difficulties fine-tuning their log management infrastructure to become compliant.

The GDPR mandates that Personal Data should be secured at all times, stored in an encrypted format, and only available to authorized personnel. As log messages can contain personal data they fall under the scope of the regulation.

In our 30 minute webinar session, you can find out how to make your logging infrastructure GDPR compliant with the use of syslog-ng.
Recorded May 17 2018 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Istvan Molnar, John Murdoch
Presentation preview: How can you ensure that your logging infrastructure is GDPR compliant?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • How can you ensure that your logging infrastructure is GDPR compliant? Recorded: May 17 2018 60 mins
    Istvan Molnar, John Murdoch
    Since the GDPR is just around the corner, Balabit, a One Identity business, is holding a webinar session for facing difficulties fine-tuning their log management infrastructure to become compliant.

    The GDPR mandates that Personal Data should be secured at all times, stored in an encrypted format, and only available to authorized personnel. As log messages can contain personal data they fall under the scope of the regulation.

    In our 30 minute webinar session, you can find out how to make your logging infrastructure GDPR compliant with the use of syslog-ng.
  • Managing privileged access and operations and ensuring GDPR compliance Recorded: May 16 2018 46 mins
    Istvan Molnar, Ronald Schmid
    As GDPR is coming into force on the 25th of May, Balabit, a One Identity business, is launching a webinar session for both existing customers and to organizations facing difficulties in terms of managing privileged user access to personal data storages units.

    When it comes to managing privileged access and users there is more to it than preventing unauthorized access to Personal Data. Compliance to the GDPR is heavily dependent on monitoring workflows and ensuring that all processes align with the requirements.

    Join us on our 30 minute webinar session where you can find out how to manage privileged access and operations to ensure GDPR compliance with the help of Balabit's Privileged Session Management.
  • Agentless Windows logging Recorded: Apr 26 2018 57 mins
    Istvan Molnar, Craig Finnan
    With syslog-ng Premium Edition, you can collect Windows event logs without installing any third party application on your Windows-based computer.

    The benefits are obvious:

    - You don’t need to install any additional application (reducing administrative overhead and possible security risk).
    You can manage the subscription from Windows Group Policy (permission, certificates, destination).

    - The Windows Event Collector (WEC) acts as a log collector and forwarder tool for the Microsoft Windows platform. Unlike the syslog-ng Agent for Windows, WEC is a standalone tool that does not require installing on the Windows-based host itself. This can be an advantage when your organization's policies restrict or do not allow the installation of third-party tools.
  • Log ingestion to Splunk with syslog-ng Recorded: Mar 20 2018 49 mins
    Istvan Molnar, Richard Hosgood
    Splunk is a popular security event search and analysis platform. Many enterprises use syslog-ng to improve the performance and reduce the data load of their Splunk deployment. In a survey of Balabit customers, we found that:

    - Half of organizations who send logs to Splunk reduced troubleshooting/forensics time by more than 50% by using syslog-ng
    - Organizations using syslog-ng significantly reduced their Splunk data load by filtering out the irrelevant logs

    Join our webinar to learn the benefits of using syslog-ng with Splunk.
  • Big data scaling with syslog-ng Recorded: Feb 15 2018 54 mins
    Istvan Molnar, Peter Soproni
    Many big data projects run into the 80/20 rule. 80% of resources is spent getting data into their analytic tools and only 20% on analyzing the data. Syslog-ng functions as an universal log ingestion tool which can deliver data from a wide variety of sources to Hadoop, Elasticsearch, MongoDB, and Kafka as well as many others.
  • Big data scaling with syslog-ng Recorded: Feb 15 2018 51 mins
    Istvan Molnar, Peter Soproni
    Many big data projects run into the 80/20 rule. 80% of resources is spent getting data into their analytic tools and only 20% on analyzing the data. syslog-ng functions as an universal log ingestion tool which can deliver data from a wide variety of sources to Hadoop, Elasticsearch, MongoDB, and Kafka as well as many others.
  • Using syslog-ng's powerful patternDB for advanced parsing of your log files Recorded: Dec 14 2017 55 mins
    Istvan Molnar, Craig Finnan
    Your log analytic tools depend on data collected by your logging infrastructure.

    Reducing the amount and complexity of data with advanced parsing and filtering can yield big results.

    In our webinar we provide a full overview and demonstration on how syslog-ng can filter, parse and rewrite collected log data as a pre-process mechanism before forwarding it to a SIEM system.
  • Make your logging infrastructure 23 NYCRR 500 compliant Recorded: Nov 30 2017 44 mins
    Istvan Molnar, Craig Finnan
    The Part 500 regulation issued by the New York Department of Financial Services mandates that Covered Entities secure and encrypt all Nonpublic Information in transit and at rest.

    Nonpublic Information represents all business critical information that contains Personal Identifiable Information and log messages are no exception.

    In our webinar session you can find out how syslog-ng can make your logging infrastructure 23 NYCRR 500 compliant.
  • Make your logging infrastructure GDPR compliant - On Demand Webinar Recorded: Nov 23 2017 46 mins
    Istvan Molnar, John Murdoch
    The General Data Protection Regulation mandates that Personal Data should be all time secured, stored in an encrypted format and only available to authorized personnel.

    The extended scope makes log messages also fall under the category of Personal Data and require the same level of attention.

    In our 45 minutes webinar session you can find out how to make your logging infrastructure GDPR compliant with the use of syslog-ng.
  • Optimized Log collection and distribution Recorded: Oct 26 2017 31 mins
    John Murdoch
    SIEM solutions sit at the heart of Security Operations Centers (SOC) yet their effectiveness is only as good as the data feeding it.

    In order to maximize transfer reliability, data security and SIEM performance an optimized collection and distribution logging infrastructure is a must for all organizations.

    From this webinar session you can learn the benefits of front-ending your SIEM with syslog-ng. Benefits include: increased performance, higher quality data, and cost-effective scalability.
  • Understanding Privileged Identity Theft Recorded: Oct 12 2017 55 mins
    Csaba Krasznay
    Cyber attackers use privileged identity theft, the compromise of credentials to privileged accounts, to steal massive amounts of data. To protect themselves, organizations need to understand the threat and how to implement the right security measures.

    From this 55-minutes on-demand webinar session you will learn about the methods used to compromise privileged accounts, why hackers target privileged accounts, why current security measures fail, and what steps you can take to stop these threats.
  • Accelerate Your Incident Response with Privileged Access Management Recorded: Jul 6 2017 53 mins
    Csaba Krasznay
    Following an incident, the simple question “Who did what?” is one of the most critical, yet most difficult, questions to answer.

    From this 52-minutes on-demand webinar session, you will learn incident investigation best practices. We present a real-life incident investigation scenario and show how advanced privileged access management tools can help you in the forensics process related to privileged account misuse.
Balabit
Balabit, a One Identity business, is a leading provider of Privileged Access Management (PAM) and Log Management solutions. Founded in 2000, Balabit has a proven track record of helping businesses reduce the risk of data breaches associated with privileged accounts. With offices in the United States and Europe, and a global client list that includes 25 Fortune 100 companies, Balabit and its network of reseller partners serves more than 1,000,000 corporate users worldwide.

Balabit's Privacy Policy <https://www.balabit.com/privacy-policy>
You may withdraw your consent to receive emails at any time by using Balabit's opt-out page <https://pages.balabit.com/UnsubscribePage.html>

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How can you ensure that your logging infrastructure is GDPR compliant?
  • Live at: May 17 2018 2:00 pm
  • Presented by: Istvan Molnar, John Murdoch
  • From:
Your email has been sent.
or close