SIEM With Integrated Identity Intelligence

Mehlam Shakir McAfee Product Manager McAfee (former Nitro CTO ) and Tanuj Gulati, Securonix CTO
McAfee experts will take attendees through the rich capabilities and scalable architecture of McAfee ESM. Securonix experts will explore the advantages of integrated identity risk intelligence, including real world success stories and an in-depth demonstration. Learn how to Increase attack detection accuracy; combat advanced persistent threats; effectively manage risk and identify suspicious insider behavior in real-time.
Nov 29 2012
47 mins
SIEM With Integrated Identity Intelligence
Join us for this summit:
  • Channel
  • Channel profile
Up Down
  • Beyond attack signatures: Leveraging realtime analytics to pinpoint threats Apr 16 2014 4:00 pm UTC 45 mins
    Today’s security event monitoring and correlation tools are under enormous pressure. Security Analysts are inundated with data, but rather than being given insight, it is more difficult than ever to sort through and locate the real events that need attention. The next generation of security tools purports to process much larger and a greater variety of data sets, run deep-dive analytics in real-time, and rely more on intelligence than attack signatures. But what does this actually mean?

    How do I collect the right data?
    What kinds of new detections can I do?
    How do I get enough context to overcome false positives?
    How do I automate more of my security intelligence, or the intelligence of others?
    What should I look for in a solution?
    How is this different from my SIEM, IDS/IDS, and Advance Malware Detection products?

    These, and other questions, will be addressed to shed light on what has quickly become a market space of tremendous promise, but currently shrouded in confusion.
  • Re-defining Network Security Performance: Beyond Just Firewalls Apr 16 2014 3:00 pm UTC 60 mins
    Today’s IT professionals need security firewalls that do more than just packet filtering and stateful inspection. It’s critical that network pros redefine which metrics will actually ensure their security solutions will not be a performance bottleneck. This webinar digs into today’s firewall solutions, exploring their capabilities and providing pointers for selecting the solution that best meets IT security and performance requirements.

    What You Will Learn
    Why packet filtering and IPS aren’t the only performance metrics that matter
    The performance impact of running multiple security services
    How to select in-line security products that meet today’s multi-function security needs
  • How do you find a needle in a haystack? Uncover Big Data Security Analytics Recorded: Apr 15 2014 38 mins
    Advanced targeted cyber attacks have hit some of the world’s largest businesses. The attacks weren't blocked because they don’t match any known attack signature. Each one is unique, custom created to penetrate the target network and steal data.

    A new video featuring Gartner Distinguished Analyst, Neil MacDonald, and HP’s Eric Schou, explains how Big Data Security Analytics can help find and block targeted cyber attacks. View it to learn:

    How advanced targeted cyber attacks are different from traditional threats
    How Big Data techniques can spot attacks when traditional defenses fall short
    What you should be doing now to take advantage of Big Data Security Analytics
  • Using SIEM and Big Data to detect invisible threats Recorded: Apr 10 2014 51 mins
    The alarming rise of advanced persistent threats (APTs) makes security analytics around Big Data an imperative. In light of the challenges of converting Big Data into actionable information with first generation SIEMs, security professionals have become skeptical about the ability to use SIEM beyond compliance needs. Yet, today’s advanced SIEM technology takes threat detection, understanding and response to a whole new level. Join us to learn how to use next generation SIEM technology to specifically detect security threats within an ocean of Big Data. Discover how the latest technologies in security analytics such as the quad-correlation methods of rules, statistics, risk, and history can help your organization execute SIEM best practices in detection with intelligence, integration, and ease.
  • Intro to Box Recorded: Apr 9 2014 29 mins
    Join us for our Intro to Box series, a monthly discussion of the latest in the world of enterprise IT, content collaboration, cloud technology, and Box. We'll cover an overview of Box, how businesses like yours are changing the way they work with Box and other cloud technologies, and walk through a demo of the latest and greatest in the product. The sessions will be led by Box product experts, and you might even get a guest appearance from one of our fearless leaders.
  • Panel: In Search of Usable Network Security Recorded: Apr 9 2014 61 mins
    The Internet, as a communication medium, has been evolving. This evolution, unfortunately, has brought with it growth in Internet-based attacks, and corresponding growth in security technologies to fight these attacks. But, with this growth in security technologies, unintended complexity for security professionals has intensified. Join our roundtable as we endeavor to identify the factors contributing to security management complexity and how enhanced manageability tools can help.
  • Big Data = Big Problems Recorded: Apr 9 2014 49 mins
    Big data has gone beyond a buzzword for businesses and is rapidly becoming embedded in the way organisations operate and make decisions. Highlighted as one of the key areas for attention in the latest ISF Threat Horizon 2016 report, Big data analytics can also mislead when decisions are based on faulty, skewed, incomplete or poorly analysed data sets, resulting in missed opportunities as organisations enter the wrong markets, or enter the right markets with the wrong products. It’s also possible that the same data sets can lead to different conclusions in different parts of the world as a result of cultural bias. Further complicating matters, attackers will target data analytics tools to ensure decisions are skewed.

    This webcast will look at the implied threats to Big Data and offer ways of communicating the challenge of effective Big Data analysis and decision making to senior management.
  • Cyber Crime and the Insider Threats in Data Security Recorded: Apr 8 2014 48 mins
    Whether driven by opportunism, greed, a desire for revenge, or a combination of all three, company insiders exploit their positions of trust to obtain access to their organization’s most valued digital assets. Moles, opportunists, contractors, disgruntled employees, and ex-IT personnel—all currently pose a greater risk to corporate intellectual property than state-sponsored hacking and APTs, both in frequency and in damage caused. Hear from Kroll Managing Director Jonathan Fairtlough about the challenges related to insider investigations, and how policies and proof-points can be implemented to lessen the chances of insider-driven data damage.
  • 7 habits of highly *ineffective* Big Data security Recorded: Apr 8 2014 57 mins
    It’s an inconvenient truth that proven and well-understood data security methods were designed to work with relational database management systems. Over the decades, certain habits became second nature to security-minded IT professionals. But many of these habits are now fundamentally incompatible with Big Data/NoSQL environments.

    This presentation will walk you through the data security implications of key differences between NoSQL and relational databases. You’ll leave the session knowing:
    signs that Big Data/NoSQL may be coming to your organization
    7 security habits that expose Big Data to a breach...or cause major delays/rework
    how early adopters are making new security habits in the era of Big Data
  • Big Data Security Demystified Recorded: Apr 8 2014 48 mins
    The presentation will discuss both the promises and challenges presented by big data analytics to information security. To help take advantage of the former without the penalty of the latter, we will learn about the building blocks of a big data security solution and explore the most cost-effective uses of big data analytics to enhance security.
  • Cyberskills Shortage: Where is the cyber workforce of tomorrow? Recorded: Apr 2 2014 59 mins
    Numerous studies show a serious shortage of qualified people to fill the cyber jobs of today, particularly those that require security knowledge and skills. Stephen Cobb looks at the implications and the steps being taken to improve cyber education and training.
  • Cybersecurity Evolution: What’s Hype and What’s Not Recorded: Mar 28 2014 48 mins
    Using the latest research and their own best practices, ThreatTrack Security will walk you through the latest security trends and predictions for upcoming threats in 2014. We will discuss real threats and solutions and talk about what turned out to be just speculation.
  • Who is Protecting Consumers from Cyberattack and Who's Not? Recorded: Mar 28 2014 40 mins
    Agari's quarterly TrustIndex Report analyzes the email security practices of 131 companies across 11 industries to determine who is at the highest risk for cyberattack and who is taking action to prevent attacks and protect consumers. Join Patrick Peterson, former Cisco cybercrime research fellow and Founder & CEO of Agari, as he talks through key findings from the Q4 2013 Report. Here's a sneak peek - did you know that Health Care is riskier than any other sector? Could you guess that you are safer clicking on emails from your favorite etailer than your favorite retailer? Register to learn more.
  • Windows XP: A Feast for Cyber Attackers? Recorded: Mar 28 2014 49 mins
    Get to know the impact of legacy systems on the security in the organisations.

    Come April 2014, Microsoft will stop releasing patches and bug fixes for Windows XP—which means the operating system will be more vulnerable to security risks and viruses. For organisations not ready to move away from Windows XP, there are key questions and implications they have to face:

    1.How will Windows XP hold up against cyber-attacks and viruses
    2.How much more vulnerable will the Windows XP systems be?
    3.Should organizations be worried if there are only a small group Windows XP installations?
    4.What if the other security controls are tight?

    Join us to understand these issues at our live webinar "Windows XP: A Feast for Cyber Attackers?" on Friday, 28 March 2014.

    In this session, Vivek Chudgar, Director of Mandiant Security Consulting Services, will explore these questions with you, and explain the options available should one choose to continue with Windows XP after April 2014.
    This session is open to both technical managers and business professionals interested to understand the impact of legacy systems on the overall security of the organisation environment.

    Register now for this webinar.
  • So, You Want to be a Computer Security Consultant Recorded: Mar 27 2014 49 mins
    This webinar will review the things that are missing in many of the people who want to become a computer security consultant. Many people start off at the Application Layer (layer 7), in this webinar we will discuss the importance of establishing a solid security foundation; we will look at the three main components to build this foundation. Those are:
    1.TCP/IP
    2.Unix/Linux
    3.Virtualization
    During the webinar we will discuss mastering the power of the command line and the importance of understanding the traffic at the lowest level … the packet! We will also look at some simple but important protocol analysis techniques.
    The webinar is an introduction to the Core Concepts course that was developed to provide those entering the fascinating world of computer security consulting, a foundation prior to embarking on this journey. The more solid foundation of skills you have the better you will be prepared as a consultant or security professional.
  • 3 Essentials for Visibility During Data Center Transformation Recorded: Mar 26 2014 44 mins
    As your data center undergoes a transformation caused by exponential network growth, virtualization, SDN, and the growing need for more tools to monitor, secure, and analyze the network, you may find yourself missing a critical layer: visibility.

    Jim Frey, Vice President of Research & Network Management at Enterprise Management Associates, and Dave Reoch, Sr. Director of Data Center Solutions at Gigamon, will discuss the 3 essentials to maintain visibility during this transformation. Learn about:

    - Key changes and challenges with data center transformation
    - How these changes impact your visibility
    - What you can do today to stay ahead of the curve
  • 5 Steps to Moving to Cloud Nine Recorded: Mar 26 2014 59 mins
    Still using a file server to share documents? What about that FTP? Emailing large attachments which get stuck in your inbox? The move to cloud computing allows businesses to access information , applications and content from anywhere, anytime on any device. As individuals have demanded the need to have the same ease of use in their enterprise grade applications as in consumer applications, the move to cloud has accelerated product adoption, lowered costs and increased productivity. Learn about various companies who moved to the cloud with Box, best practices and how to easily share without on-premise technology.
  • E-Discovery For The New Enterprise Cloud World Recorded: Mar 26 2014 32 mins
    Corporations around the globe are adopting cloud solutions as a secure way to store and share information. At the same time, their legal and IT departments are challenged to develop a comprehensive e-discovery strategy for ongoing litigation, arbitration, and internal regulatory investigations.

    In this one-hour webinar, Guidance Software and Box® team up to present the integration that enables streamlined, defensible discovery of ESI stored on Box with EnCase® eDiscovery. The webinar will cover:

    -Goals and requirements for secure cloud storage
    -Complexities associated with e-discovery collection from the cloud
    -How to deploy an EnCase eDiscovery/Box integrated solution
    -A case study on an organizations currently using this integrated solution
  • Designing an Adaptive Security Architecture to Protect Against Advanced Threats Recorded: Mar 26 2014 31 mins
    Today’s security threats are more advanced than traditional security solutions. Attacks and malware continue to evolve faster than traditional security solutions can block them. What your organization needs is an adaptive security architecture as well as security solutions that fill these growing needs.

    What is an adaptive security architecture? What advantages does it offer over traditional security approaches? And how can it ward off tomorrow’s threats? In this program, Neil MacDonald, vice president and senior analyst at Gartner, and Brian Hazzard, vice president of product management at Bit9, reveal the technologies and best practices you will need to keep your enterprise safe today and tomorrow as well as where to turn to find the right security solution to fill these emerging security needs.
  • The Economist Research: Cyber Attack Response – Are business leaders ready? Recorded: Mar 26 2014 52 mins
    New research from The Economist Intelligence Unit shows how businesses are starting to view cyber-attacks as inevitable – and also as a potential opportunity. The report, sponsored by Arbor Networks, entitled “Cyber incident response: Are business leaders ready?” shows that despite 77 percent of companies suffering an incident in the past two years, over a third of firms (38 percent) still have no incident response plan in place. In fact, only 17 percent of businesses globally are fully prepared for an online security incident. Despite this, the majority (67%) of senior executives believe cyber incidents can be an opportunity to enhance their company’s reputation, provided the response is competently handled.

    Attend this webinar to learn:

    • Why the level of preparedness is being held back by lack of understanding about threats
    • How an emphasis on reputation is driving formalization of plans and processes
    • The reasons firms remain reticent about disclosing incidents and sharing intelligence about threats
For Certified Members and Information Security Professionals Globally
The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker (C|EH), Computer Hacking Forensics Investigator (C|HFI) and EC-Council Certified Security Analyst (E|CSA)/License Penetration Tester (L|PT) programs, and various others offered in over 60 countries around the globe.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: SIEM With Integrated Identity Intelligence
  • Live at: Nov 29 2012 7:00 pm
  • Presented by: Mehlam Shakir McAfee Product Manager McAfee (former Nitro CTO ) and Tanuj Gulati, Securonix CTO
  • From:
Your email has been sent.
or close
You must be logged in to email this