How secure is your IT operations? Making SOC/NOC integration work for you

Manage webcast
Sridhar Karnam, Product Marketing Manager, HP Enterprise Security Products
The emergence of Enterprise 2.0 with social, mobile, local, and cloud applications within the enterprise has increased IT infrastructure management challenges with an increasing number of IT assets. Bring your own device (BYOD) is no longer an option for the enterprise. Your business needs an open IT architecture to facilitate collaboration between customers and employees, but your IT operations cannot fully support it due to security issues. How do you align business and IT needs while keeping your enterprise secure? This webcast talks about how to seamlessly integrate the Network Operations Center (NOC) and the Security Operations Center (SOC) to secure your IT infrastructure and empower your organization to collaborate with your ecosystem effectively.

Speaker Bio:
Sridhar Karnam, Product Marketing Manager, HP Enterprise Security Products. Sri Karnam is a subject matter expert on IT operations and security challenges, and has over 10 years of experience managing IT and security software products through their entire lifecycle. He has an MBA from Wigan & Leigh College in the UK, and an MS in Engineering Management from Santa Clara University. In his spare time, Sri enjoys building robots.
Sep 20 2012
58 mins
How secure is your IT operations? Making SOC/NOC integration work for you
SOC/NOC integration
  • Channel
  • Channel profile
  • The New School of Cyber Defense Recorded: Jul 13 2015 58 mins
    Frank Mong, Vice President & General Manager of HP Security Solutions
    The old school of cyber defense emphasized securing infrastructure and restricting data flows, but data needs to run freely to power our organizations. The new school of cyber defense calls for security that is agile and intelligent. It emphasizes protecting the interactions between our users, our applications, and our data.

    The world has changed, and we must change the way we secure it. Join Frank Mong, VP & General Manager of Security Solutions, and hear why you need to secure your: Cloud services, data (wherever it is), and apps (wherever they run).
  • Hunting Today: Using existing technology to hunt cyber threats Recorded: Jun 23 2015 28 mins
    Jeff McGee, HP Solutions Innovation Data Scientist
    The idea of a "hunt team" is becoming quite popular. Everyone building a hunt team wants the best and fastest data stores, visualization engines, and pre-canned data science algorithms to magically (and very quickly) find needles in haystacks. But let’s be honest, we can’t afford to get exactly what we want. And if we could afford it, what we exactly want doesn’t even exist for us to buy at this time. In this talk, we'll look at how you can use visualizations and basic statistics with your existing tools to catch more bad guys.
  • Think Like a Bad Guy, Act Like a Good Guy. Recorded: May 8 2015 2 mins
    HP Enterprise Security
    Watch now to learn more how the HP Enterprise Security products work together to fight off the bad guys.
  • Simplifying Compliance and Forensic Requirements with HP ArcSight Logger Recorded: Apr 24 2015 61 mins
    Dave Shackleford, SANS Analyst and Sri Karnam, HP ArcSight Product Marking Manager
    Simplifying Compliance and Forensic Requirements with HP ArcSight Logger

    The ever-increasing amount of logging output that IT organizations need to retain to have an accurate picture of what happened in their systems-and when-is a classic "big data" problem. Data categorization and normalization are imperative when sifting through a mass of data that can exceed a petabyte, while eliminating false negatives can aid a forensic investigation. This webcast focuses on HP ArcSight Logger 6, featuring a review of the product by SANS senior analyst Dave Shackleford.

    Sign up for this webcast and be among the first to receive an advance copy of a SANS whitepaper discussing Dave's review of HP ArcSight Logger 6.
  • HP Cyber Risk Report 2015: The Past is Prologue Recorded: Mar 12 2015 28 mins
    Jewel Timpe, Senior Manager- Threat Research, HP Security Research
    In the world of information security, the past isn’t dead; it isn’t even the past. The 2015 edition of HP’s annual security-research analysis reveals a threat landscape still populated by old problems and known issues, even as the pace of new developments quickens. In 2014, well-known attacks and misconfigurations existed side-by-side with mobile and connected devices (the “Internet of Things”) that remained largely unsecured. As the global economy continues its recovery, enterprises continued to find inexpensive access to capital; unfortunately, network attackers did as well, some of whom launched remarkably determined and formidable attacks over the course of the year.

    The 2015 edition of the HP Cyber Risk Report, drawn from innovative work by HP Security Research (HPSR), examines the nature of currently active vulnerabilities, how adversaries take advantage of them, and how defenders can prepare for what lies ahead. Jewel Timpe, HPSR’s senior manager of threat research, describes the report’s findings and explains how this intelligence can be used to better allocate security funds and personnel resources for enterprises looking toward tomorrow.
  • If SIEM is Dead It’s Because You Killed It Recorded: Feb 26 2015 31 mins
    Jesse Emerson - Director, Security Intelligence & Ops Consulting
    Deploying and managing security information and event management systems can tax the brain and budget. However, if done right, these solutions can be a huge benefit to the overall security stance of an organization, providing insight into what's happening on the entire network and enabling security teams to focus on the most pressing priorities to make sure their organizations' infrastructures are safe and sound from attacks. We explore the many challenges organizations face when deploying SIEM and offer remedies that can optimize their use.
  • Applied Security Analytics Recorded: Feb 26 2015 45 mins
    Jeff McGee, Solutions Innovation Data Scientist, HP
    Many organizations are looking at using big data to detect more advanced adversaries. We are collecting more information than ever before, but what are we doing with it? In this talk, we will look at some ways you can use data science and visualization tools to get more out of the data you collect. Visualizations will let you see what is happening at a high level: A picture is worth a thousand log entries. There are data science techniques that other industries, such as advertising, have used successfully. We can apply these techniques to find patterns of behavior that are out of the ordinary, and ultimately catch more bad guys.
  • Outthinking the Bad Guys Recorded: Feb 6 2015 22 mins
    Art Gilliland, General Manager of HP Enterprise Security Products
    Businesses are spending so much money on security -- almost $47 billion in 2013 -- and yet the number of breaches continues to increase. To mitigate the risks of increasingly sophisticated, innovative and persistent threats, we need to change the way we think about our security programs. In this webcast, Art Gilliland, General Manager of HP Enterprise Security Products, talks about the challenges all enterprises face from the bad guys -- and the critical steps businesses must take to defend against today's most advanced threats.
  • Defending Against Advanced Attacks Recorded: Jan 5 2015 25 mins
    Mark Nicolett - Managing VP, Gartner
    A webinar with Gartner VP Mark Nicolett, provides solid tips to reduce your vulnerability.

    The recent data breach cost Target more than $60 million in recovery costs. And even that has been exceeded at other companies that have fallen victim to advanced targeted cyber attacks.

    View the webinar to learn:
    •How to present a hard target to hackers
    •How advanced persistent attacks work
    •How the SOC and NOC can work together
    •Best practices for security information and event management (SIEM)
  • Advancing Incident Management: The Next Evolution Recorded: Dec 18 2014 38 mins
    Mitchell Webb
    To combat advanced adversaries, we must improve our detection and response capabilities. This presentation will cover emerging processes and technologies in security operations that allow organizations of all sizes to improve their detection and response effectiveness. The capabilities presented here have been used by HP to detect and remove advanced threats for organizations across the globe.
  • Top 10 tips to be compliant and secure together Recorded: Dec 8 2014 37 mins
    Sridhar Karnam, Sr. Product Marketing Manager, ESP HQ Team
    Compliance and security are better together and there are tools and resources that can be combined to achieve both. Learn the top 10 tips - such as continuous monitoring, assessing the controls, and cost-effective audit logs - to understand and implement best practices of compliance and security together.
  • The cost of inaction—what cyber crime could cost your business Recorded: Oct 29 2014 60 mins
    Sponsored by HP Enterprise Security, Independently conducted by Ponemon Institute LLC
    The average company in the United States loses $12.7 million annually to cyber crime. Other countries are close behind. These are results from the recently completed Ponemon Institute 2014 Cost of Cyber Crime study. You know the risks, but you need the data to plan your defenses and demonstrate the cost of inaction.

    View this webinar with Dr. Larry Ponemon to get the information you need. You’ll learn:

    - What cyber crimes are most common and most costly
    - The hidden internal and external costs you incur
    - What security defenses are most effective in reducing losses
    - How businesses with a strong security posture drive down costs.
  • 5th Annual Ponemon Cost of Cyber Crime Study Results: APJ Recorded: Oct 10 2014 56 mins
    Sponsored by HP Enterprise Security, Independently conducted by Ponemon Institute LLC
    Explore cyber crime in Asia Pacific and Japan

    The cost of cyber crime is on the rise in the APJ region, according to the 2014 Cost of Cyber Crime study from the Ponemon Institute. Among 30 companies surveyed in Australia, the reported per-company cost for Internet-driven crime was $4 million, up 8.4% from 2013. In Japan, the per-company average hit $6.9 million in the study, up 5.7% from 2013.

    On the more optimistic side, companies in the region are achieving notable ROI for their investments in cyber security solutions. The average ROI for seven security technologies was 16% in Australia and 17% in Japan. For a close-up view of these and other findings from the institute’s research in Australia and Japan, join Dr. Larry Ponemon, chairman and founder of the Ponemon Institute, for our APJ Security webinar.
  • 5th Annual Ponemon Cost of Cyber Crime Study Results: Americas Recorded: Oct 9 2014 60 mins
    Sponsored by HP Enterprise Security, Independently conducted by Ponemon Institute LLC
    Explore cyber crime in the Americas

    In the 2014 Cost of Cyber Crime study, U.S. companies reported an average of $12.7 million in losses to cyber crime. That was the highest national average in the study by the Ponemon Institute. Among the 59 U.S. companies in the survey, the average cost of cyber crime climbed by more than 9% over the course of the year.

    Among other findings, the study noted that the most costly cyber crimes are those caused by denial of services, malicious insiders, and malicious code. These threats account for more than 55 percent of all cyber crime costs. For a fuller look at these and other findings from the institute’s study of U.S. companies, join Dr. Larry Ponemon, chairman and founder of the Ponemon Institute, for our AMS Security webinar
  • 5th Annual Ponemon Cost of Cyber Crime Study Results: EMEA Recorded: Oct 8 2014 59 mins
    Sponsored by HP Enterprise Security, Independently conducted by Ponemon Institute LLC
    Explore cyber crime in Europe

    For its 2014 Cost of Cyber Crime study, the Ponemon Institute expanded its focus in Europe to encompass the Russian Federation, as well as France, Germany, and the United Kingdom. Collectively, the institute surveyed 137 companies in Europe in a study that found broad differences in the reported costs of cyber crime across the region. The per-company average ranged from $3.3 million in the Russian Federation to $8.1 million in Germany.

    The study results indicate that over the course of the year, cyber crime rose 20.5% in France, 17.4% in the U.K., and 7.2% in Germany. For a closer look at these and other findings from the institute’ European research, join Dr. Larry Ponemon, chairman and founder of the Ponemon Institute, for our EMEA Security webinar.
  • Catching Insiders: It's a 'People' Problem (Technology Can Help) Recorded: Sep 17 2014 45 mins
    Jesse Hughes, Managing Principal, HP
    “Et tu, Brute? Then fall, Caesar!” A rather famous line from Shakespeare’s Julius Caesar that, whether historically accurate or not, encapsulates the terror and surprise felt at the discovery of an Insider, and serves to highlight the persistence of the problem we refer to as the Insider Threat. There has always been an Insider Threat, the hard question is, why have we not done more about it? Once we understand the ‘why’ and the ‘who’ (who are Insiders, and who are the rest), we can move on to the ‘How’ we are going to find them. In this presentation we will discuss Insider Threats, their varying levels of sophistication, and different ways in which others might use them. We then apply this understanding to enabling discovery. Join us for an interactive presentation, and discussion on this persistent security challenge.
  • A look at the common, the curious, and the future of SIEM Recorded: Aug 12 2014 26 mins
    Mary karnes, Strategic Solutions Portfolio Manager
    SIEMs can be a useful and powerful platform functioning as the cornerstone of a security program. In this webinar we will explore the various ways we see clients using SIEM technology, how customers grow and mature their SIEM capabilities over time, and a sneak peek into the more interesting ways we see SIEMs being used right now.
  • State of Security Operations 2014 Report Recorded: Jul 15 2014 7 mins
    Chris Triolo, VP ProServ, HP Enterprise Security & Charles Sterner, Senior Manager, HP Cyber Defense Center
    1 in 4 Security Operations Organizations is ineffective. See how HP assesses security operations capabilities and how they used lessons learned in building their own Cyber Defense Center.
  • Top 10 ways to Solve Your Security Puzzle with ArcSight Logger Recorded: Jul 2 2014 34 mins
    Sridhar Karnam
    Organization’s today are faced with a key business challenge –massive amounts of useful data is being lost every second! According to IDC’s ‘The Digital Universe’, only 3% of data is actually being tagged for Big Data value. How do you ensure your business is handling Big Data challenges? This presentation highlight the top 10 ways HP ArcSight Logger can solve your security challenges. ArcSight’s newly released Logger is the fastest search engine on the planet for machine data. The universal log management solution collects, stores, and analyzes all of your Big Data for security event management and is used for IT operations, compliance, flow analytics, email security, weblog analysis, and more. ArcSight unifies your entire IT data through a unique technology called normalization and categorization, and then correlates the events across the devices in real-time. Find out how Logger can enable your business to stop the bleed and turn data into actionable security decisions.
  • From zero to SOC in 10 steps Recorded: Jun 17 2014 49 mins
    Paul Brettle, Pre-Sales Manager, HP
    In this presentation, we will look at what it takes to become a success when trying to address security monitoring and alerting. It is commonly regarded that log management, monitoring and alerting is seen as a corporate or enterprise solution due to is complexity and costs, but this presentation will address the steps that any organization can take to go from zero to hero. Building on a easily followed process and step by step guide, we will cover the way that organizations can move from one step to the next, managing costs and complexity at each stage. Starting with the basic steps needed to build a foundation, a SOC can be build up and deliver real value and capability without excessive cost or complexity.
Protect your business with security analytics and compliance solutions
Your organization, regardless of its size, must turn security and log data into actionable intelligence to make smarter, more efficient decisions. This channel features presentations that help answer your security questions. For example, you can learn how to manage business risk, monitor your IT infrastructure and automate compliance. Take your security knowledge a step forward with best practices in the latest security trends like Big Data Security Analytics, combating Advanced Persistent Threats and understanding the costs of cyber crime.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How secure is your IT operations? Making SOC/NOC integration work for you
  • Live at: Sep 20 2012 4:55 pm
  • Presented by: Sridhar Karnam, Product Marketing Manager, HP Enterprise Security Products
  • From:
Your email has been sent.
or close
You must be logged in to email this