Making Security Intelligence Real: Delivering Insight with Agility

Michael Applebaum, Director Product Marketing, Q1 Labs, an IBM Company
In addition to petty criminals and fraudulent insiders, hacktivists and advanced attackers now threaten many businesses. In response, organizations are using Security Intelligence (SI) to gain 360-degree visibility and achieve a more proactive security posture.

The SI approach uses broader data and smarter analytics, such as anomaly detection, to deliver more accurate insights. Built with next-generation SIEM, Security Intelligence avoids the drawbacks of first-generation products: slow and expensive to deploy; difficult to manage; unable to evolve. Instead, it uses a modular and flexible approach, applying security-specific analytics to big security data in a highly manageable way. This session will share real-world Security Intelligence best practices and Q1 Labs customer successes.
Aug 9 2012
46 mins
Making Security Intelligence Real: Delivering Insight with Agility
More from this community:

IT Security

  • Live and recorded (5239)
  • Upcoming (117)
  • Date
  • Rating
  • Views
  • Today’s threat actors are more sophisticated than ever, and organizations need live attack intelligence that alerts them to emerging threats long before they become full-blown attacks that lead to sensitive data loss. Furthermore, organizations need the most current threat data available in order to protect their networks from incursions – they need real-time actionable intelligence.

    Join us for the upcoming webinar, “Actionable Intelligence: A Threat Intelligence Buyer’s Guide” featuring Rick Holland, Principal Analyst at Forrester Research, and Jeff Harrell, Senior Director, Product Marketing at Norse, to learn how to evaluate the various threat intelligence offerings in the marketplace, and how to utilize them to prevent today’s advanced attacks.

    In this webinar you will learn about:
    * The criteria needed to effectively evaluate threat intelligence solutions that meet your organization's needs
    * The value of the different types and sources of internal and external threat intelligence
    * How best to utilize threat intelligence to realize a greater return on security investments and better protect your organization
  • Today’s threat actors are more sophisticated than ever, and organizations need live attack intelligence that alerts them to emerging threats long before they become full-blown attacks that lead to sensitive data loss. Furthermore, organizations need the most current threat data available in order to protect their networks from incursions – they need real-time actionable intelligence.

    Join us for the upcoming webinar, “Actionable Intelligence: A Threat Intelligence Buyer’s Guide” featuring Rick Holland, Principal Analyst at Forrester Research, and Jeff Harrell, Senior Director, Product Marketing at Norse, to learn how to evaluate the various threat intelligence offerings in the marketplace, and how to utilize them to prevent today’s advanced attacks.

    In this webinar you will learn about:
    * The criteria needed to effectively evaluate threat intelligence solutions that meet your organization's needs
    * The value of the different types and sources of internal and external threat intelligence
    * How best to utilize threat intelligence to realize a greater return on security investments and better protect your organization
  • Social engineering targets our most challenging assets - people! We'll share a case study on how a regulated, mid-sized company prioritized risks, developed a mitigation strategy, and delivered an innovative awareness campaign.

    What's unique about this example is the program we helped build to incorporate active control testing, user feedback, and metrics to improve employee training alongside traditional technical controls.
  • Social engineering targets our most challenging assets - people! We'll share a case study on how a regulated, mid-sized company prioritized risks, developed a mitigation strategy, and delivered an innovative awareness campaign.

    What's unique about this example is the program we helped build to incorporate active control testing, user feedback, and metrics to improve employee training alongside traditional technical controls.
  • In this webinar we will examine what information security and threat analysts can expect in 2015. Topics will include using threat intelligence before and after data breaches, information sharing, the Internet of Things, and the role of the CISO.
  • Attack Intelligence to Power Tomorrow’s Cyber Response.

    Preparing to combat every threat and vulnerability is a war that no cybersecurity professional can win today. Speed, accuracy and visibility of threats and active attacks is critical to defending against APTs and other sophisticated attacks responsible for today’s headline-grabbing data breaches. The next generation of advanced threat prevention solutions will require a significant shift in how we incorporate threat and attack visibility into everyday security operations, enabling incident responders to identify and stop campaigns as they happen.

    Join us as IDC’s Research Vice President for Security Products Services Charles Kolodgy shares his view of the threat landscape, including how threats are evolving, how cybercriminals are becoming more sophisticated and what new solutions are necessary to combat APTs.
  • Attack Intelligence to Power Tomorrow’s Cyber Response.

    Preparing to combat every threat and vulnerability is a war that no cybersecurity professional can win today. Speed, accuracy and visibility of threats and active attacks is critical to defending against APTs and other sophisticated attacks responsible for today’s headline-grabbing data breaches. The next generation of advanced threat prevention solutions will require a significant shift in how we incorporate threat and attack visibility into everyday security operations, enabling incident responders to identify and stop campaigns as they happen.

    Join us as IDC’s Research Vice President for Security Products Services Charles Kolodgy shares his view of the threat landscape, including how threats are evolving, how cybercriminals are becoming more sophisticated and what new solutions are necessary to combat APTs.
  • Mobile is no longer a supplementary channel for the enterprise; It is quickly becoming the primary channel to deliver business critical information and experiences to partners, customers and employees. Join Sarvesh Jagannivas, VP of Product Marketing at MuleSoft, and Uri Sarid, CTO at MuleSoft, as they discuss the mobile enterprise opportunity, and the biggest challenges preventing successful mobile delivery.

    Join this webinar to learn:
    - Why mobile applications are the new imperative for the enterprise
    - The top challenges preventing rapid, scalable and secure mobile application development
    - Three case studies of industry leaders who are building mobile enterprises
  • Pass-the-hash and similar credential theft and reuse attacks are among the greatest security threats facing organizations today. With an impact that extends well beyond Microsoft Windows and Active Directory environments — and with no definitive means of remediation — it should come as no surprise that these types of attacks have been an underlying component of just about every targeted attack disclosed in the past several years, including those perpetrated against Saudi Aramco, Target, and The Wall Street Journal — just to name few.

    Join us Thursday, February 26th at 1 pm to learn:

    - How this highly popular and devastatingly effective class of attacks works
    - The basics of the pass-the-hash kill chain
    - An approach, based on design and administrative best practices, for mitigating attacks
    - The role privileged identity management solutions, like Xsuite, can play in implementing these practices

    Presenters:

    - Mark Bouchard, Co-Founder and VP of Research, CyberEdge Group, LLC
    - Dale Gardner, Senior Director, Product Marketing, Xceedium, Inc.
  • What sets high-functioning IT organizations apart from the rest? That’s something every IT leader wants to know. After all, we live in a highly competitive business climate and IT performance can be the difference between success and failure. To conquer the challenge, we need to be informed and collaborative and we need to do this in a cost-effective manner.

    In this webcast, you will hear from two experts on some of the technology that’s driving today’s high-functioning IT organizations. Find out how your company can be aligned, agile and ready to respond to ever-changing business requirements and competitive pressures.
  • Channel
  • Channel profile
  • Avoiding the Front Page; Security Strategies to Stay Out of the Headlines Recorded: Sep 12 2012 61 mins
    On September 26, 2012 Join hosts Chris Poulin, Security Systems Strategist, at IBM Security Division and Bola Rotibi, Founding Member (ISC)2 security board, to learn in depth how Security Intelligence really allows deep, insightful and most importantly real-time analysis to save your organization from being on the front page of the newspapers the next day a breach occurs.

    In this educational webinar, you will:

    - Gain tips on why context and situational awareness are necessary for advanced threat detection and behavioral analysis
    - Hear how other organizations are using security intelligence to combat insider threats and critical customer information
    - Learn how to detect threats that many security solutions miss
    - Providing a strategy to understand your own network and learn what to monitor efficiently
  • Making Security Intelligence Real: Delivering Insight with Agility Recorded: Aug 9 2012 46 mins
    In addition to petty criminals and fraudulent insiders, hacktivists and advanced attackers now threaten many businesses. In response, organizations are using Security Intelligence (SI) to gain 360-degree visibility and achieve a more proactive security posture.

    The SI approach uses broader data and smarter analytics, such as anomaly detection, to deliver more accurate insights. Built with next-generation SIEM, Security Intelligence avoids the drawbacks of first-generation products: slow and expensive to deploy; difficult to manage; unable to evolve. Instead, it uses a modular and flexible approach, applying security-specific analytics to big security data in a highly manageable way. This session will share real-world Security Intelligence best practices and Q1 Labs customer successes.
Security Intelligence
Thought leadership on the next-generation of SIEM, log management, network activity monitoring and threat management.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Making Security Intelligence Real: Delivering Insight with Agility
  • Live at: Aug 9 2012 3:00 pm
  • Presented by: Michael Applebaum, Director Product Marketing, Q1 Labs, an IBM Company
  • From:
Your email has been sent.
or close
You must be logged in to email this