How to Leverage Log Data for Effective Threat Detection

Logo
Presented by

Tom D'Aquino, Systems Engineer

About this talk

Event logs provide valuable information to troubleshoot operational errors, and investigate potential security exposures. They are literally the bread crumbs of the IT world. As a result, a commonly-used approach is to collect logs from everything connected to the network "just in case" without thinking about what data is actually useful. But, as you're likely aware, the "collect everything" approach can actually make threat detection and incident response more difficult as you wade through massive amounts of irrelevant data. Join us for this session to learn practical strategies for defining what you actually need to collect (and why) to help you improve threat detection and incident response, and satisfy compliance requirements. In this session, you'll learn: *What log data you always need to collect and why *Best practices for network, perimeter and host monitoring *Key capabilities to ensure easy, reliable access to logs for incident response efforts *How to use event correlation to detect threats and add valuable context to your logs
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (34)
Subscribers (72395)
AT&T Cybersecurity’s edge-to-edge technologies provide phenomenal threat intelligence, collaborative defense, security without the seams, and solutions that fit your business. Our unique, collaborative approach integrates best-of-breed technologies with unrivaled network visibility and actionable threat intelligence from Alien Labs researchers, Security Operations Center analysts, and machine learning – helping to enable our customers around the globe to anticipate and act on threats to protect their business.