Whose Logs, What Logs, Why Logs - Your Quickest Path to Security Visibility

Logo
Presented by

Tom D'Aquino, Sr. SIEM Engineer

About this talk

Securing your environment requires an understanding of the current and evolving threat landscape as well as knowledge of network technology and system design. This session will include a technical presentation, demo and interactive Q/A that will highlight how to build out a security plan to defend against today’s threats. Specifically, we will discuss: What network, system and host data you should be collecting for the quickest path to security visibility Best practices for network, perimeter and host monitoring How to use the data you collect to gain valuable security management insights You’ll leave this session with a clear understanding of what you need to achieve real-time security visibility and protection.
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (34)
Subscribers (72477)
AT&T Cybersecurity’s edge-to-edge technologies provide phenomenal threat intelligence, collaborative defense, security without the seams, and solutions that fit your business. Our unique, collaborative approach integrates best-of-breed technologies with unrivaled network visibility and actionable threat intelligence from Alien Labs researchers, Security Operations Center analysts, and machine learning – helping to enable our customers around the globe to anticipate and act on threats to protect their business.