Whose Logs, What Logs, Why Logs - Your Quickest Path to Security Visibility

Logo
Presented by

Tom D'Aquino, Sr. SIEM Engineer

About this talk

Securing your environment requires an understanding of the current and evolving threat landscape as well as knowledge of network technology and system design. This session will include a technical presentation, demo and interactive Q/A that will highlight how to build out a security plan to defend against today’s threats. Specifically, we will discuss: What network, system and host data you should be collecting for the quickest path to security visibility Best practices for network, perimeter and host monitoring How to use the data you collect to gain valuable security management insights You’ll leave this session with a clear understanding of what you need to achieve real-time security visibility and protection.
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (35)
Subscribers (72944)
Welcome to LevelBlue. We simplify cybersecurity through award-winning managed security services, experienced strategic consulting, threat intelligence and renowned research. Our team is a seamless extension of yours, providing transparency and visibility into security posture and continuously working to strengthen it. We harness security data from numerous sources and enrich it with artificial intelligence to deliver real-time threat intelligence. This enables more accurate and precise decision making. With a large, always-on global presence, LevelBlue sets the standard for cybersecurity today and tomorrow. We easily and effectively manage risk, so you can focus on your business. LevelBlue. Cybersecurity. Simplified.