Blending Big Data and SIEM for Better Security Intelligence
The biggest technological breakthroughs sometimes come not from new technologies, but from creative and novel implementation. SIEM and log management tools, threat and risk analysis and large data sets are not new in the world of IT security. Blending cyber security, data security and big data to create channels of communication between your data and among your security team can create unprecedented insight into the threats facing your organization and allow you to secure preemptively and respond promptly to attacks.
Join Peter Allor of IBM and our panel for an open discussion on how layering security can achieve the next level of security intelligence.
RecordedSep 18 201358 mins
Your place is confirmed, we'll send you email reminders
Moderator: Winn Schwartau, Security Awareness Company; Peter Allor, IBM; Eric Green, SC Magazine
The biggest technological breakthroughs sometimes come not from new technologies, but from creative and novel implementation. SIEM and log management tools, threat and risk analysis and large data sets are not new in the world of IT security. Blending cyber security, data security and big data to create channels of communication between your data and among your security team can create unprecedented insight into the threats facing your organization and allow you to secure preemptively and respond promptly to attacks.
Join Peter Allor of IBM and our panel for an open discussion on how layering security can achieve the next level of security intelligence.
Vijay Dheap, Big Data Security Intelligence Solutions and Mobile Security Strategy, IBM
As the organizational perimeter blurs due to rapid market adoption of cloud and mobile technologies as well as consumer engagement in social networks, an organization cannot solely focus on defense. Rather, they need to be proactive about mitigating risk and identifying threats. The urgency cannot be emphasized enough as cyber crime, breaches and advanced persistent threats (APTs) continue to occur at an alarming rate. Knowing who and what to protect or defend against are among the top questions that organizations need to ask. To answer these questions, there becomes and increasing need to analyze security data over long periods of time and also correlate that data with information from sources not traditionally deemed relevant for security. This need for big data and big data analysis amplifies an organization's security intelligence. And once a baseline has been established, organizations can employ additional big data analytics to improve its security IQ and better defend against APTs, insider threats, fraud, hactivism and cyber attacks. Join IBM for this webcast where we will share:
The evolution of security intelligence
The new realities and emerging security challenges
Motivations for coupling security intelligence with big data analytics
The cyber security questions that security leaders need answered
The merging of security intelligence with business intelligence and the skills gap
Moderator: Jarad Carleton, Frost & Sullivan; James Brennan, IBM: Alex Lanstein, FireEye; Mike Perez, Black Hills Info Sec
Next Generation Security practices and tools are allowing organizations to protect themselves from nonlinear and evolving attacks. However, these programs can easily strain an organization's IT budget and become difficult to maintain. This panel will attempt to debunk the myth that more is better by outlining a framework for achieving the visibility and incident response capabilities needed to confront the most insidious attacks without breaking the bank and building a complex security apparatus.
Paul Kaspian, Senior Product Marketing Manager - IBM Security Systems
In todays complex IT environments, avoiding a significant security incident presents increasing challenges. New, sophisticated threats, combined with the proliferation of personal mobile devices in the enterprise - not to mention the complexities of emerging technologies like cloud computing -- changes the way organizations need to think about network security. During this webinar, Paul Kaspian from IBM Security Systems will delve into these challenges and how IBM Security Network Protection and Intrusion Prevention Systems provide advanced threat protection capabilities, visibility and control over the network.
Bill Brenner, CSO Magazine; Nataraj Nagaratnam, IBM; Chris Farrow, Compassion International; Jason Mendenhall, Switch
As the cloud model continues to disrupt and enhance the modern enterprise IT teams are facing new challenges retaining security and control in these new environments. This panel will explore a multifaceted approach to the cloud that looks at the importance of integrating the right tech solutions and deployments while negotiating and understanding your relationship with cloud providers.
Panel:
Bill Brenner, Managing Editor, CSO Magazine (moderator)
Nataraj Nagaratnam, Ph.D., IBM Distinguished Engineer, IBM Master Inventor
Chris Farrow, Information Security Specialist, Compassion International
Jason Mendenhall, EVP Cloud, Switch
Vijay Dheap, Global Product Manager - IBM Master Inventor Big Data Security Intelligence & Mobile Security
In today's open and interconnected enterprise, traditional perimeters are being extended to adopt mobile, cloud, social access and information interactions. To make matters worse, many organizations face the growing risk and burden of managing multiple identity and access controls without the required security intelligence to address those challenges. They need the ability to secure identity and access across the wide variety of enterprise and internet resources from any device, any service and any source. In this session, join IBM to review the emerging needs, the next generation access and identity management solutions available today to enable secure and rapid adoption of mobile, cloud, and social transformation.
Karl Snider Market Segment Manager, Application Security, IBM Security
"Just tell me what I need to do”. That’s what we hear from Development teams as they tackle the challenge of Application Security. Unfortunately, there is no one-size-fits-all solution. In this presentation, we’ll take a pragmatic and prescriptive approach to the challenge, based on the experience of our clients. We present five key steps which will help you tackle application security without blowing your budget. This information can help you frame your application security program, and come up with an approach that is right for your organization.
Benjamin Robbins, Palador (moderator); Diana Kelley, IBM; Brian Katz, Sanofi; David Rogers, Copper Horse Solutions Ltd
The BYOD phenomenon has resulted in the need to accept personal mobile devices on corporate networks with the expected security risks. Join our panel of experts as they discuss the top of mind issues for security officers:
- technical approaches to identifying security vulnerabilities
- methods of embedding security into the application life cycle
- research efforts to ensure application security technologies keep pace with latest threats and vulnerabilities
- approaches for scaling testing across an enterprise
The panel:
Benjamin Robbins, Principal, Palador (moderator)
Diana Kelley, Application Security Strategist, IBM
Brian Katz, Director and Head of Mobility Engineering, Sanofi
David Rogers, Founder, Copper Horse Solutions Ltd
Manage your business infrastructure and security in real time.
Engage with content that helps you optimize the value of your business infrastructures and technology assets enabling greater visibility, control and automation across end-to-end business operations.
Blending Big Data and SIEM for Better Security IntelligenceModerator: Winn Schwartau, Security Awareness Company; Peter Allor, IBM; Eric Green, SC Magazine[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]58 mins
Share with your team
(they'll receive one email invite and nothing else)
[[ email ]]
Blending Big Data and SIEM for Better Security IntelligenceModerator: Winn Schwartau, Security Awareness Company; Peter Allor, IBM; Eric Green, SC Magazine[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]58 mins