This webcast has been archived. To view the webcast login into your SANS Portal Account or create an account by clicking the "Get Registered" button on the right. Once you register, you can download the presentation slides below.
Six Steps to SIEM Success
- Friday, October 18, 2013 at 1:00 PM EDT (2013-10-18 17:00:00 UTC)
- Tom D'Aquino, Sandy Hawke
Sponsor
You can now attend the webcast using your mobile device!
Overview
In this webinar, we'll cover the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment so you can:
- Detect threats (known and emerging)
- Identify vulnerabilities
- Accelerate incident response
- Identify policy violations
- Simplify compliance management
Join AlienVault to learn tricks for achieving unified security visibility in the shortest amount of time.
Speaker Bios
Sandy Hawke
Sandy Hawke drives the product marketing strategy at AlienVault. With a passion for making the complex simple, Sandy brings over 15 years of information security experience in various technical sales, consulting, and product marketing roles. Before joining AlienVault, she led the security awareness program within the IBM CIO office and has held senior product marketing responsibilities at BigFix (acquired by IBM), Blue Coat Systems, Vormetric, Nevis Networks and SenSage. Sandy began her career managing network firewalls in the UUNET SOC, so security monitoring is part of her core DNA. In addition to the CISSP credential, she holds a BA degree in Political Science from the University of Delaware and an MA degree in Political Science from UC, Santa Barbara.
Tom D'Aquino
Tom has been engaged in information security with an emphasis on supporting enterprise SIEM deployments for nearly ten years. His most recent endeavors include educating others in the art of security analysis while evangelizing the benefits of AlienVault's unified approach to information security management aka AlienVault USM. Tom loves to reminisce about the good ol' days of using grep and regex to find suspicious activity in log files and he is always thrilled to brainstorm with you on your own security use cases and initiatives.
Need Help? Visit our FAQ page or email webcast-support@sans.org.
Not able to attend a SANS webcast? All Webcasts are archived so you may view and listen at a time convenient to your schedule. View our webcast archive and access webcast recordings/PDF slides.