Presentations Archives - Best Information Security SIEM Tools, Software, Solutions & Vendors https://solutionsreview.com/security-information-event-management/category/presentations/ Buyer's Guide and Best Practices Mon, 12 Sep 2022 13:18:42 +0000 en-US hourly 1 https://solutionsreview.com/security-information-event-management/files/2023/07/SR_Icon.png Presentations Archives - Best Information Security SIEM Tools, Software, Solutions & Vendors https://solutionsreview.com/security-information-event-management/category/presentations/ 32 32 141338796 What to Expect at the Cyber Security & Cloud Congress North America on October 5 and 6 https://solutionsreview.com/security-information-event-management/what-to-expect-at-the-cyber-security-cloud-congress-north-america-on-october-5-and-6/ Thu, 07 Jul 2022 20:06:27 +0000 https://solutionsreview.com/security-information-event-management/?p=3944 Cyber Security & Cloud Congress North America will cover two days of top-level content and thought leadership discussions looking at the Cyber Security & Cloud ecosystem. Solutions Review talks about what to expect and how to sign up. Who is TechEx Media? TechEx Media provides integrated marketing solutions incorporating three large-scale exhibitions and a suite […]

The post What to Expect at the Cyber Security & Cloud Congress North America on October 5 and 6 appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors.

]]>
Cyber Security & Cloud Expo North America

Cyber Security & Cloud Congress North America will cover two days of top-level content and thought leadership discussions looking at the Cyber Security & Cloud ecosystem. Solutions Review talks about what to expect and how to sign up.

Who is TechEx Media?

TechEx LogoTechEx Media provides integrated marketing solutions incorporating three large-scale exhibitions and a suite of digital marketing services connected to event and publishing audiences. They create whitepapers, webinars, lead generation services, brand awareness campaigns, content marketing, and thought leadership studies.

 

What is the Cyber Security & Cloud Congress North America?

Taking place on the 5-6 October 2022, the Cyber Security & Cloud Congress North America will cover two days of top-level content and thought leadership discussions looking at the Cyber Security & Cloud ecosystem. The expo presents a series of top-level keynotes, interactive panel discussions, and solution-based case studies with a focus on learning and building partnerships in the emerging cybersecurity and cloud space.

Key topics include tenants of CISO success, cloud security, risk & governance, cyber resilience, strategy & policy, as well as privacy & CCPA, trust & identity, and the human factor.

Why Attend?

5,000+ attendees are expected to assemble worldwide, including Chief Information Security Officers, Chief Information Officers, Chief Security Architects, Heads of Information Security, Chief Compliance Officers, Privacy Officers, and Data Protection Specialists.

The conference agenda will tackle the real issues facing CISOs and security professionals today as modern enterprises evolve. Day 1 will cover “Enterprise Security,” and Day 2 will cover “Accelerating Digital Transformation.” Presentations and panels will be presented to both the in-person and virtual attendees. Both days begin at 10

FAQ

What: Cyber Security & Cloud Congress North America

When: October 5 from 10:00 AM to 5:00 PM PST, October 6 from 10:00 AM to 3:00 PM PST

Where: Hybrid event. Virtual attendance and in-person at the Santa Clara Convention Center in Santa Clara, California (see registration page for more details)

Register for the Cyber Security & Cloud Congress North America with Promo Code “SOLUTIONSREVIEW20” and Get 20 Percent Off Your Pass Purchase.

The post What to Expect at the Cyber Security & Cloud Congress North America on October 5 and 6 appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors.

]]>
3944
Winning the Data Breach War with User and Entity Behavioral Analytics https://solutionsreview.com/security-information-event-management/706/ https://solutionsreview.com/security-information-event-management/706/#respond Fri, 03 Nov 2017 15:41:15 +0000 https://solutionsreview.com/security-information-event-management/?p=706 The war against hackings and data breaches can often seem like a losing battle. But new technologies and techniques are helping InfoSec pros gain the upper hand in the never fight that is Network Security. In this 21-minute presentation from the 5th Annual International Cybersecurity Conference in Israel, Avivah Litan, a vice president and distinguished […]

The post Winning the Data Breach War with User and Entity Behavioral Analytics appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors.

]]>

The war against hackings and data breaches can often seem like a losing battle. But new technologies and techniques are helping InfoSec pros gain the upper hand in the never fight that is Network Security.

In this 21-minute presentation from the 5th Annual International Cybersecurity Conference in Israel, Avivah Litan, a vice president and distinguished analyst at Gartner, explains how security teams can overcome the flood of alerts and data clotting their systems with User and Entity Behavior Analytics (UEBA).

The post Winning the Data Breach War with User and Entity Behavioral Analytics appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors.

]]>
https://solutionsreview.com/security-information-event-management/706/feed/ 0 706
Security Operations Center Essentials for SMBs https://solutionsreview.com/security-information-event-management/security-operations-center-essentials-for-smbs/ https://solutionsreview.com/security-information-event-management/security-operations-center-essentials-for-smbs/#respond Fri, 29 Sep 2017 16:00:47 +0000 https://solutionsreview.com/security-information-event-management/?p=710 Closing the gaps in security controls, systems, people and processes is not an easy feat, particularly for IT practitioners in smaller organizations with limited budgets and few (if any) dedicated security staff. So, what are the essential security capabilities needed to establish a security operations center and start closing those gaps? Join Javvad Malik of […]

The post Security Operations Center Essentials for SMBs appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors.

]]>
Closing the gaps in security controls, systems, people and processes is not an easy feat, particularly for IT practitioners in smaller organizations with limited budgets and few (if any) dedicated security staff. So, what are the essential security capabilities needed to establish a security operations center and start closing those gaps?

Join Javvad Malik of 451 Research and Patrick Bedwell, VP of Product Marketing at AlienVault for this session covering:

  • Developments in the threat landscape driving a shift from preventative to detective controls.
  • Essential security controls needed to defend against modern threats.
  • Fundamentals for evaluating a security approach that will work for you, not against you.
  • How a unified approach to security visibility can help you get from install to insight more quickly.

 

 

The post Security Operations Center Essentials for SMBs appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors.

]]>
https://solutionsreview.com/security-information-event-management/security-operations-center-essentials-for-smbs/feed/ 0 710
How to Find Bad Things on Your Network Using Free and Open-Source Tools https://solutionsreview.com/security-information-event-management/how-to-find-bad-things-on-your-network-using-free-and-open-source-tools/ https://solutionsreview.com/security-information-event-management/how-to-find-bad-things-on-your-network-using-free-and-open-source-tools/#respond Thu, 14 Sep 2017 16:00:42 +0000 https://solutionsreview.com/security-information-event-management/?p=1034 Want to get started on a hunt team and discover the bad things on your network, without spending big money? In this webcast for the threat hunter on a budget. LogRhythm Security Expert Rob McGovern, and John Strand, of Security Weekly and SANS, showcase the free and open-source tools Real Intelligence Threat Analytics (RITA) and LogRhythm NetMon Freemium. […]

The post How to Find Bad Things on Your Network Using Free and Open-Source Tools appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors.

]]>
Want to get started on a hunt team and discover the bad things on your network, without spending big money?

In this webcast for the threat hunter on a budget. LogRhythm Security Expert Rob McGovern, and John Strand, of Security Weekly and SANS, showcase the free and open-source tools Real Intelligence Threat Analytics (RITA) and LogRhythm NetMon Freemium. Utilizing the tools, the duo teaches you how to collect and analyze network traffic for hunt teaming analysis.

John kicks off the episode by walking through the installation and usage of Real Intelligence Threat Analytics (RITA). Towards the second half of the episode, Rob demonstrates powerful use cases to achieve full enterprise visibility and quickly identify emerging threats in your IT environment.

Watch now to learn how to enhance your security operations with free or open-source tools.

The post How to Find Bad Things on Your Network Using Free and Open-Source Tools appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors.

]]>
https://solutionsreview.com/security-information-event-management/how-to-find-bad-things-on-your-network-using-free-and-open-source-tools/feed/ 0 1034
Splunk, SIEM, and Security: 8 Videos to Get Started https://solutionsreview.com/security-information-event-management/splunk-siem-and-security-8-videos-to-get-started/ https://solutionsreview.com/security-information-event-management/splunk-siem-and-security-8-videos-to-get-started/#respond Thu, 17 Aug 2017 15:20:40 +0000 https://solutionsreview.com/security-information-event-management/?p=274 If you work information security and have a pulse, then you’re at least a little familiar with the hype surrounding Splunk Inc., the billion-dollar “unicorn” and purveyor of an increasingly popular big data operational intelligence and real-time analytics platform. Chances are you’re up to your ears in it. Lately, there’s been a lot of noise […]

The post Splunk, SIEM, and Security: 8 Videos to Get Started appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors.

]]>
SplunkVidsIf you work information security and have a pulse, then you’re at least a little familiar with the hype surrounding Splunk Inc., the billion-dollar “unicorn” and purveyor of an increasingly popular big data operational intelligence and real-time analytics platform. Chances are you’re up to your ears in it.

Lately, there’s been a lot of noise surrounding Splunk’s growing security business, which, fueled by the Splunk App for Enterprise Security, accounted for a third of the company revenue, according to Haiyan Song, SVP of security markets at Splunk.

But despite all that we hear about Splunk, its acquisitions, its funding, its updates and integrations, it can be difficult to find out how to get started using the actual product.

Lucky for us, this is the information age, and there a lot of wonderful resources out there where users and organizations can host information (you guessed it) such as past webinars and presentations for public access. One such resource is YouTube.com, maybe you’ve heard of it.

But alas, the information age didn’t come with an abundance of free time, and maybe you don’t want to spend the precious free time you do have in a search bar, maybe you’d rather save that time for the real bar instead.

Lucky for you, we went spelunking (ha!) through the depths of Splunk’s’ YouTube channel, which boasts and impressive 270+ videos and pulled a few of the best resources for learning to use Splunk for security.

These six videos demonstrate how Splunk provides big data and Security Information and Event Manager (SIEM) use cases, and how the technology leverages search, correlation, investigation, and reporting capabilities for continuous monitoring and faster incident investigations. So sit back and enjoy! We hope you found these videos as useful as we did.


Widget not in any sidebars

Splunk Enterprise (SIEM): Why Splunk For Security?

Splunk for Security VS. SIEM

Splunk Ransomware Vulnerability Assessment 

Splunk for Security Investigation: Command and Control Analysis

Splunk for Security Investigation: Endpoint Advanced Malware Analysis

Splunk for Security Investigations, Part 1: Threat Detection

Splunk for Security Investigations, Part 2: Threat Validation:

Splunk for Security Investigations, Part 3: Scoping

 

The post Splunk, SIEM, and Security: 8 Videos to Get Started appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors.

]]>
https://solutionsreview.com/security-information-event-management/splunk-siem-and-security-8-videos-to-get-started/feed/ 0 274
Breaking Down the Cost and Complexity Barrier to Network Monitoring https://solutionsreview.com/security-information-event-management/breaking-down-the-cost-and-complexity-barrier-to-network-monitoring/ https://solutionsreview.com/security-information-event-management/breaking-down-the-cost-and-complexity-barrier-to-network-monitoring/#respond Mon, 14 Aug 2017 17:01:15 +0000 https://solutionsreview.com/security-information-event-management/?p=999 As cyber threats grow in frequency and ferocity, they are increasingly able to penetrate the network perimeter or develop from within. Network monitoring, network forensics and traffic analytics technology enables faster threat detection and bolsters the efficiency and effectiveness of incident response. Of concern however, experts say only a fraction of enterprises deploy this technology […]

The post Breaking Down the Cost and Complexity Barrier to Network Monitoring appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors.

]]>

As cyber threats grow in frequency and ferocity, they are increasingly able to penetrate the network perimeter or develop from within. Network monitoring, network forensics and traffic analytics technology enables faster threat detection and bolsters the efficiency and effectiveness of incident response. Of concern however, experts say only a fraction of enterprises deploy this technology today due to complexity of tools and lack of budget.

In this webcast Rob McGovern, a senior technical product manager from LogRhythm and Darek Dabbs, CIO from Sera-Brynn, will discuss the ever-increasing need for network monitoring and showcase LogRhythm’s NetMon Freemium. 

The post Breaking Down the Cost and Complexity Barrier to Network Monitoring appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors.

]]>
https://solutionsreview.com/security-information-event-management/breaking-down-the-cost-and-complexity-barrier-to-network-monitoring/feed/ 0 999
Cybersecurity: A Small Town Problem? https://solutionsreview.com/security-information-event-management/cybersecurity-a-small-town-problem/ https://solutionsreview.com/security-information-event-management/cybersecurity-a-small-town-problem/#respond Wed, 09 Aug 2017 16:48:44 +0000 https://solutionsreview.com/security-information-event-management/?p=828 We are living in the age of the data breach. The number of data breaches in 2016 hit a record high of 1,093, with a total of 36,601,939 records compromised, according to a report from the ITRC. The average total cost of those breaches? $7.01 million, according to new research from the Ponemon institute. But […]

The post Cybersecurity: A Small Town Problem? appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors.

]]>
We are living in the age of the data breach. The number of data breaches in 2016 hit a record high of 1,093, with a total of 36,601,939 records compromised, according to a report from the ITRC.

The average total cost of those breaches? $7.01 million, according to new research from the Ponemon institute.

But cybersecurity threats don’t just exist for businesses. While the news is full of reported attacks on large companies, cybersecurity issues affect organizations of all sizes. State and local governments face the same cyberthreats that major businesses do, and often with fewer resources.

In this 45-minute session, Michael Kaiser, Executive Director, National Cyber Security Alliance (NCSA),Timothy Blute, Program Director Homeland Security and Public Safety Division, National Governor’s Association, Karen Jackson, Secretary of Technology, Commonwealth of Virginia,  and Daniel Stein, Program Director, Department of Homeland Security, discuss facing cyberthreats with limited resources, state and local governments need to be innovative and resourceful in solving their cybersecurity issues.

The post Cybersecurity: A Small Town Problem? appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors.

]]>
https://solutionsreview.com/security-information-event-management/cybersecurity-a-small-town-problem/feed/ 0 828
User Behavior Analytics and U: Three Videos Explain the Power of UBA https://solutionsreview.com/security-information-event-management/user-behavior-analytics-and-u/ https://solutionsreview.com/security-information-event-management/user-behavior-analytics-and-u/#respond Wed, 26 Jul 2017 15:31:18 +0000 https://solutionsreview.com/security-information-event-management/?p=677 If you’re an information security professional, or even just interested in infosec, you’ve probably been hearing a lot about User Behavior Analytics, or UBA lately. Maybe you’ve even written it off as another buzzword, another acronym, another marketing abstraction to make the old seem new again. Well that may be true sometimes, but in most […]

The post User Behavior Analytics and U: Three Videos Explain the Power of UBA appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors.

]]>
analytics-925379_1280

If you’re an information security professional, or even just interested in infosec, you’ve probably been hearing a lot about User Behavior Analytics, or UBA lately. Maybe you’ve even written it off as another buzzword, another acronym, another marketing abstraction to make the old seem new again.

Well that may be true sometimes, but in most cases User Behavior Analytics are a boon to cybersecurity systems. UBA is defined by Gartner as a cyber security process aimed at the detection of insider threats, targeted attacks, and financial fraud via the analysis of patterns of human behavior.

UBA solutions analysis large volumes of data about users on a network and then apply algorithms and statistical analysis to detect meaningful anomalies from those patterns, which could alert administrators to an imminent threat.

In these three videos, seasoned InfoSec experts explain exactly what UBA means to the modern enterprise, and the benefits it holds.

So what is UBA anyway? In this short video, experts from NuData Security concisely explain exactly what User Behavior Analytics are, and how they can help identify and stop risk before it affects security. The voice over is accompanied by an informative and effective animated illustration.

In this webcast David Gorton and Mark Settle from LogRhythm, discuss the elements of an effective user threat detection program. You’ll learn:

– Why detecting user threats is so important—and so difficult
– Different approaches to UBA
– The value of data from across your enterprise
– How to maximize the efficiency of your security analysts

Watch the webcast and learn how UBA can help you discover hidden user threats, reduce false-positives, and properly prioritize the most concerning threats.

 

In this 45-minute webinar recording Veriato COO Mike Tierney explains the benefits of User Behavior Analytics for enterprises big and small.


Widget not in any sidebars

Widget not in any sidebars

The post User Behavior Analytics and U: Three Videos Explain the Power of UBA appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors.

]]>
https://solutionsreview.com/security-information-event-management/user-behavior-analytics-and-u/feed/ 0 677
Security Analytics: Paving the Way for Automation and Reducing the Risk of Breaches https://solutionsreview.com/security-information-event-management/security-analytics-paving-the-way-for-automation-and-reducing-the-risk-of-breaches/ https://solutionsreview.com/security-information-event-management/security-analytics-paving-the-way-for-automation-and-reducing-the-risk-of-breaches/#respond Tue, 27 Jun 2017 16:32:40 +0000 https://solutionsreview.com/security-information-event-management/?p=744 Reducing the mean time to detect (MTTD) and mean time to respond (MTTR) to cyber threats is a priority for every enterprise information security team. Security analytics solutions are improving the speed and accuracy of detection by providing security pros with better data with which to make decisions. These solutions are also delivering robust security […]

The post Security Analytics: Paving the Way for Automation and Reducing the Risk of Breaches appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors.

]]>
Reducing the mean time to detect (MTTD) and mean time to respond (MTTR) to cyber threats is a priority for every enterprise information security team. Security analytics solutions are improving the speed and accuracy of detection by providing security pros with better data with which to make decisions. These solutions are also delivering robust security context in alerts and accelerating response by providing efficient and effective incident orchestration workflows.

In this on-demand webcast, Chris Brazdziunas, vice president of products at LogRhythm, and special guest speaker Joseph Blankenship, senior analyst at Forrester, discuss security analytics and the role it plays in a mature security operations program.

The post Security Analytics: Paving the Way for Automation and Reducing the Risk of Breaches appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors.

]]>
https://solutionsreview.com/security-information-event-management/security-analytics-paving-the-way-for-automation-and-reducing-the-risk-of-breaches/feed/ 0 744
Implementing Security and Auditing in a BDaaS Deployment https://solutionsreview.com/security-information-event-management/security-auditing-bdaas/ https://solutionsreview.com/security-information-event-management/security-auditing-bdaas/#respond Wed, 07 Jun 2017 16:35:20 +0000 https://solutionsreview.com/security-information-event-management/?p=507 The number of attacks on organization’s’ IT infrastructure is growing exponentially. There were over 800 data breaches in 2016, and at an average cost of $3.79 million, according to research from the Ponemon Institute. That’s a lot of damages.  In particular, it’s becoming increasingly difficult to identify unknown threats. This problem requires the ability to […]

The post Implementing Security and Auditing in a BDaaS Deployment appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors.

]]>

 

 

The number of attacks on organization’s’ IT infrastructure is growing exponentially. There were over 800 data breaches in 2016, and at an average cost of $3.79 million, according to research from the Ponemon Institute. That’s a lot of damages.  In particular, it’s becoming increasingly difficult to identify unknown threats. This problem requires the ability to store more data and better tools to analyze the data.

The talk covers limitations of current Hadoop eco-system components in handling security (Authentication, Authorization, Auditing) in multi-tenant, multi-application environments. Then it proposes how we can use Apache Ranger and HDFS super-user connections to enforce correct HDFS authorization policies and achieve the required auditing.


Widget not in any sidebars

Widget not in any sidebars

The post Implementing Security and Auditing in a BDaaS Deployment appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors.

]]>
https://solutionsreview.com/security-information-event-management/security-auditing-bdaas/feed/ 0 507