SIEM-plifying Security Monitoring: Making Sense of Security Intelligence

  • Webcast Aired Friday, 28 Aug 2015 1:00PM EDT (28 Aug 2015 17:00 UTC)
  • Speakers: Tom D'Aquino, Dave Shackleford

SIEM can be one of the most effective tools for sniffing out attackers in your network IF effective correlation rules are developed to turn security events into security intelligence. Most SIEM solutions ship with a set of \out of the box" correlation directives, but you'll typically need to invest time & resources to create and maintain correlation rules customized for your environment. So, how do you get started?

Join this webcast to learn:

  • How to translate business use cases into detection requirements
  • How to define correlation directives to detect security incidents
  • Key contextual data needed to validate and prioritize alarms
  • How to simplify SIEM with a unified approach to security