Discover how to Optimize your SIEM

Discover how to Optimize your SIEM

Cover

SIEM still plays an important role in attack detection. But for it to succeed in detecting both known and unknown attack types, you must build a set of policies to look for attack conditions and indicators in its environment, and consistently monitor for those conditions. 

View this security classroom and learn how to enhance and extend your SIEM technology so it effectively supports incident response. Discover how to assess the variety of vendor products, what noncommercial sources to consider, what costs are involved, and how much heavy lifting is required. 

Speaker

Mike Rothman President, Securosis

Mike Rothman is president of Securosis, an independent information security research and consulting firm. Having spent over 15 years as an end-user advocate for global enterprises and mid-sized businesses, Rothman's role is to educate and stimulate thought-provoking discussion on how information security contributes to core business imperatives. 

Vendor:
SearchSecurity.com
Posted:
14 May 2014
Premiered:
14 May 2014
Format:
Multimedia
Type:
Virtual Environment
Language:
English
Already a Bitpipe member? Login here

Download this Virtual Environment!

By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Safe Harbor