As IANS faculty, I will lead a panel of enterprise SIEM/LM users (example) into battle… eh… discussion about deploying and using SIEM and log management tools. A lot …no… A L-O-T of insight will be shared by the people who use the tools on a daily basis and solve security problems using them - a tiny example in the picture.
“Navigating the Data Stream without Boiling the Ocean: Case Studies in Effective Log Management”
March 25, 2010 at 3:00 pm EST / 12PM PST
“What makes a log management program effective? Log management activities must be prioritized in order to operate your security team effectively. We will review and analyze best practices for implementing log management programs as well as address SIEMs’ influence on the goal of optimization. This virtual discussion is ideal for risk, compliance, and security managers, as well as anyone looking for new approaches to gain intelligence from their log data.”Sign up NOW – and ask questions later! And don’t later tell me I didn’t warn you! :-)
UPDATE: awesome coverage of this webcast from Rocky DeStefano can be found here at his VisibleRisk blog.
Possibly related posts:
- All posts about SIEM
- All posts about log management