Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

Register for Webcast: Transforming SIEM – Gain Actionable Intelligence for Securing Information Assets

Webcast: Wednesday, July 31 at 1 PM ET / 10 AM PT

Webcast: Wednesday, July 31 at 1 PM ET / 10 AM PT

Transforming SIEM: Gain Actionable Intelligence for Securing Information Assets

Business executives demand data for decision-making. Security professionals want situational awareness. Security Information and Event Management (SIEM) tools are seen as a solution to fulfill both needs, but today’s reality is that such tools often create more fog than clarity, doing little more than providing compliance reporting.

WHAT ATTENDEES WILL LEARN:

In this webcast, our guest, John Kindervag, Principal Analyst, Security and Risk Management at Forrester Research, will describe a data security and control framework for collecting and analyzing new types of IT data to transform SIEM into a security and IT analytics tool. Through this transformation, SIEM can provide the INTEL (information, notification, threats, evaluation, leadership) organizations require to better secure data, including:

  • Recommended actions to help grow your ‘INTEL’
  • Analytics to better predict threats and protect data
  • New types of IT data needed and the associated challenges

The session will conclude with an interactive discussion of SIEM’s role in this process, steps to take and obstacles to avoid to be successful.

Register Now

Presenters:

John Kindervag – Principal Analyst at Forrester Research serving Security & Risk Professionals.

Advertisement. Scroll to continue reading.

John is a leading expert on wireless security, network security, security information management, and PCI data security. John is a 25-year veteran of the high-tech world and holds numerous industry certifications, including CISSP, CEH, QSA, and CCNA. Prior to joining Forrester, John was the senior security architect with security consultancy Vigilar, and he started the security practice for a Cisco Gold VAR, Flair Data Systems, where he was a principal security consultant. He has particular expertise in the areas of wireless security, intrusion detection and prevention, and voice over IP hacking. John has a Bachelor of Arts degree in communications from the University of Iowa.

Brennan O’Hara – Security Solutions Manager for NetIQ’s Security Management offerings where he is responsible for identifying and developing market offerings that lead to innovative and more effective approaches for managing security and compliance in complex environments. Brennan has over 8 years of experience in the identity, access, security, and compliance area. He came to NetIQ via their acquisition of Novell where he was most recently solution manager for Novell’s identity and access management products. Prior to Novell, Brennan has led product marketing efforts for several different companies, including Netegrity, CA Technologies, and Imprivata. Prior to his time in Security, Identity and Access Management, Brennan spent 12 years at Lotus Development/IBM selling, launching, and marketing new enterprise and team collaboration offerings.

Register Now

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Training & Awareness

Google has announced a new training program for cybersecurity analysts and those who graduate will get a professional certificate from Google.

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...