Advanced Threat Protection For Dummies ebook and Using Big Data Security Analytics to Identify Advanced Threats Webcast
Tim Wilson is a founding editor of Dark Reading.com, the IT industry’s most comprehensive portal for news and information on computer security. In this role, Wilson is responsible for managing the site, assigning and editing much of the content, and writing breaking news stories. Wilson also directs the content behind Dark Reading's popular "Tech Center" subsites, Dark Reading digital issues, and Dark Reading's virtual conference events.
In 2010, Wilson was recognized as one of the top five cybersecurity journalists in the U.S. in voting among his peers held by the SANS Institute. He was among 30 journalists to appear on the SAN Institute ballot in 2012. In 2011, Wilson was named one of the 50 Most Powerful Voices in Security in research conducted by SYS-CON Media.
Prior to joining Dark Reading.com, Wilson was the business editor for Network Computing, one of the industry’s leading magazines for in-depth technology information and product reviews.
A veteran of the IT industry, Wilson has spent 20 years as a journalist, including eight years as a top editor and reporter for CMP Media’s InternetWeek (originally called Communications Week). As executive editor of DataTrends Publications Inc., a newsletter publisher, Wilson founded four industry newsletters on the subject of data communications, edited several others, and wrote a half-dozen books on the topic. Wilson also has served as an industry analyst with two widely-recognized IT consulting firms: Decisys Inc. (now part of Gartner) and Enterprise Management Associates.
Principal Research Engineer
Brian Jones is a Principal Research Engineer at Mandiant, where he is developing statistical machine learning solutions for a variety of complex information security challenges. He is currently focusing on automated malware triage, detecting malicious activity from large volumes of enterprise data, and advanced visualization techniques. Prior to joining Mandiant, Brian spent 11 years at Sandia National Laboratories creating predictive analytics for homeland security programs. He holds Bachelor's and Master's degrees in Computer Science from the University of Virginia.
David Cowart is the Director running Mandiant’s new analytics program. David has 15 years of experience in developing information security solutions for Fortune 50 companies. He focuses on understanding and managing information security risks using a combination of organizational change, process change and technology deployment. David is passionate about applying analytic methods to information security data and is actively working to improve the usefulness of security information and event data through new tools, techniques and methods that can be applied in cloud, mobile and traditional network environments. David holds a master’s degree in statistics from Emory University in Atlanta, GA, USA.
VP of Product Strategy, Advanced Threat Protection Group
John has more than 17 years of experience in high-tech marketing, product marketing, product management, strategy and consulting. Prior to Blue Coat, John was the VP of Marketing at Solera Networks, helping drive the company into the growing market of advanced threat protection. Before Solera, John was Vice President of WW Marketing at Zscaler Inc., where he was responsible for global market expansion initiatives. Prior to Zscaler, he was Head of Global Product Marketing for Check Point Software-overseeing their enterprise and SMB solution portfolio and serving as a primary spokesperson and visionary. John was also an executive marketing consultant for Symantec, as well as Sr. Director of Product Marketing for McAfee's Network Security Business Unit. John has a B.A. from the University of St. Thomas, St. Paul, MN, focusing on international business and foreign language.
Enterprises continue to be compromised by well-disguised, sophisticated and targeted cyber-attacks that elude most security tools.
This session will discuss methods for analyzing enterprise security data in order to identify and stop these sophisticated attacks.
Join us for an interactive discussion on how you can:
- Identify sophisticated attacks and cyber threats
- Analyze existing security information and log data to isolate potential threats
- Use big data and advanced data intelligence techniques to crunch security data and identify anomalies and obfuscated attacks
- Build a strategy/best practices for doing security analytics in the enterprise
Top security experts will join Dark Reading editors to discuss the ways that enterprises can employ next-generation forensics and big data analysis to help locate sophisticated attacks, and to help devise the right countermeasures.
Please forward this message to your colleagues as well. Register now.
Advanced Threat Protection For Dummies e-Book: All attendees will receive a complimentary copy of the Advanced Threat Protection For Dummies ebook. Register now.