Beyond Log Management
How Evolving SIEM Defends against Advanced Persistent Threats
Previous Work Experience
Before coming to Forrester, Ed's background was in information security consulting, leading a global information security practice for financial services, commercial, and chemical clients. Ed is an expert in the design and delivery of secure, cost-effective, high-performance information security solutions, methodology, and standards to address complex business and security problems. Ed holds a US patent in the area of software development, specifically in the area of software requirements traceability using UML and software patterns to align business requirements with IT implementation. He has successfully developed and implemented technology and organizational change programs globally for Fortune 100 companies. Ed has strong program and project management skills, as well as, demonstrated competence in multidivision matrix management, technical management, relationship building, and projecting influence at the C-level. Ed holds the CISSP certification.
Ed holds two master's degrees, in education technology and computer science from the University of Delaware and information assurance (cum laude) from Norwich University, as well as a bachelor's degree in economics from Franklin & Marshall College.
Blog: Security & Risk Blog
The threat landscape is constantly evolving, with Advanced Persistent Threats and zero-day exploits challenging our best abilities to keep systems and data safe and secure. As a result the way we monitor and manage security events is also evolving – and SIEM, which used to be synonymous with log management has evolved to meet today’s threats and prepare for tomorrow’s as well. Join our complimentary webinar sponsored by Dark Reading and HP to hear from Forrester security expert Edward Ferrara who will discuss how SIEM is evolving and how to best take advantage of the new security tools that puts at your disposal.
Attend this event to learn:
- How SIEM is evolving in conjunction with the threat landscape
- Ways application monitoring impacts security management
- The role of Big Data in correlating security events
- What do to now to be prepared for the evolution of SIEM
Register now for this important event and bring your questions for our panel of experts to address during the live Q&A following the presentation.