How to Effectively Analyze Security Data

If your security team is like most cyber teams in large enterprises, you're probably swimming in security incident data, alerts, and log files. How can you aggregate that data and analyze it quickly, to identify sophisticated or obfuscated attacks? In this webinar, experts discuss ways to effectively collect and analyze large amounts of security data, and find the threat info you need to defend your enterprise. Speakers will also offer recommendations on how to automate some of that data analysis, so that you can identify threats more easily, and stop attackers more quickly.

Available:
On Demand
Duration:
1h 00min

Attend this webinar and you'll:

  • Learn how to identify the most relevant, high-value data in a sea of IoCs and threat feeds
  • Get tips for how to provide valuable context around bug reports and threat info
  • Get recommendations on how instrumentation, automation, and orchestration can make analysis easier and more effective

Featured Speakers

  • John Burke
    John Burke
    Senior IT Security Engineer
    Iberia Bank

    John Burke is a Senior IT Security Engineer for Iberia Bank. A graduate of Auburn University, John has more than 20 years in IT experience. John has worked in banking and healthcare technology risk systems, as well as broad experience managing security for other disciplines. He is a Certified Computer Forensics Examiner, Certified Web Application Penetration Tester, and a Certified Ethical Hacker.

  • Sara Peters
    Sara Peters
    Senior Editor
    Dark Reading

    Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.

Sponsored By