Ten Keys to Better Security Data Analysis

If you’re swimming in security incident data, alerts, and log files, you’re not alone. How can you aggregate that data and analyze it quickly, to identify sophisticated or obfuscated attacks? In this webinar, experts discuss ways to effectively collect and analyze large amounts of security data, enabling you to surface the threat and exploit information that you need to defend your enterprise. Speakers will also offer recommendations on how to automate some of that data analysis, so that you can identify threats more easily, and stop attackers more quickly.

On Demand
1h 00min

Attend this webinar and you'll learn:

  • How to correlate and analyze cybersecurity data
  • Tips on how to manage the deluge of security telemetry in your enterprise
  • Insight on how to quickly identify the most critical security threats
  • Ways to mine your security data to recognize sophisticated attacks
  • Emerging tools and technologies for automating data analysis

Featured Speakers

  • Louis DiValentin
    Louis DiValentin
    Cyber R&D Principal
    Accenture Labs

    Louis DiValentin is a Cyber R&D Principal at Accenture Labs. He received a Masters of Science in Systems Engineering and Operations Research and has a background in Networks, Security, Data Science, and Big Data Platforms. He has helped develop multiple machine learning algorithms on enterprise scale datasets to enhance the threat hunt process and received multiple patents on his innovations. He has presented on security applications at a number of data science conferences and is an active member in the security community as well. His recent research focus has concentrated on the Security of AI systems from emerging attack vectors.

  • Jesse Munos
    Jesse Munos
    Technical Marketing Manager

    Jesse Munos is the Technical Marketing Manager for Extrahop where he provides competitive analysis and technical content to his marketing focused peers. Jesse started his career in 2014 as an escalations engineer with Cisco Systems where he focused on EDR and Malware Sandboxing technologies and API integrations. During that time he also presented at Cisco Live providing deep dive technical breakdowns and executive level briefings on Ciscos security portfolio. He focuses on pushing best of breed technology solutions that meet current customer needs while guiding product development to embrace the broader ecosystem integrations. On his own time he is an avid fiction reader with a penchant for military science fiction and fantasy, which melds well with his taste for scotch and wheat beer. If you catch him on the street feel free to bribe him with good conversation and hearty libation.

  • Tim Wilson
    Tim Wilson
    Editor in Chief and Co-Founder
    Dark Reading

    Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one of the top cyber security journalists in the US in voting among his peers, conducted by the SANS Institute. In 2011 he was named one of the 50 Most Powerful Voices in Security by SYS-CON Media.

Sponsored By