Threat Detection and Incident Response: What’s New for 2014
As any security practitioner can tell you, things change quickly in the world of IT security, particularly with respect to new and evolving threats. As a result, organizations need to continuously adapt their security strategies to defend against new threats and take advantage of the latest capabilities for responding quickly when there is a breach. In this session, Mike Rothman, President of Security Analyst firm Securosis, and Jaime Blasco, Director of AlienVault Labs, will give an overview of key changes in the information security world in 2013 and considerations for adapting your 2014 strategy to stay ahead of threats.
Threat Intelligence: The Key to a Complete Vulnerability Management Strategy
While vulnerability assessments are essential, considering vulnerability data in a vacuum greatly limits your ability to prioritize your action plan in an effective way. Without the context of which vulnerabilities are the most severe, which are actively being targeted, which are on critical assets, etc, you may waste time checking things off the list without actually improving security. Join AlienVault for this session to learn: strategies for addressing common vulnerability management challenges, the pros and cons of different vulnerability scanning techniques and how to integrate threat intelligence into your vulnerability management strategy.
PCI DSS v3.0: How to Adapt Your Compliance Strategy
Featured Guest: Carlos Villalba, Director of Security Services, Terra Verde Services, & Patrick Bass, Director of Security Solutions, Terra Verde Services
With version 3.0 of PCI DSS now available, it’s time to review your compliance strategy and make a plan for adapting to the revised requirements. While the 12 main requirements remain the same, there are significant changes related to malware defenses, vulnerability assessments and penetration testing. During this 1-hour session, you’ll learn: What’s new in PCI DSS version 3.0, key considerations for adapting your compliance strategy, technology recommendations for addressing new compliance requirements, and how other companies have simplified PCI DSS compliance.
Using Crowd-Sourced Threat Intelligence to Stay Ahead of Exploits
As part of developing a vulnerability management strategy, it’s important to think through the “what if” scenarios that you need to defend against. However, if you’re only considering your own knowledge of potential threats, your plan will likely be incomplete. Join Jaime Blasco, Director of AlienVault labs for a discussion on how to use collaborative threat intelligence to strengthen your vulnerability management strategy.
Whose Logs, What Logs, Why Logs - Your Quickest Path to Security Visibility
Securing your environment requires an understanding of the current and evolving threat landscape as well as knowledge of network technology and system design. This session will include a technical presentation, demo and interactive Q/A that will highlight how to build out a security plan to defend against today’s threats.
Product Demo: Get Security Visibility in Under 1 Hour with AlienVault
Watch a recorded 30-minute demo of AlienVault USM to see how you can get complete network security visibility in under an hour. During this technical session, you will get a detailed tour of our technology from one of our SIEM deployment experts. See the most popular features and use cases.
Advanced OSSEC Training: Integration Strategies for Open Source Security
During this technical one-hour session, Santiago Gonzalez, an OSSEC core team member (System integration, rules & SIEM) and AlienVault Director of Professional Services, will demonstrate how to integrate OSSEC with other 3rd party applications for greater security visibility and response.
PCI DSS Simplified: What You Need to Know
Maintaining, verifying, and demonstrating PCI DSS compliance is far from a trivial exercise. Those 12 requirements often translate into a lot of manual and labor-intensive tasks – chasing down discrepancies in asset inventory spreadsheets, removing false positives from network vulnerability assessment reports, and weeding through log data trying to make sense of it all. In fact, you may need to consult at least a dozen different tools for those dozen requirements.
SANS Institute Ask The Expert Webcast: Preparing for Effective Threat Detection and Response
There are many things that can happen in the daily life of an intrusion analyst. Monitoring events and looking for indicators of compromise can be a taxing job, but there are also many opportunities to detect and possibly prevent data breach scenarios from happening. What are the phases of intrusion detection and incident response processes in today's organizations?
The Lazy Attacker: Defending Against Broad-based Cyber Attacks with Unified & Collaborative Defenses
Advanced Persistent Attacks (APTs) get most of the attention from the cyber security community because, as defenders, we want to be vigilant against the most insidious techniques. However, this unilateral mindset ignores a much less interesting reality.
SANS Institute: Best Practices for Leveraging Security Threat Intelligence
The state of threat intelligence in the information security community is still very immature. Many organizations are still combating threats in a reactive manner, only learning what they're dealing with, well...when they're dealing with it. There is a wealth of information in the community, and many organizations have been gathering data about attackers and trends for years. How can we share that information, and what kinds of intelligence are most valuable? In this presentation, we'll start with a brief overview of AlienVault's Open Threat ExchangeT (OTXT), and then we'll discuss attack trends and techniques seen in enterprise networks today, with supporting data from AlienVault OTX. We'll also take a look at some new models for collaboration and improving the state of threat intelligence going forward.
Preparing for a Security Breach
How to keep your head (and your job) when the worse case scenario happens. Due to the increasing frequency of security breaches, defining an action plan is critical for every security practitioner. Getting breached doesn’t determine whether or not you’ve got a good security program in place – but how you respond to one does.
Quick & Dirty Dozen: PCI Compliance Simplified
Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Those 12 requirements often translate into a lot of manual and labor-intensive tasks – chasing down discrepancies in asset inventory spreadsheets, removing false positives from vulnerability assessment reports, and weeding through log data trying to make sense of it all. In fact, you may need to consult at least a dozen different tools for those dozen requirements.Unified security management provides a simpler and saner approach. All of the essential security controls you need for PCI compliance – asset discovery, vulnerability assessment, threat detection, behavioral monitoring, log management, file integrity monitoring, and security intelligence – are already built into a single event correlation engine and management console. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.
Six Steps to SIEM Success
Securing the IT environment in today’s college or university is no task for the faint of heart. With a user population of digital natives, a school’s IT services are often a high-risk zone where state-of-the art learning and research meets the global threat laboratory. Reducing risk and maintaining compliance requires centralized security visibility and the tools to identify and remove threats quickly and efficiently. These are challenges best tackled with a unified security management approach.
Expect More From Your SIEM
Unlike security cameras, going from installation to insight with a traditional SIEM is far from straightforward. During this session, we’ll cover a few common problems with SIEM technologies, and how you can avoid those pitfalls with AlienVault Unified Security Management. You’ll walk away with a new perspective on an old problem – reducing the cost of security visibility.
Using IP Reputation Data to Stay Ahead of the Threat
Cyber attacks are constantly increasing in both frequency and sophistication. In this atmosphere, accurate and timely threat intelligence is essential. In this webinar, we will share details on a recent real-world test IANS conducted comparing threat intelligence approaches.
Securing the ‘Wild Wild West’: Unified Security Management for Colleges and Universities
Securing the IT environment in today’s college or university is no task for the faint of heart. With a user population of digital natives, a school’s IT services are often a high-risk zone where state-of-the art learning and research meets the global threat laboratory. Reducing risk and maintaining compliance requires centralized security visibility and the tools to identify and remove threats quickly and efficiently.
Practitioners Guide to a SOC
A nuts-and-bolts discussion of SOC essentials with a review the evolution of SOCs and explain exactly what you’ll need for 20/20 visibility into: What assets are in your environment, and which need priority protection. Which assets have known vulnerabilities. Which assets are under attack, by what type of exploit. Whether a breach has already occurred. How to prioritize your response activities.