Best Practices for Leveraging Security Threat Intelligence
Featured Guest: Dave Shackleford and Russell Spitler
The state of threat intelligence in the information security community is still very immature. Many organizations are still combating threats in a reactive manner, only learning what they're dealing with, well...when they're dealing with it. There is a wealth of information in the community, and many organizations have been gathering data about attackers and trends for years. How can we share that information, and what kinds of intelligence are most valuable? In this presentation, we'll start with a brief overview of AlienVault's Open Threat ExchangeT (OTXT), and then we'll discuss attack trends and techniques seen in enterprise networks today, with supporting data from AlienVault OTX. We'll also take a look at some new models for collaboration and improving the state of threat intelligence going forward.
Preparing for a Security Breach
Featured Guest: Conrad Constantine, Community Manager - AlienVault
How to keep your head (and your job) when the worse case scenario happens.
Quick & Dirty Dozen: PCI Compliance Simplified
Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Those 12 requirements often translate into a lot of manual and labor-intensive tasks – chasing down discrepancies in asset inventory spreadsheets, removing false positives from vulnerability assessment reports, and weeding through log data trying to make sense of it all. In fact, you may need to consult at least a dozen different tools for those dozen requirements.Unified security management provides a simpler and saner approach. All of the essential security controls you need for PCI compliance – asset discovery, vulnerability assessment, threat detection, behavioral monitoring, log management, file integrity monitoring, and security intelligence – are already built into a single event correlation engine and management console. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.
Six Steps to SIEM Success
Securing the IT environment in today’s college or university is no task for the faint of heart. With a user population of digital natives, a school’s IT services are often a high-risk zone where state-of-the art learning and research meets the global threat laboratory. Reducing risk and maintaining compliance requires centralized security visibility and the tools to identify and remove threats quickly and efficiently. These are challenges best tackled with a unified security management approach.
Expect More From Your SIEM
Unlike security cameras, going from installation to insight with a traditional SIEM is far from straightforward. During this session, we’ll cover a few common problems with SIEM technologies, and how you can avoid those pitfalls with AlienVault Unified Security Management. You’ll walk away with a new perspective on an old problem – reducing the cost of security visibility.
Securing the ‘Wild Wild West’: USM for Universities
Securing the IT environment in today’s college or university is no task for the faint of heart. With a user population of digital natives, a school’s IT services are often a high-risk zone where state-of-the art learning and research meets the global threat laboratory. Reducing risk and maintaining compliance requires centralized security visibility and the tools to identify and remove threats quickly and efficiently.
Practitioners Guide to a SOC
A nuts-and-bolts discussion of SOC essentials with a review the evolution of SOCs and explain exactly what you’ll need for 20/20 visibility into: What assets are in your environment, and which need priority protection. Which assets have known vulnerabilities. Which assets are under attack, by what type of exploit Whether a breach has already occurred. How to prioritize your response activities.