Watch It Now!

No MSP Reseller

Hosted By
Russell Spitler
VP, Product Strategy

Russell Spitler comes to AlienVault with a strong desire to help the world build more secure systems. After spending years helping to secure the largest financial, military, and commercial organizations, Russ is now working with AlienVault to help bring those same security products to the rest of us. Russ started his career as a programmer at Fortify Software. As a programmer he designed, developed, and deployed many of the core products that comprise the Fortify product suite. Leveraging his experience with the development of those products, and his relationships with customers, Russ transitioned into Product Management. During his tenure in Product Management he oversaw a 5x growth in product revenue and helped Fortify to develop strong partnerships with other players in the market, leading to the eventual acquisition of Fortify. At Hewlett Packard, Russ played an integral role in the formation of HP Enterprise Security Products, aiding in the creation of technical integrations between ArcSight, Fortify and TippingPoint. Russ began his career in security at Colby College, where, for his honors thesis, he developed a static analysis engine embedded in the eclipse IDE. He has a BA in Computer Science.

Live Webcast
On-Demand Webcast:

SANS Institute Ask The Expert Webcast: Preparing for Effective Threat Detection and Response

A Day in the Life of an Incident Response Analyst: Preparing for Effective Threat Detection and Response

There are many things that can happen in the daily life of an intrusion analyst. Monitoring events and looking for indicators of compromise can be a taxing job, but there are also many opportunities to detect and possibly prevent data breach scenarios from happening. What are the phases of intrusion detection and incident response processes in today's organizations? In this webcast, we'll break down the different types of activities an intrusion analyst likely performs, using specific examples and illustrating how it's done. We'll also illustrate how security teams can mitigate potential breaches at different stages throughout the monitoring and response cycle, explaining what to look for and how best to respond.

Get Price Free Trial Chat