• Sponsor Resources
  • Editorial Resources
  • Classrooms
    • Hybrid Cloud Security
    • Targeted Attack Detection and Remediation
    • Enterprise IAM
    • Application Security
    • IoT Security

Lesson 1:


Learn how to go from threat intelligence to actionable intelligence.

Integrating systems
SIEM and Incident Response

Lesson 2:


Learn the history of SIEM, the challenges of making it work and how to generate actionable intelligence.

The Past,
present and future of SIEM

Lesson 3:


Learn how to build SIEM policies to protect against threats.

SIEM best practices
for attack detection

Lesson 4:


Parse through the hyperbole to isolate what's important about SIEM.

The top 5
lies about SIEM

Lesson 5:


SIEM Threat Intelligence Quiz

SIEM Threat
Intelligence Quiz

Integrating SIEM and Incident Response

This Security classroom explores how to enhance and extend SIEM technology to effectively support incident response.

TOP

Mike Rothman
President, Securosis

Mike Rothman is president of Securosis, an independent information security research and consulting firm. Having spent over 15 years as an end-user advocate for global enterprises and mid-sized businesses, Rothman's role is to educate and stimulate thought-provoking discussion on how information security contributes to core business imperatives



Sponsor Resources

LogRhythm, a leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company’s award-winning platform unifies next-generation SIEM, log management, network and endpoint monitoring and forensics, and security analytics. In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides innovative compliance automation and assurance, and enhanced IT intelligence.

Learn More
  • Comparing Security Information and Event Management (SIEM) Technologies

  • SIEM Tools to Optimize IT Security Management and Simplify Compliance SIEM Tools to Optimize IT Security Management and Simplify Compliance

  • Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches

  • Cybersecurity Overview for CEOs and Boards

  • Buyer's Guide: SIEM Appliances for 2014-2015

  • Critical Capabilities Use Cases for Security Information and Event Management

  • Anatomy of A Hack Disrupted

  • The Top 20 Critical Security Controls for Effective Cyber Defense

  • A Proven Security Intelligence Model for Combating Cyber Threats







Editorial Resources

About SearchSecurity.com and Information Security magazine online

IT security pros turn to SearchSecurity.com and Information Security Magazine Online for the information they require to keep their corporate data, systems and assets secure. We're the only information resource that provides immediate access to breaking industry news, virus alerts, new hacker threats and attacks, security certification training resources, security standard compliance, webcasts, white papers, podcasts, Security Schools, a selection of highly focused security newsletters and more -- all at no cost. Nowhere else will you find such a highly targeted combination of resources specifically dedicated to the success of today's IT-security professional..

Learn More
  • Rethink how you use your SIEM product

  • Use SIEM technology to identify unauthorized access attempts

  • Why focus on SIEM integration, coverage maximizes anomaly detection




Follow Us

15.4k
6.6k
2.5k

Contact Us

  • info@TechTarget.com
  • 275 Grove Street
    Newton, MA 02466
  • @TechTarget
  • (888) 274-4111