Weaponize Your Data
- Two days of in-depth SIEM Summit talks covering practical techniques for improving the value of your data and corresponding analysis → VIEW AGENDA
- Closely aligned, immersive information security courses, including SEC555: SIEM with Tactical Analytics
- Evening networking events, Cyber Defense NetWars, and SIEM NetWars
Bring order to data chaos.
Security teams continue to miss intrusions that can be easily detected with the data and logging solutions they already have. While many security programs deploy a Security Information and Event Management (SIEM) platform, they struggle to effectively collect, parse, enrich, and filter the vast amounts of data they're collecting. This ultimately leads to a failure to generate actionable intelligence and detect intrusions before it's too late. Instead of following the tradition of centrally collecting data to more efficiently ignore it, attend the SIEM Summit and bring order to the chaos by learning how to use your data for tactical analysis and detection.
Hear from the experts– Find out how to turn adversary strengths into weaknesses.
The SIEM Summit will provide attendees with practical approaches and techniques that enable organizations to use their SIEM platform as a robust detection capability. The Summit will bring together leading security practitioners and present real-world case studies that demonstrate how to leverage new or existing high-value log sources. With its focus on effective use of monitoring tools and sound analysis techniques, the Summit aims to cure SIEM deployments of their most common issues and pass on the newest ideas about how to better utilize the advanced capabilities of these platforms. Join us to learn first-hand from those who are effectively using their SIEM platform to identify, detect, and ultimately hunt adversaries.
The Summit will explore the following topics:
- Detection techniques and tools
- Log collection
- Log enrichment (pre-ingestion or post-ingestion)
- Log analysis with emphasis on adversary detection
- Scripts that provide cool new ways of analyzing data
- Security in Continuous Monitoring
- Data Processing, Normalization, and Analysis
- Applying security expertise to data analytics
- False positive reduction
- Machine learning and statistical data analysis