cancel
Showing results for 
Search instead for 
Did you mean: 

Free (ISC)2 Webinar- Improving Security Using Metadata - June 28, 2018, 1PM Eastern

cancel
Showing results for 
Search instead for 
Did you mean: 

Free (ISC)2 Webinar- Improving Security Using Metadata - June 28, 2018, 1PM Eastern

Free (ISC)2 Webinar- Improving Security Using Metadata - June 28, 2018, 1PM Eastern

(ISC)² Team

Imagine what a security analyst could deduce if they had visibility into all the common applications flowing through their network. They could optimize the data being sent to security tools, correlate information across the various protocols to determine who is talking to whom and get visibility into malware and bad actors that may be hiding on the network. Many enterprises aggregate information from various sources, such as events and logs from DNS servers, web servers and security tools, to hunt for threat events and indicators of compromise. But these are not reliable sources; logging can be turned off inadvertently or for performance reasons. Raw network data is the ultimate source of truth – but sending it all to a SIEM can become very expensive. Join Gigamon and (ISC)2 on Thursday, June 28, 2018 at 1:00PM Eastern for a discussion on how visibility into your application traffic is elemental to security, how application metadata can provide context of potential threat events and to more easily enforce corporate compliance.

 

Attend for free by registering here

3 Comments
Community Champion
I am sorry I missed this one! Are there plans to repeat it soon, or has it been recorded and can it be viewed by those who are interested? Best regards and thanks.
(ISC)² Team

You can access the recording using the link for registering in message below.


@Tim_ISC2 wrote:

Imagine what a security analyst could deduce if they had visibility into all the common applications flowing through their network. They could optimize the data being sent to security tools, correlate information across the various protocols to determine who is talking to whom and get visibility into malware and bad actors that may be hiding on the network. Many enterprises aggregate information from various sources, such as events and logs from DNS servers, web servers and security tools, to hunt for threat events and indicators of compromise. But these are not reliable sources; logging can be turned off inadvertently or for performance reasons. Raw network data is the ultimate source of truth – but sending it all to a SIEM can become very expensive. Join Gigamon and (ISC)2 on Thursday, June 28, 2018 at 1:00PM Eastern for a discussion on how visibility into your application traffic is elemental to security, how application metadata can provide context of potential threat events and to more easily enforce corporate compliance.

 

Attend for free by registering here


 

Community Champion
Thanks Tim.