cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Free (ISC)2 Webinar- Improving Security Using Metadata - June 28, 2018, 1PM Eastern

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Free (ISC)2 Webinar- Improving Security Using Metadata - June 28, 2018, 1PM Eastern

Re: Free (ISC)2 Webinar- Improving Security Using Metadata - June 28, 2018, 1PM Eastern

Tim_ISC2
ISC2 Team

Imagine what a security analyst could deduce if they had visibility into all the common applications flowing through their network. They could optimize the data being sent to security tools, correlate information across the various protocols to determine who is talking to whom and get visibility into malware and bad actors that may be hiding on the network. Many enterprises aggregate information from various sources, such as events and logs from DNS servers, web servers and security tools, to hunt for threat events and indicators of compromise. But these are not reliable sources; logging can be turned off inadvertently or for performance reasons. Raw network data is the ultimate source of truth – but sending it all to a SIEM can become very expensive. Join Gigamon and (ISC)2 on Thursday, June 28, 2018 at 1:00PM Eastern for a discussion on how visibility into your application traffic is elemental to security, how application metadata can provide context of potential threat events and to more easily enforce corporate compliance.

 

Attend for free by registering here

3 Comments
j_M007
Community Champion
I am sorry I missed this one! Are there plans to repeat it soon, or has it been recorded and can it be viewed by those who are interested? Best regards and thanks.
Tim_ISC2
ISC2 Team

You can access the recording using the link for registering in message below.


@Tim_ISC2 wrote:

Imagine what a security analyst could deduce if they had visibility into all the common applications flowing through their network. They could optimize the data being sent to security tools, correlate information across the various protocols to determine who is talking to whom and get visibility into malware and bad actors that may be hiding on the network. Many enterprises aggregate information from various sources, such as events and logs from DNS servers, web servers and security tools, to hunt for threat events and indicators of compromise. But these are not reliable sources; logging can be turned off inadvertently or for performance reasons. Raw network data is the ultimate source of truth – but sending it all to a SIEM can become very expensive. Join Gigamon and (ISC)2 on Thursday, June 28, 2018 at 1:00PM Eastern for a discussion on how visibility into your application traffic is elemental to security, how application metadata can provide context of potential threat events and to more easily enforce corporate compliance.

 

Attend for free by registering here


 

j_M007
Community Champion
Thanks Tim.