IT Security Tech Talk

Tips and tricks for achieving effective SIEM

  • July 3 @ 11 AM BST (3:30 PM IST ) & 2 PM EDT
  • 45 Mins

Presented by

Vivin, Senior Technical Evangelist

Sid, Product Specialist

Why Attend This Tech Talk?

An end user from the sales team was just added to the Domain Admins group in Active Directory. Someone installed a service on one of your critical servers, and a large volume of files was accessed and copied in your file server. Given that these situations could indicate a breach attempt, your security team needs to have strategies in place to detect these and other incidents.

If deployed and configured properly, a security information and event management (SIEM) solution can help you detect and respond to security threats, ensuring your organization is secure and compliant.

Join us for our tech talk with Vivin Sathyan, our senior technical evangelist, and Siddharth Sharath Kumar, our SIEM product specialist, who will share tips and tricks for achieving effective SIEM. Packed with use cases, this session will give you practical action items that you can implement to improve your security operations.

Topics of discussion:

  • SIEM best practices and use cases.
  • Auditing Active Directory changes in real time.
  • Tracking crucial security events in your network.
  • Detecting attacks with event correlation.
  • Utilizing user and entity behavior analytics (UEBA) to identify, qualify, and investigate security threats.
  • Selecting the ideal SIEM solution for your organization.
  • 2Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.
  • 3Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.
  • 4Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.

Thanks!

Your e-book is on its way.

If you don't find it in your inbox within the next few minutes, check your spam folder.

Watch Now

© 2019 Zoho Corporation Pvt. Ltd. All rights reserved.

Claim Your Spot Now