Divining Meaning From Security Information

Rook Security
SECOPS
Published in
1 min readFeb 26, 2013

If you’re an (ISC)2 member, you may have seen the webinar, Divining Meaning From Security Information. If not, you can find it here:
https://www.isc2.org/EventDetails.aspx?id=9876&display=eventdetails

Description of the webinar:
With modern enterprises generating hundreds of millions of log events per day, how is today’s practitioner supposed to make sense of this deluge and distill from it actionable intelligence? To date, legacy SIEM implementations have relied on vast numbers of rules and correlation logic to separate the signal from the noise. With ever increasing data volumes this becomes a model that is difficult to scale.

In summary, the webinar focus on how to use log data to drive business. This includes how to simply sift through the immense number of log events. It also includes how we use the data to drive business decision and create value. This value is directly tied to the context that resides in.

Some additional resources on the subject matter:

Whitepaper on compliant log management

Baseline standards for logging

--

--

Rook Security
SECOPS
Editor for

Global provider of IT security solutions protecting against dynamic, emerging threats. -- Inc. 500 Company in 2014.