Please enable JavaScript to use this site.

block-b

2

2

Details-Speakers-Glance

2023-09-21

11:00

10:00

12:00

3

Webinar - On-demand

false

Thank you for registering. You will receive a confirmation email with more information in your inbox shortly.

At a glance

About the webinar

Gain deeper visibility into your security and respond to events faster. This webinar will help you understand how to strategically use SIEM by utilizing the right data sources and use cases. Register now for Harnessing the power of security information and event management (SIEM) to get ahead—and stay ahead—of the cybersecurity curve.

Date & time

Date
Time
  •  

Overview

North America
  •  
Europe & Africa
  •  
Asia-Pacific
  •  

Overview

Who should view

  • Security analysts

  • Security architects

  • Security engineers

  • Cloud security architects

  • Office of the CISO (chief information security officer)

Overview

Speakers

Kyle Dickinson

Senior Security Solution Architect, Threat Detection and Incident Response, Amazon Web Services (AWS)

Justin Henderson

Senior Instructor, SANS Institute, SANS Institute

Peccy

Peculiar Ways, Amazon

Peccy

Peculiar Ways, Amazon

Peccy

Peculiar Ways, Amazon

Peccy

Peculiar Ways, Amazon

Peccy

Peculiar Ways, Amazon

Peccy

Peculiar Ways, Amazon

Details

Description

Join our experts as they give the insights you need to power your Security Information and Event Management (SIEM).

In a world where cyber threats are ever-evolving, understanding SIEM is more crucial than ever. Explore how SIEM can be a game-changer for your business.

We've teamed up with industry experts from SANS and AWS to guide you through this journey. Discover why SIEM isn't reserved for the experts—it's for you, the decision-makers, the problem-solvers, and the future-builders. Learn to maximize its potential and turn raw data into actionable insights that drive real impact.

You will see how to

  • Deploy and maintain SIEM for continued, evolving success

  • Leverage SIEM as a strategic solution for cybersecurity compliance

  • To approach rule assessment and implementation strategies

Watch now

Watch now