Contact Us   |   Print Page   |   Sign In   |   Register
Security Information and Event Management

Recorded Live:April 26, 2011

Sponsored by:

Click here to view on-demand

Click here for presentation slides

Web Conference Overview:

Security information and event management has many benefits beyond the basics of log administration - delivery of a more robust security response capability, increased risk and security posture, data for security information and event management (SIEM) metrics, elements of compliance, and potentially much more. Establishing, maintaining, and getting good value from your SIEM can be a challenging task. Each organization faces different challenges in maximizing a SIEM strategy. This includes the potential complexity in matching your requirements to SIEM capabilities while obtaining the maximum return. Our speakers will address some of these issues while assisting you to decide what strategies to use.

"Candy” Frances Alexander, CISSP CISM - Chief Information Security Officer - Long Term Care Partners

Speaker Biography:As a recognized information security leader, Candy Alexander has in-depth experience performing many aspects of information security in her 23+ years in the industry at companies such as Digital Equipment, Compaq Computer Corporation, and Symantec. She has presented at the United Nations where she was a featured speaker for the IT Security Symposium, and was a candidate to speak on the importance of awareness to the President’s Cyber-Czar staff (Richard Clark) at the Offices of the White House.

Volunteering as a member of the International Board of Directors for the ISSA and of the ISSA Education and Research Foundation, she was awarded an ISSA Distinguished Fellow member status which she received in 2010. Currently, she enjoys her position as the CISO (Chief Information Security Officer) for Long Term Care Partners where she manages a Corporate Security Program in beautiful Portsmouth, New Hampshire.

Peter Kohler - Optim, Guardium, and Discovery Business Unit Executive - IBM

Protecting Corporations Most Valuable Asset

Every week a data breach a story breaks at an organization that exposes sensitive customer data. This risks customer loyalty and opens the door for costly litigation and mitigation processes to ensure that those exposed are safe from loss. Customers entrust their personal information to organizations with the expectation that the data will be kept confidential and safe from threat. We will discuss threats to data and how to safeguard from those threats with proven procedures and technologies including protecting data, privatizing data, finding sensitive data, and procedures to minimize loss.

Speaker Biography:Peter Kohler has over 13 years of experience in the software industry working with compliance and archive solutions. He has worked with numerous industries including banking, insurance, retail, and medical on retention policies, discovery, and designing archiving procedures to comply with federal regulations. In addition, he has over seven years of regulatory compliance experience working with government entities on proper retention schedules and process requirements to comply with numerous government regulations relating to nuclear safety, nuclear and non-nuclear administration, personnel reliability, and others. Kohler spent the last several years directly involved with technical integration of new Information Management acquisitions into IBM including Princeton Softech (Optim), Exeros (Discovery), and Guardium. Prior to IBM, Kohler worked in the portal space for Corechange and spent 8 years in the Navy as a Gunnery Officer and Nuclear Engineer on board the USS John Rodgers and USS Theodore Roosevelt.

Erin Connor - Director, EWA-Canada

Cloud Automation Protocols for SIEM

For much of its history the SIEM field (and SIM & SEM before it) has resembled a Tower of Babel to most observers. This was due in large part to the wide variety of "languages" spoken by the various security products providing inputs to the SIEM products. This includes proprietary methods and "languages" used by SIEM tools leading to incompatible information, the collection of which was costly and error-prone, and difficult to scale to larger networks. Over the past few years a number of efforts have been underway to resolve these issues by bringing standardization to security reporting languages allowing enhanced automation. This briefing will address progress on some of these efforts.

Speaker Biography:Erin Connor is a Director at EWA-Canada with responsibility for EWA-Canada's Information Technology Security Evaluation & Testing Facility. This includes a Common Criteria Test Lab, a Cryptographic Module Test Lab that carries out validation testing of cryptographic products to FIPS 140-2, a Security Content Automation Protocol (SCAP) Test Lab that tests configuration assessment and auditing products to SCAP program requirements, and a Payment Assurance lab that certifies bank machine PIN pad devices and Point-of-Sale devices to Interac® and Payment Card Industry standards. He holds an MSc from the University of Ottawa and a BSc from the University of Victoria.

Phillip H. Griffin - ISSA Educational Advisory Council & Web Conference Committee Member; Associate, Booz Allen Hamilton

Moderator Biography:Phillip H. Griffin brings over 15 years of experience in the information assurance and security profession. Operating as Griffin Consulting before joining Booz Allen, he has served as a trusted security advisor, security architect, and consultant with leading corporations including Visa International, GTE, and IBM. He has acted as committee chair, editor, head of U.S. delegation, and rapporteur in the development of national and international security standards. Griffin currently serves as an ISSA Educational Advisory Council Member, and is on the board of the Raleigh ISSA Chapter. His experience encompasses numerous facets of security including authentication technologies, encryption, access control, biometrics, and secure messaging schema. Currently, has eight patents pending in the area of security, and he has been a speaker at leading security conferences and venues around the world.

Community Search
Sign In


ISSA International Series: Trials & Tribulations of Social Engineering

8/4/2018 » 8/9/2018
Black Hat USA 2018

ISSA Thought Leadership Series: The Definitive Need for Crypto-Agility

10/17/2018 » 10/18/2018
2018 ISSA International Conference

Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information