Protecting the Business: Creating a Security Maturity Model with SIEM
Thursday, October 19, 11:00 a.m. to 12:00 p.m. CDT
This session is a must-see for anyone who’s curious how event-based security managers actually work. Jamie and Destiny present a hands-on, end-to-end how-to configure and use Log and Event Manager, including configuring file integrity monitoring, understating the effects of normalization, and creating event correlation rules. They’ll also do a live demonstration of USB Defender’s insertion, copy activity detection and USB blocking, AD user, group and group-policy configuration for account monitoring, lock-outs for suspicious activity, and security log tampering detection.
Even if you’re not using LEM or a SIEM tool, it’s a valuable lesson on Active Directory threat considerations and some real-world examples of attack techniques.
Log & Event Manager Free TrialDOWNLOAD NOW
Network Configuration Manager Free TrialDOWNLOAD NOW