Watch on-demand now
Security information and event management plays an important role in collecting data on network assets and traffic. That information can then be funneled through security orchestration and automation and response (SOAR) systems to protect network environments both on-premises and in the cloud. This webcast provides guidance on the key issues to consider when choosing SIEM or SOAR products for integration on the AWS platform and suggests a process for making such important decisions.
Register for this webcast to be among the first to receive the associated whitepaper written by SANS Analyst and cybersecurity specialist J. Michael Butler.
Attendants will learn how to:
- Cloud design considerations affecting the selection and use of SIEM and SOAR technologies.
- Needs and capabilities associated with SIEMs or SOARs with respect to bandwidth, performance affects, logging capabilities and more.
- Key business, technical and operational considerations for SIEM/SOAR implementation.
- Key AWS-specific considerations for enabling effective logging, endpoint protection, forensics, automation and reporting through SOAR systems.
- Process for making an informed decision about products to integrate.
Who should attend?
Security practitioners (Security Analysts, Security Architects, Senior Security Engineers, etc.), Cloud Security Architects, and the office of the CISO.
J. Michael Butler, SANS Analyst
J. Michael Butler is a SANS analyst who has also written SANS security training courseware and audited certification test questions; presents thought-provoking webcasts; and writes position papers, articles and blogs. He is an information security consultant with a leading provider of technical services for the mortgage industry, where he is involved in migration of assets to the cloud. Mike’s responsibilities have included computer forensics, incident response, enterprise security incident management planning, internal auditing of information systems and infrastructure, information security policies, service delivery and distributed systems support. He holds the GCFA, GCIH, CISA, GSEC and EnCE certifications.
Jay Austad, VP, Orchestration and Automation Solutions at OPTIV
Jay Austad is an experienced Vice President with a demonstrated history of working in the computer and network security industry. Strong information technology professional skilled in Vulnerability Management, Scripting, Data Center, Cloud, DevSecOps, Security Orchestration and Automation, and Networking.
David Aiken, Solutions Architect Manager at AWS
David Aiken is a Solutions Architect Manager at AWS covering AWS Marketplace, Service Catalog, Migration Services, and Control Tower. He leads a team of specialist AWS SA's that help customers implement security and governance best practices using native AWS Services and Partner products. He is an AWS Certified Solutions Architect and his skills include cloud computing, enterprise architecture, agile methodologies, web services, and software design and development. David has also worked as a product manager, technical specialist, and architect evangelist.
Intro body copy here about 2018 re:Invent launches.
Register for the webinar
About the SANS Institute:
The SANS Institute was established in 1989 as a cooperative research and education organization. Its programs now reach more than 165,000 security professionals around the world—from auditors and network administrators, to chief information security officers—sharing the lessons they learn and jointly finding solutions to the challenges they face.
Optiv is a market-leading provider of end-to-end cybersecurity solutions. Optiv helps clients plan, build and run successful cybersecurity programs that achieve business objectives through our depth and breadth of cybersecurity offerings, extensive capabilities and proven expertise in cybersecurity strategy, managed security services, incident response, risk and compliance, security consulting, training and support, integration and architecture services, and security technology. Optiv maintains premium partnerships with more than 350 of the leading security technology manufacturers.
About AWS Marketplace:
AWS Marketplace is a digital software catalog that makes it easy to find, try, buy, deploy, and manage software that runs on AWS. AWS Marketplace has a broad and deep selection of security solutions offered by hundreds of independent software vendors, spanning infrastructure security, logging and monitoring, identity and access control, data protection, and more. These products can be integrated with AWS Services and other existing technologies, enabling you to deploy a comprehensive security architecture across your AWS and on-premises environments. Visit aws.amazon.com/marketplace to learn more.