Please enable JavaScript to use this site.

block-1-solid

1

1

Glance-Speakers-Details

FSrC36sinEtpAbx9ywxT8Q

The YYYY-MM-DD date of the webinar (e.g., 2020-07-04)

24-hour H:MM format in Pacific Time (example: `9:00` for 9 am PT and `16:00` for 4 pm PT)

24-hour H:MM format in Greenwich Mean Time (example: `9:00` for 9 am GMT and `16:00` for 4 pm GMT)

24-hour H:MM format in Singapore Time (example: `9:00` for 9 am SGT and `16:00` for 4 pm SGT)

Webinar - On-Demand

false

Thank you for registering. You will receive a confirmation email with more information in your inbox shortly.

At a glance

Overview

Gain deeper visibility into your security and respond to events faster. This webinar will help you understand how to strategically use SIEM by utilizing the right data sources and use cases.

Date & time

Date
Time
  •  

Overview

North America
  •  
Europe & Africa
  •  
Asia-Pacific
  •  

Overview

Overview

Overview

Speakers

Justin Henderson

Senior Instructor, SANS Institute

Kyle Dickinson

Senior Security Solution Architect, Threat Detection and Incident Response, Amazon Web Services (AWS)

Peccy

Peculiar Ways, Amazon

Peccy

Peculiar Ways, Amazon

Peccy

Peculiar Ways, Amazon

Peccy

Peculiar Ways, Amazon

Peccy

Peculiar Ways, Amazon

Peccy

Peculiar Ways, Amazon

Details

Description

Join our experts as they give the insights you need to power your Security Information and Event Management (SIEM).

In a world where cyber threats are ever-evolving, understanding SIEM is more crucial than ever. Explore how SIEM can be a game-changer for your business.

We've teamed up with industry experts from SANS and AWS to guide you through this journey. Discover why SIEM isn't reserved for the experts—it's for you, the decision-makers, the problem-solvers, and the future-builders. Learn to maximize its potential and turn raw data into actionable insights that drive real impact.

You will see how to

  • Deploy and maintain SIEM for continued, evolving success

  • Leverage SIEM as a strategic solution for cybersecurity compliance

  • To approach rule assessment and implementation strategies

Watch now

Watch now