1. Moscone West | 2011 Table D

A significant portion of today’s threats involve systems being breached in a matter of seconds. The tried and true SIEM, while still very relevant, simply does not have the shutter speed to detect and react to today’s threats. During this session we will discuss ways to augment the use of logs by adding wire data to the existing infosec arsenal. Attendance is strictly limited to allow for a small group experience.

Participants: