SIEM: Cost-Effective Tools for Defeating Cybercrime

January 26, 2009 Published by  SearchSecurity.com

Webcast Alert

SearchSecurity.com
UPCOMING WEBCAST 
About the Sponsor



Novell Inc.
Making IT Work as One™ Through its infrastructure software and global ecosystem of partnerships, Novell harmoniously integrates mixed IT environments, allowing people and technology to work as one. Novell delivers the best-engineered, most interoperable Linux platform and a portfolio of integrated IT management software that helps businesses worldwide reduce cost, complexity and risk. With 25 years of experience, 5,100 partners, 54,000 customers and over US$1 billion in annual sales, Novell is a global leader in delivering solutions that allow people and technology to work as one.
> For more information

Dear SearchSecurity.com member,

The global economic crisis is constraining IT budgets everywhere, but unfortunately it does not slow the pace of cybercrime - in fact, it can create more fertile ground for it. And while security threats loom larger, so do the potential costs associated with them.

This Webcast discusses how today's companies are successfully using security information and event management (SIEM) technology to improve overall security posture without increasing the burden on IT budgets.

VENDOR WEBCAST
Using SIEM to Improve Security AND Save Money
WHEN: LIVE! January 29, 2009 at 2:00 PM EST (1900 GMT)
SPEAKERS: Tom Bowers, Security Constructs, LLC
  Ross Chevalier, President & CTO, Novell Canada
  Joseph Magee, Chief Technology Officer and co-founder of Vigilant
SPONSOR:   Novell Inc.
 PRE-REGISTER FOR WEBCAST! 


ABOUT THE WEBCAST:
Check out this Webcast and learn about:
  • How to successfully automate audit-focused security reporting
  • Why prioritizing the protection of your company's most important applications and data is critical for ensuring overall security and efficiency
  • Tips for deploying SIEM to effectively accelerate threat identification and response


ABOUT THE SPEAKERS:
Tom Bowers, Security Constructs, LLC

Tom Bowers, who holds the CISSP, PMP and Certified Ethical Hacker certifications, is a well known expert on the topics of data leakage prevention, global enterprise information security architecture and ethical hacking. He is also the president of the Philadelphia chapter of InfraGard, the second largest chapter in the country with more than 600 members. Additionally, Bowers leads the independent think tank and industry analyst group Security Constructs, LLC. His areas of expertise include aligning business needs with security architecture, risk assessment and project management on a global scale. He brings a real world, pragmatic approach to the business of security based upon his Fortune 100 enterprise experience in both the IT and Global Security functions. Bowers has worked in the computer field since the early 1980s and uses his years of experience in penetration testing, security project management, security product evaluation and implementation, and computer forensics for clients on a consulting basis throughout the U.S. His most recent contributions to Information Security magazine include a cost-benefit analysis of various strong authentication mechanisms and numerous product reviews. He is the author of several white papers, articles and is a highly respected speaker at conferences and webinars.


Ross Chevalier, President & CTO, Novell Canada

Ross Chevalier is President & CTO of Novell Canada, Ltd. and acting Americas CTO focused on Sales Architecture. His career began twenty-five years ago in Information and Communications Technology working across ICT infrastructures and platforms. Prior to joining Novell in 1998, Ross held various ICT roles in Novell partners and customers. Ross is a published writer on ICT subjects including Identity & Security, Social Networking and Open Source computing.


Joseph Magee, Chief Technology Officer and co-founder of Vigilant

Joseph Magee is the Chief Technology Officer and co-founder of Vigilant, where he gives overall guidance to best-practice-based methodologies that serve as the underpinning for Vigilant's on-site and remotely delivered services. He leads in the ongoing evaluation of security technologies and ensures that Vigilant offerings continually adapt to the latest threat vectors, developing industry standards, and regulatory requirements. Previously, he was Chief Security Officer at Top Layer Networks. Joe "cut his teeth" in the high-risk world of on-line trading, serving as information security architect for Datek Online. He frequently joins expert panels at leading industry conferences and roundtables. He attended Drexel University where he studied Commerce & Engineering, and Management of Information Systems.

PRE-REGISTER FOR THE WEBCAST



VIEW WEBCASTS 
Get informed. Check out all our available webcasts to get the information you need to make the right IT Business decisions from leading industry experts and vendors.

View all Webcasts

  A B O U T   T H I S   A L E R T
TechTarget
Contact us:
SearchSecurity
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494

This e-newsletter is published by SearchSecurity.com, a targeted Web site from TechTarget, The IT Media ROI Experts and events company.
TechTarget offers magazines, Web sites, e-newsletters, Webcasts and conferences for enterprise IT professionals.
Copyright 2009 TechTarget. All rights reserved.

If you no longer wish to receive Webcast Alert from SearchSecurity.com go to unsubscribe: http://searchSecurity.techtarget.com/u?track=NL-100&em=sekhargreen%40gmail.com&uid=4946246&eid=685888&

Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.