Security data mining techniques to weed through data overload
Security data mining techniques to weed through data overloaddate:Feb 05, 2013
This special presentation is part of SearchSecurity.com's Compliance School lesson, "Normalize information security and compliance data management,"featuring Mike Chapple of the University of Notre Dame.
More webcasts in this series
Security professionals must constantly deal with great amounts of information, which is generated from such systems as firewalls and intrusion detection. Not only is time a factor, but budgets and resources cause concern with so much information being generated, because these can sometimes barely cover what's needed to sort through the data.
This special video presentation from Mike Chapple, SearchSecurity.com's resident enterprise compliance expert, explores issues IT security managers face when weeding through copious amounts of data to find and solve core compliance problems. Learn how to lay the foundation for security data mining and understand key areas in order to successfully deal with data overload. Specific topics covered include scoping security logging efforts, selecting SIEM tools, leveraging available data, security logging best practices and understanding anomaly detection techniques.
About the speaker
Mike Chapple, Ph. D., CISA, CISSP, is an IT security manager with the University of Notre Dame. He previously served as an information security researcher with the National Security Agency and the U.S. Air Force. Chapple is a frequent contributor to SearchSecurity.com and serves as its resident expert on network security for its Ask the Experts panel. He is a technical editor for Information Security magazine and the author of several information security titles, including the CISSP Prep Guide and Information Security Illuminated.
Editor's note: This presentation was originally recorded in March 2012.