Security data mining techniques to weed through data overload

This special presentation is part of SearchSecurity.com's Compliance School lesson, "Normalize information security and compliance data management,"featuring Mike Chapple of the University of Notre Dame.

Security professionals must constantly deal with great amounts of information, which is generated from such systems as firewalls and intrusion detection. Not only is time a factor, but budgets and resources cause concern with so much information being generated, because these can sometimes barely cover what's needed to sort through the data.

This special video presentation from Mike Chapple, SearchSecurity.com's resident enterprise compliance expert, explores issues IT security managers face when weeding through copious amounts of data to find and solve core compliance problems. Learn how to lay the foundation for security data mining and understand key areas in order to successfully deal with data overload. Specific topics covered include scoping security logging efforts, selecting SIEM tools, leveraging available data, security logging best practices and understanding anomaly detection techniques.

About the speaker
Mike Chapple, Ph. D., CISA, CISSP, is an IT security manager with the University of Notre Dame. He previously served as an information security researcher with the National Security Agency and the U.S. Air Force. Chapple is a frequent contributor to SearchSecurity.com and serves as its resident expert on network security for its Ask the Experts panel. He is a technical editor for Information Security magazine and the author of several information security titles, including the CISSP Prep Guide and Information Security Illuminated.

Editor's note: This presentation was originally recorded in March 2012.

View All Videos

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

  • CIO Trends #6: Nordics

    In this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to ...

  • CIO Trends #6: Middle East

    In this e-guide we look at the role of information technology as the Arabian Gulf commits billions of dollars to building more ...

  • CIO Trends #6: Benelux

    In this e-guide, read about the Netherlands' coalition government's four year plan which includes the term 'cyber' no fewer than ...

Close