Best Practice and Approaches for Log Management
When: Aug 19 2010
Presenting: Ritesh Singhai, Senior Security Engineer, SecureWorks
To protect critical information and business processes and to comply with industry regulations, organisations can no longer rely sole on network level security. They must also monitor a myriad of application on a variety of different platforms. Doing so is a complex, labour intensive undertaking that involves more than simply purchasing security hardware and software.
A sound log management approach defines what your company needs to monitor and retain in order to satisfy both security and compliance needs. For all these reasons, it is critical that companies must identify the devices and application that support critical business processes, which logs from these sources are critical, and which events constitute a potential security threat. Join SecureWorks as we discuss how to develop a more effective log management strategy that addresses your security and compliance requirements.
Topics of discussions
•The current state of log management
•PCI compliance for log management
•Log management strategy and approaches
Ritesh Singhai is a Senior Security Engineer for SecureWorks' Managed Security Services, Security Risk and Consulting Practice and Threat Intelligence services in Europe, Middle East and Africa (EMEA). With over 12 years of experience in the field of Information Technology, Ritesh has gained exposure in variety of environments that has allowed him to harness his in-depth experience on a broad range of technologies. Ritesh has experience working within a wide array of sectors including, financial, telecommunications, manufacturing and utilities.
Ritesh is also a Qualified Security Assessor (QSA) and provides information assurance consultancy for clients to help them achieve compliance with Government standards and industry best-practice
|< Prev||Next >|