In a perfect world, nobody will run two SIEM tools in the same environment. Because if you dream of a single pane of glass, two is not better than one. However, many organizations often run 2, 3, even 4(!) SIEMs concurrently.
If you absolutely have to live in a “multi-SIEM” environment, what are the best practices for scaling cost, efficiency, and interoperability? Is it even possible to manage a robust detection and response capability across such an environment?
Join Anton Chuvakin, Head of Solution Strategy for Google Chronicle, and Eric Foster, President of CYDERES, the 24-7 Security as a Service division of Fishtech Group, as they discuss the challenges of life with multiple SIEM's, and how many organizations are navigating towards security maturity regardless of their architecture.
Eric and Anton will also be answering your questions LIVE, register now and join the conversation!
Eric leads CYDERES as President. He's responsible for managing the overall operations, resources, and go-to-market strategy for Fishtech's Security-as-a-Service operation CYDERES. Eric led the 2018 launch of CYDERES EMDR, an Enterprise Managed Detection and Response solution that helps organizations with detection, investigation, remediation, and proactive threat hunting. Previously he's worked as CISO for Netsmart, Head of Customer Success for RiskIQ, and CISO for UMB Financial (UMB Bank). When he's not hunting the threatist of threats or (mostly intentionally) detonating malware, you'll find Eric enjoying the outdoors with his wife and two young children.
Dr. Anton Chuvakin is currently employed as a Head of Solution Strategy at Chronicle Security, a division of Google Cloud.
Until recently, Dr. Anton Chuvakin was a Research VP and Distinguished Analyst at Gartner for Technical Professionals (GTP) Security and Risk Management Strategies (SRMS) team. He is a recognized security expert in the field of SIEM, log management and PCI DSS compliance. He is an author of books "Security Warrior", "PCI Compliance", "Logging and Log Management" and a contributor to "Know Your Enemy II", "Information Security Management Handbook" and others. Anton has published dozens of papers on log management, SIEM, correlation, security data analysis, PCI DSS, honeypots, etc. His blog securitywarrior.org was one of the most popular in the industry.
Leading Organizations to a More Secure Future