Slaying the SIEM Dragon: Deploying and Automating Security Monitoring
On Demand
Session Type:
Virtual
Delivery Format:
On Demand
Princeton's ISO is transforming the SOC, and the SIEM is crucial to the project's success. By transitioning to a new SIEM and leveraging SOAR, IR times will decrease as threat hunting increases. Join us for an interactive conversation and hear how we transformed security operations and leveraged security tools to integrate with our SIEM.
Outcomes: Explore strategies for managing data sources, rules and correlation engines, compliance requirements, intelligence feeds, and threat hunting * Learn best practices for filtering logs sent to the SIEM * Learn how to ensure key components are communicating back to your SIEM * Discuss the importance of upskilling analysts
Outcomes: Explore strategies for managing data sources, rules and correlation engines, compliance requirements, intelligence feeds, and threat hunting * Learn best practices for filtering logs sent to the SIEM * Learn how to ensure key components are communicating back to your SIEM * Discuss the importance of upskilling analysts