Security Log Analysis (separate registration is required)

Tuesday, April 10 | 1:00PM–4:30PM ET | Baltimore Ballroom A, Fifth Floor
Session Type: Additional Fee Program
Delivery Format: Preconference Workshop
The goal of security log analysis is to more efficiently leverage log collection in order to identify threats and anomalies in your organization. This half-day training will help you tie together various log and data sources to provide a more rounded, coherent picture of a potential security event. It will also help you understand log analysis as a life cycle (collection, event management, analysis, response) that continues to become more efficient over time. Interactive demonstrations will cover both automated and manual analysis using multiple log sources, with examples from real security incidents.

Outcomes: Explore how the 4 phases of the log analysis life cycle contributes to a security team's effectiveness * Cover how to use lessons learned during each cycle to tune the monitoring and analysis workflow to improve an organization's operational security footing over time * Better understand how to leverage various logs for incident response


  • Mark Krenz

    Chief Security Analyst, Indiana University
  • Warren Raquel

    Senior Information Security Engineer, Harvard University

Resources & Downloads

  • Security Log Analysis training Educause SPC 2018

    4 MB, pdf - Updated on 10/25/2018