SIEM Detection & Response Cases

"Before tackling a SIEM project to improve detection and response, learn from these case studies as their scenario likely matches yours. To firebreak your network brings together technologies, processes and people in the right balance across four phases. More than a security point solution or another box, you need to turn craft into a discipline to improve detection and response.

Learn from your peers about the following:
- Before environment and issues
- Transition effort, cost and impact
- After environment and benefits
- Best practices for managed SIEM
- Your network and next steps "
Watch Now


You’re personally invited to our Mobile Security Seminar Series by Kurt Roemer, Chief Security Strategist at Citrix.




In our on-demand webinar, Protecting Your Family’s Online Reputation: A Conversation About Child & Family Social Media Habits, we explore the results of surveys on child and family social media habits, just in time for National Cyber Security Awareness month. Our children are digital natives who grow up with the internet, computers and smartphones. Sixty-eight percent have and manage their own social media profiles, according to the “Child & Family Social Media Habits Survey,” from the Identity Theft Resource Center and CyberScout. This early exposure brings convenience—and also puts them at a greater risk for phishing attacks, cyber bullying, identity theft and other threats.

How to Leverage Hacking Competitions as an Educational and Recruitment Tool


One of the most-heard complaints from security experts is that often they find their work repetitive ("The CFO's laptop has been compromised... again!"), which results in the desire of trying something "new", meaning "leave for another company." Another common complaint is that the work is very compartmentalized, and there are few occasions in which the various security specialists can enjoy working as a team. One activity that can help build a team while improving the security skills of the people involved is participating in Capture the Flag (CTF) hacking competitions. In 2003 at the University of California at Santa Barbara, one of the world's largest attack-defense CTF competitions began and has grown year-after-year, pushing the limits of the players and providing opportunities for better learning. In addition, hacking competitions are a great opportunity for recruiting new talent: CTF participants are highly skilled, well-motivated, and hard-working, which are great traits for a future employee.


Threat X

Application security is nothing like it was 25 years ago. Today, almost all enterprise applications have some web-facing component, whether in the form of a pure web-app, cloud application, API, or microservice. Furthermore, attackers have become more efficient, persistent and sophisticated, while all along, web application security has failed to keep up. Web Application Firewalls (WAFs) have long been at the center of web application security strategy but have also created large gaps with their difficult-to-manage whitelist and signature approaches.

Configuring Your Firewalls for HIPAA Compliance


Are your firewalls HIPAA compliant? In conjunction with Phase II of HIPAA audits, the FireMon team would like to show you how to ensure your firewalls are configured to protect the sensitive information your organization stores electronically. We’re hosting a 30-minute webinar on June 21 that will cover:What’s included in 2nd Round HIPAA audits.