Main Nav

City: 
Anaheim
State: 
CA

Security Analytics: Putting Big Data to Work
Co-located with Mobile Device Security Summit 2013

Dates:
Summit: May 30, 2013
Post-Summit Courses: June 1-6, 2013

Summit Venue:

Disneyland Hotel
1150 Magic Way
Anaheim, CA 92802
(714) 956-MICKEY
(714) 956-6425
Website: http://disneyland.disney.go.com/disneyland-hotel/

What is it: Every five years or so threats make major advances, from Viruses to polymorphic malware to worms to spyware to today's wave of advanced targeted threats or APTs. In turn, security controls adapt and inspect files, software, network flows and application traffic at deeper and deeper levels. Meanwhile, IT architectures continue to get more complex as virtualization, cloud, mobility and consumerization change the definition of client, server and network. Combine these three trends and you see an explosion of data - and an even bigger explosion of hype in the IT industry around "big data" as the solution to all problems. However, SANS believes what is really needed is "security analytics" - tools to help experienced security managers and analysts use this flood of information to make more effective, more efficient and more timely decisions that lead to fewer successful attacks and less damage from those intrusion that do get through.

The Security Challenge: Many security organizations have already made investments in security products that are handling large amounts of data:

    Security Information and Event Management products ingest logs from servers, PCs, network devices and security controls and provide normalization, consolidation and alerting.
    Security Monitoring products such as vulnerability assessment, digital forensics, intrusion detection and network behavior analysis provide information on active vulnerable or compromised resources.
    Threat intelligence feeds provide information streams on active threats, source reputations and indicators of attack.

However, most of the integration or correlation across those sources is simplistic and often only effective for reporting, not for situational awareness or proactive response. In order to deal with current and future advanced targeted attacks, security analytics tools are needed that use big data tools to manage high volumes of real time and historic information, but that also take advantage of security domain knowledge and context information to support faster, better decision making by security professionals.

The Call to Action: Security managers and analysts have an opportunity to surf the hype wave around big data to make real progress in security analytics. However, big data by itself will solve no problems - security domain expertise, automation of proven security processes and controls and accurate and timely threat and vulnerability information need to integrated into security analytics tools that enable security programs to operate at the speed of the threats - and the speed of the business! The SANS Security Analytics Summit will bring together leading practitioners, thought leaders and technology providers to jumpstart the development of powerful new approaches to Security Analytics.

Available courses:
SEC575: Mobile Device Security and Ethical Hacking     
SEC579: Virtualization and Private Cloud Security     
Security Analytics Summit

- Receive a discount of up to $250 for any full course paid for by Wednesday, May 1, 2013
- No refunds available after Wednesday, May 29, 2013.

Close
Close


Annual Conference
October 15–18, 2013
Save the date!

Events for all Levels and Interests

Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.

Close

EDUCAUSE Institute
Leadership/Management Programs
Explore More

Career Center

Leadership and Management Programs

EDUCAUSE Institute
Advanced Programs
Project Management

 

Fellowships and Awards

Fellowships
Awards Programs

Getting Involved

Mentoring
Volunteer
Speak at an Event

 

 

Jump Start Your Career Growth

Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.

 

Close
Close

Get on the Higher Ed IT Map

Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
 

 

Close

2013 Strategic Priorities

  • Connected Learning
  • Enterprise IT
  • Foundations


Learn More >

Uncommon Thinking for the Common Good™

EDUCAUSE is the foremost community of higher education IT leaders and professionals.