HP Protect 2012.zip

File uploaded by Jurgen on Nov 11, 2014
Version 1Show Document
  • View in full screen mode

Hi,

 

HP_Protect_2012_Presentations.zip - 154 MB / 103 Presentations

 

1000 - Application monitoring the future of event correlation - Alex Rifman.pdf

1001 - Mastering the world of Microsoft events - Arthur Hedge.pdf

1002 - Advanced threats Damballa and HP ArcSight help Salesforce.com stay one step ahead - Ann Conrad.pdf

1003 - HP ArcSight database management 101 getting the job done without a DBA - Chris Burtenshaw.pdf

1005 - Self-tuning device-status monitoring for HP ArcSight ESM - Ian Nice.pdf

1006 - Leveraging HP ArcSight to stand up a SOC - Jamie Murdock.pdf

1008 - Your SIEM more than a headache! - John DiFederico.pdf

1009 - Referential data for HP ArcSight ESM - Marcello Lino.pdf

1011 - Real-world application monitoring - Ricky Allen.pdf

1014 - Fully synced, tiered architecture with five HP ArcSight instances - Volker Michels.pdf

1015 - HP ArcSight ESM capacity planning when you realize you need it, it's too late! - Brett Kilroe.pdf

1016 - Behavioral fraud detection using new HP ArcSight ESM correlation features - Rob Block.pdf

1017 - From use cases to content - Ray Cotten.pdf

1018 - Simplify connector deployment and maintenance with HP Connector Appliance - Madhura Chopda.pdf

1019 - HP ArcSight Windows Unified Connector a look under the hood - Moehadi Liang Girish Mantry.pdf

1021 - All about actors in HP ArcSight ESM - Anurag Singla.pdf

1022 - An introduction to HP ArcSight Logger and ESM Web services APIs - Shivdev Kalambi.pdf

1023 - HP ArcSight ESM in a HIPAA environment - Ashwin Aruldas.pdf

1024 - Beaconing activity detected using active list chaining - Eric Wadlin.pdf

1025 - Big data on HP ArcSight Logger analytics for structured and unstructured data - Marylou Orayani.pdf

1027 - Compliance and risk management basics - Morris Hicks.pdf

1028 - Cloud application security you can count on - Raghuram Pamidimarri.pdf

1029 - Correlating efficiently tips, techniques, and troubleshooting - Anurag Singla.pdf

1032 - Growing a mature team tips for successful security analyst recruitment, assessment, and retention - Colin Henderson.pdf

1033 - Distributed search and reporting in HP ArcSight Logger - Wenting Tang.pdf

1034 - From HP ArcSight ESM to express migration - Shadi Badir.pdf

1036 - Integrating HP Operations Orchestration business-flow automation capability with HP ArcSight - Dmitry Udalov.pdf

1037 - Lessons from the trenches HP ArcSight Logger API after a year - Aaron Kramer.pdf

1040 - Managing an Arcsight Express 3.0 appliance - Samir Bennacer Nathan Tisdale.pdf

1042 - Plug it in! - Doron Keller.pdf

1043 - Security maturity measuring the effectiveness of your SOC - Nick Essner.pdf

1044 - SOC use cases insider threats, malware detection, and operational metrics - Emilio Santiago.pdf

1046 - Training your analysts tips for a more effective SOC - Steven Wimmer.pdf

1047 - Advanced correlation skills on demand - Thomas Daquino.pdf

1048 - Understanding insider threats - Randy Holloway.pdf

1049 - Using HP ArcSight Compliance Insight Packages for continuous compliance - Omer Felder.pdf

1050 - Who, what, when, where, why-wiki - Colin Henderson.pdf

1054 - Keeping your ears open to social networks with ESM - Pete Babcock.pdf

1055 - Next-generation malware prevention - Ricky Allent.pdf

1057 - To escalate or not to escalate.that is the question - John Bradshaw.pdf

1073 - Cloudwatching adding IaaS monitoring to your HP ArcSight deployment - Damian Skeeles.pdf

1077 - HP ArcSight ESM database performance from the bottom up - Kerry Adkins.pdf

1079 - HP ArcSight for SAP protect the integrity of your SAP business applications - Ben Anderson.pdf

1085 - Constructing meaningful use cases in ESM - John Stoner.pdf

1096 - Assigning information to monitored environments with ESM - Fabian Libeau.pdf

1099 - Information security continuous monitoring what it is and how to achieve it - Stephen Caimi.pdf

1132 - Innovating correlations to guard against the web threats that really matter - Ofer Shezaf.pdf

1134 - Threat identification through context in SIEM - David Swift.pdf

1136 - Real-time privileged identity monitoring and compliance - Richard Weeks.pdf

1138 - Eight advanced persistent threat (APT) solutions from the field - Milo Petrovic.pdf

1139 - Virtualization security for the changing threat landscape - Partha Panda.pdf

2000 - Top IT trends and their impact on security - Shannon Lake.pdf

2001 - Security and data privacy for healthcare - Kerry Matre.pdf

2003 - Model-oriented risk management - Eliav Levi.pdf

2005 - Black cat or white cat how to fight advanced hacking - Ofer Shezaf.pdf

2006 - Data security principles that have stood the test of time - Jeff Kalibjian.pdf

2007 - HP 2011 Cyber Security Risks Report - Orion Suydam.pdf

2008 - A smarter arms race intelligence-driven security - Marc Eisenbarth.pdf

2009 - Reputation, attribution, and deterrence the next chapter in network defense - Marc Eisenbarth.pdf

2010 - Social networking risks in enterprise environments - John Pirc.pdf

2028 - Emerging threats and trends - Richard Armstrong.pdf

2034 - Using HP Enterprise Security solutions to protect your business - Ernest Dunn.pdf

2035 - Verifiable Security-beyond penetration testing towards a resilient enterprise - Rafal Los.pdf

2036 - Defend against cyberattacks by Anonymous - Jason Lancaster.pdf

3000 - Extending HP Fortify SCA with HP ALM - Tim Taels.pdf

3001 - Software vulnerabilities go mobile - Abraham Kang.pdf

3002 - Cloud-based security testing incorporating security assessments into the software development lifecycle - James Lynn.pdf

3003 - SAP Augmenting Fortify SCA with newly uncovered vulnerabilities - Carsten Huth.pdf

3004 - Mobile application testing 101 - Bucky Spires.pdf

3005 - Real-world XSS - Daniel Miessler.pdf

3006 - Secure software during development - Erik Costlow.pdf

3022 - Static and dynamic security testing exploring better together - Brian Miller.pdf

3023 - Bringing security scanning into the QA process - John Bell, Delta Airlines.pdf

3024 - Using HP Fortify Software Security Center to build application security into your SDLC - Tim Chase, Nielsen.pdf

4003 - Creating a high-availability key-management service for your enterprise - Steve Wierenga.pdf

4005 - Electronic payments the benefits and risks of payment technologies - Larry Hines.pdf

5000 - Understanding vulnerabilities to better mitigate threats - Steve Povolny.pdf

5002 - Battling bots in your network - Patrick Hill .pdf

5004 - Challenges with PCI-DSS compliance and security in the cloud - Rick Norman Sanja Raja.pdf

5005 - The HP firewall vision embracing next-generation technology - Adam Hils.pdf

TT101 - Enhance security monitoring in three easy ways - Vijay Gupta.pdf

TT102 - Monitor smart meters using domains - Aravind Mudunuri.pdf

TT103 - Logger schema extensibility - Steve Carlin.pdf

TT104 - Categorization and AUP updates what, why, and how - Aleksey Suvorov.pdf

TT105 - Enriching your own ESM content using Reputation Security Monitor v1 - Doron Keller.pdf

TT106 - Monitoring connector appliances and loggers using SNMP - Lee-Lan Yip.pdf

TT107 - Logger 5.2 dashboard drill down - Masaki Utsumiya.pdf

TT108 - HP ArcSight ESM with Oracle 11g database - Swarna Dandapani.pdf

TT109 - Pattern discovery tips and tricks - Zhipeng Zhao.pdf

TT110 - WUC tuning analysis tool - Tatyana Merzlyak.pdf

TT111 - Common use cases for utilizing Web Service API of API of ESM - Fei Gao.pdf

TT112 - Logger summary data - Selina Zhang.pdf

TT200 - Risky business-driving informed decision making with HP EnterpriseView - Colin Henderson.pdf

TT201 - Architecture review - Tracy Barella.pdf

TT202 - Wiki what - Brandie Anderson.pdf

TT203 - Has your SOC matured - Rob Sandoval.pdf

TT204 - HP Fortify in the cloud - Jack Bishop.pdf

TT205 - One size doesn't fit all customized training - Khalid Shaikh.pdf

TT206 - Solution building by example - Keith Stover.pdf

TT207 - HP ArcSight ESM healthcheck - Tracy Barella.pdf

TT208 - HP Fortify on demand James Lynn.pdf

TT209 - Using ESM plugins - Ashwin Aruldas.pdf

TT211 - SIEM-now what - Emilio Santiago.pdf

 

For other presentations see:

https://protect724.hp.com/community/events/protect-conference

 

Kind regards,

Jurgen

Attachments

Outcomes