HP Protect 2012 Session Materials (with links to MediaSite Recorded Presentations!)

Document created by rkent on Apr 27, 2015Last modified by rkent on Jul 6, 2015
Version 3Show Document
  • View in full screen mode

I've added a couple columns to the Protect 2012 Session Material index below that contains links to MediaSite presentations. Being able to listen to the presentations along with the handouts have been invaluable to me as a learning tool, and hopefully will prove helpful for other P724 members.

 

N.B. If the Mediasite presentations don't play in Chrome/FF, try Internet Exploder :/

 

Number

Name

Speaker(s)

MediaSite Link

PDF Handouts Available

Mainstage

 

 

Monday, September 10, 2012

 

 

HP Protect keynote: HP Security: Make it Matter

Art Gilliland, Senior Vice President HP Software Enterprise Security Products
Bruce Schneier, Independent Security Technologist and Author
Hugh Njemanze, CTO and Vice President, Worldwide Research and Development, HP Enterprise Security
John R. South, Chief Security Officer, Heartland Payment Systems®

 

 

Information Security

 

 

1000

Application monitoring: the future of event correlation

Alex Rifman,AT&T

Mediasite

YES

1001

Mastering the world of Microsoft events

Arthur Hedge, Castle Ventures LLC

MediaSite

YES

1002

Advanced threats: Damballa and HP ArcSight help Salesforce.com stay one step ahead

Ann Conrad, Damballa

MediaSite

YES

1003

HP ArcSight database management 101: getting the job done without a DBA

Chris Burtenshaw, ICB Security Solutions

MediaSite

YES

1004*

Using HP ArcSight to monitor user access to cloud applications

Hector Aguilar, Okta

N/A

NO

1005

Self-tuning device-status monitoring for HP ArcSight ESM

Ian Nice, EdgeSeven

MediaSite

YES

1006

Leveraging HP ArcSight to stand up a SOC

Jamie Murdock, Diebold

MediaSite

YES

1008

Your SIEM: more than a headache!

John DiFederico, SAIC

MediaSite

YES

1009

Referential data for HP ArcSight ESM

Marcello Lino, Citi

MediaSite

YES

1010*

Know the unknown: a radical new approach for cyber security

Parag Pruthi, NIKSUN Inc.

N/A

NO

1011

Real-world application monitoring

Ricky Allen, Critical Start

MediaSite

YES

1014

Fully synced, tiered architecture with five HP ArcSight instances

Volker Michels, Vodafone Group Services

MediaSite

YES

1015

HP ArcSight ESM capacity planning: when you realize you need it, it's too late!

Brett Kilroe, Citi

MediaSite

YES

1016

Behavioral fraud detection using new HP ArcSight ESM correlation features

Rob Block, HP

  N/A

YES

1017

From use cases to content

Ray Cotten, HP

MediaSite

YES

1018

Simplify connector deployment and maintenance with HP Connector Appliance

Madhura Chopda, HP

MediaSite

YES

1019

HP ArcSight Windows Unified Connector: a look under the hood

Moehadi Liang, HP

Girish Mantry, HP

MediaSite

YES

1021

All about actors in HP ArcSight ESM

Anurag Singla, HP

MediaSite

YES

1022

An introduction to HP ArcSight Logger and ESM Web services APIs

Shivdev Kalambi, HP

MediaSite

YES

1023

HP ArcSight ESM in a HIPAA environment

Ashwin Aruldas, HP

MediaSite

YES

1024

Beaconing activity detected: using active list chaining

Eric Wadlin, SRA

MediaSite

YES

1025

Big data on HP ArcSight Logger: analytics for structured and unstructured data

Marylou Orayani, HP

MediaSite

YES

1026*

HP RepSM: combatting persistent adversaries with threat intelligence

Ofer Shezaf, HP

N/A

NO

1027

Compliance and risk management basics

Morris Hicks, HP

MediaSite

YES

1028

Cloud application security you can count on

Raghuram Pamidimarri, HP

MediaSite

YES

1029

Correlating efficiently: tips, techniques, and troubleshooting

Anurag Singla, HP

MediaSite

YES

1032

Growing a mature team: tips for successful security analyst recruitment, assessment, and retention

Colin Henderson, HP

MediaSite

YES

1033

Distributed search and reporting in HP ArcSight Logger

Wenting Tang, HP

MediaSite

YES

1034

From HP ArcSight ESM to express migration

Shadi Badir, HP

MediaSite

YES

1035*

Getting IT operations log management under control

Roopak Patel, HP

N/A

NO

1036

Integrating HP Operations Orchestration business-flow automation capability with HP ArcSight

Dmitry Udalov, HP

MediaSite

YES

1037

Lessons from the trenches: HP ArcSight Logger API after a year

Aaron Kramer, HP

MediaSite

YES

1038*

Leveraging HP ArcSight ESM to respond to breaches

Justin Harvey, HP

 

NO

1039*

Leveraging SmartConnectors in HP ArcSight OM, and NNMi integration

Susan Li, HP

N/A

NO

1042

Plug it in!

Doron Keller, HP

MediaSite

YES

1043

Security maturity: measuring the effectiveness of your SOC

Nick Essner, HP

MediaSite

YES

1044

SOC use cases: insider threats, malware detection, and operational metrics

Emilio Santiago, HP

MediaSite

YES

1045*

The continuing evolution of the HP ArcSight CORR-Engine

David Wiser, HP

N/A

NO

1046

Training your analysts: tips for a more effective SOC

Steven Wimmer, HP

MediaSite

YES

1047

Advanced correlation skills on demand

Thomas Daquino, HP

MediaSite

YES

1048

Understanding insider threats

Randy Holloway, HP

MediaSite

YES

1049

Using HP ArcSight Compliance Insight Packages for continuous compliance

Omer Felder, HP

MediaSite

YES

1050

Who, what, when, where, why—wiki

Colin Henderson, HP

MediaSite

YES

1054

Keeping your ears open to social networks with ESM

Pete Babcock, USAA

MediaSite

YES

1055

Next-generation malware prevention

Ricky Allen, Critical Start

MediaSite

YES

1057

To escalate or not to escalate…that is the question.

John Bradshaw, Mandiant

MediaSite

YES

1073

Cloudwatching: adding IaaS monitoring to your HP ArcSight deployment

Damian Skeeles, HP

MediaSite

YES

1077

HP ArcSight ESM database performance from the bottom up

Kerry Adkins, HP

MediaSite

YES

1079

HP ArcSight for SAP: protect the integrity of your SAP business applications

Ben Anderson, Deloitte

MediaSite

YES

1085

Constructing meaningful use cases in ESM

John Stoner, HP

MediaSite

YES

1096

Assigning information to monitored environments with ESM

Fabian Libeau, HP

MediaSite

YES

1099

Information security continuous monitoring: what it is and how to achieve it

Stephen Caimi, HP

MediaSite

YES

1108*

Managing business risks using HP ArcSight and HP EnterpriseView

Joshi Harshul, PwC

N/A

NO

1132*

Innovating correlations to guard against the web threats that really matter

Ofer Shezaf, HP

N/A

YES

1134

Threat identification through context in SIEM

David Swift, Accuvant

MediaSite

YES

1135*

Cyber security—an ex-CISO's experiences and lessons learned

Richard Dorough, PwC

N/A

 

1136

Real-time privileged identity monitoring and compliance        

Richard Weeks, Cyber-Ark

MediaSite

YES

1137*

Employing advanced analytics to improve security operations

Ryan LaSalle, Accenture

N/A

NO

1138

Eight advanced persistent threat (APT) solutions from the field

Milo Petrovic, Deloitte

MediaSite

YES

1139

Virtualization security for the changing threat landscape

Partha Panda, Trend Micro

MediaSite

YES

 

 

Enterprise 2020 Security

 

 

2000

Top IT trends and their impact on security

Shannon Lake, Intact-Tech

MediaSite

YES

2001

Security and data privacy for healthcare

Kerry Matre, HP

MediaSite

YES

2002*

HP EnterpriseView deep dive

Michi Kossowsky, HP

N/A

NO

2003

Model-oriented risk management

Eliav Levi, HP

MediaSite

YES

2005

Black cat or white cat: how to fight advanced hacking

Ofer Shezaf, HP

MediaSite

YES

2006

Data security principles that have stood the test of time

Jeff Kalibjian, HP

MediaSite

YES

2007

HP 2011 Cyber Security Risks Report

Orion Suydam, HP

MediaSite

YES

2008

A smarter arms race: intelligence-driven security

Marc Eisenbarth, HP

MediaSite

YES

2009

Reputation, attribution, and deterrence: the next chapter in network defense

Marc Eisenbarth, HP

MediaSite

YES

2010

Social networking risks in enterprise environments

John Pirc, HP

MediaSite

YES

2028

Emerging threats and trends

Richard Armstrong, HP

MediaSite

YES

2034

Using HP Enterprise Security solutions to protect your business

Ernest Dunn, Presidio

MediaSite

YES

2035

Verifiable Security—beyond penetration testing towards a resilient enterprise

Rafal Los, HP

MediaSite

YES

2036

Defend against cyberattacks by Anonymous

Jason Lancaster, HP

MediaSite

YES

2039*

Crossing the security Rubicon: a transformation in risk management

Michael Callahan, HP
George Turrentine, Verizon
Misbahuddin Syed, Fannie Mae
Keith Duemling, Lake Health
John South, Heartland Payment Systems
Christopher Kaija, Lake Health

N/A

NO

Application Security

 

 

3000

Extending HP Fortify SCA with HP ALM

Tim Taels, CTG Belgium

MediaSite

YES

3001

Software vulnerabilities go mobile

Abraham Kang, HP

MediaSite

YES

3002

Cloud-based security testing: incorporating security assessments into the software development lifecycle

James Lynn, HP

MediaSite

YES

3003

SAP: Augmenting Fortify SCA with newly uncovered vulnerabilities

Carsten Huth, HP

MediaSite

YES

3004

Mobile application testing 101

Bucky Spires, HP

MediaSite

YES

3005

Real-world XSS

Daniel Miessler, HP

MediaSite

YES

3006

Secure software during development

Erik Costlow, HP

MediaSite

YES

3007*

Web security scanning in the post-Web 2.0 world

Kirill Mendelev, HP

 

NO

3022

Static and dynamic security testing: exploring better together

Brian Miller, HP

MediaSite

YES

3023

Bringing security scanning into the QA process

John Bell, Delta Airlines

MediaSite

YES

3024

Using HP Fortify Software Security Center to build application security into your SDLC

Tim Chase, Nielsen

MediaSite

YES

Payment and Data Security

 

 

4003

Creating a high-availability key-management service for your enterprise

Steve Wierenga, HP

MediaSite

YES

4005

Electronic payments: the benefits and risks of payment technologies

Larry Hines, HP

MediaSite

YES

Network Security

 

 

5000

Understanding vulnerabilities to better mitigate threats

Steve Povolny, HP

MediaSite

YES

5002

Battling bots in your network

Patrick Hill , HP

MediaSite

YES

5004

Challenges with PCI-DSS compliance and security in the cloud

Rick Norman, Coalfire
Sanja Raja, HP

MediaSite

YES

5005

The HP firewall vision: embracing next-generation technology

Adam Hils, HP

MediaSite

YES

Tech Talk

 

 

TT100

Dynamic event schemas in HP ArcSight ESM

Dhiraj Sharan, HP

N/A

YES

TT101

Enhance security monitoring in three easy ways

Vijay Gupta, HP

N/A

YES

TT102

Monitor smart meters using domains

Aravind Mudunuri, HP

N/A

YES

TT103

Logger schema extensibility

Steve Carlin, HP

N/A

YES

TT104

Categorization and AUP updates: what, why, and how

Aleksey Suvorov, HP

N/A

YES

TT105

Enriching your own ESM content using Reputation Security Monitor v1

Doron Keller, HP

N/A

YES

TT106

Monitoring connector appliances and loggers using SNMP

Lee-Lan Yip, HP

N/A

YES

TT107

Logger 5.2 dashboard drill down

Masaki Utsumiya, HP

N/A

YES

TT108

HP ArcSight ESM with Oracle 11g database

Swarna Dandapani, HP

N/A

YES

TT109

Pattern discovery tips and tricks

Zhipeng Zhao, HP

N/A

YES

TT110

WUC tuning analysis tool

Tatyana Merzlyak, HP

N/A

YES

TT111

Common use cases for utilizing Web Service API of API of ESM

Fei Gao, HP

N/A

YES

TT112

Logger summary data

Selina Zhang, HP

N/A

YES

TT200

Risky business–driving informed decision making with HP EnterpriseView

Colin Henderson, HP

N/A

YES

TT201

Architecture review

Tracy Barella, HP

N/A

YES

TT202

Wiki what?

Brandie Anderson, HP

N/A

YES

TT203

Has your SOC matured?

Rob Sandoval, HP

N/A

YES

TT204

HP Fortify in the cloud

Jack Bishop, HP

N/A

YES

TT205

One size doesn't fit all: customized training

Khalid Shaikh, HP

N/A

YES

TT206

Solution building by example

Keith Stover, HP

N/A

YES

TT207

HP ArcSight esm healthcheck

Tracy Barella, HP

N/A

YES

TT208

HP Fortify on demand

James Lynn, HP

N/A

YES

TT209

Using ESM plugins

Ashwin Aruldas, HP

N/A

YES

TT210*

Stories of HP ArcSight greatness

Justin Harvey, HP

N/A

NO

TT211

SIEM—now what?

Emilio Santiago, HP

N/A

YES

Attachments

    Outcomes