HP Protect 2015 (zip file of all presentations from Day 1, 2, and 3)

Document created by grace.chang on Sep 8, 2015Last modified by grace.chang on Oct 2, 2015
Version 1Show Document
  • View in full screen mode

All presentations from Day 1, 2, and 3.

 

 

Session TitleFirst NameLast NameTrack
B2238Identifying slow and low reconnaissance before it becomes an APTMichaelAmbrosioHP ArcSight
B2250Integrating external threat intelligence into HP ArcSight ESM 6.8cscottsattlerHP ArcSight
B2307Six-step approach to enhance SOC security intelligence - a du Telecom case studyTamerEl BaheyHP ArcSight
B2308Get 360 degrees view of du Telecom's state-of-the-art SOCTamerEl BaheyHP ArcSight
B2308Get 360 degrees view of du Telecom's state-of-the-art SOCIbrahimAl MallouhiHP ArcSight
B3444Saved or sabotaged: 20 billion components in your software supply chainDerekWeeksHP Fortify
B3478A picture is worth a thousand events – leveraging the HP ArcSight Logger 6 APIRichardHopeHP ArcSight
B3558Using Windows Event Forwarding with Windows Native and Unified SmartConnectorsSteveMaxwellHP ArcSight
B3582Integrating HP ArcSight ESM with HP Service ManagerRayCottenHP ArcSight
B3585Learn how to build HP ArcSight use casesRayCottenHP ArcSight
B3622Real-time risk determination of an ongoing cyber-attackArunWarikooHP ArcSight
B372510 quick win industry agnostic SIEM dashboardsCraigBowserHP ArcSight
B3733CISO panel - advanced security analytics use casesSachinNayyarHP ArcSight
B3733CISO panel - advanced security analytics use casesIgorBaikalovHP ArcSight
B3745Machine learning for securityJosiahHagenHP TippingPoint
B3747Dynamic identification of applications based on protocol transitionsVibChhabraHP TippingPoint
B3756Migrating an HP Fortify environment – from messy to clean, a three-month endeavorBrentonWitonskiHP Fortify
B3761Mitigating malware with DVToolkitMatPowellHP TippingPoint
B3763I didn't know HP Fortify WebInspect could do thatMattFisherHP Fortify
B3770DNS analytics - finding infected hosts within large enterprise networksGilbertMesecHP ArcSight
B3770DNS analytics - finding infected hosts within large enterprise networksMarcoCasassa MontHP ArcSight
B3791Tales from the field - SOC maturity and new TTPs for advanced SOC operationsBruceOehlerHP ArcSight
B3819Wisdom of crowd-sourced threat intelligenceOferBachnerHP ArcSight
B3819Wisdom of crowd-sourced threat intelligenceEladCohenHP ArcSight
B3823How to track McAfee ePO virus definitions on point-of-sale terminals and other endpointsGeorgeBoitanoHP ArcSight
B3825Automating common event handling tasks using the ActionConnectorGeorgeBoitanoHP ArcSight
B3830Malicious web sites - not just for proxy logs any moreEricWadlinHP ArcSight
B3838Early and whole lifecycle software security - why starting with source code isn’t enoughJohnDiamantHP Fortify
B3843Army of Loggers - searching for that needle at billions of EPSDamianSkeelesHP ArcSight
B3847Cloud connected SIEM - erasing borders between HP ArcSight ESM and Qualys Vulnerability & Compliance suiteAndriiBezverkhyiHP ArcSight
B3849How to get the best value out of your HP ArcSight SIEM investmentsTammyTorbertHP ArcSight
B3852Altering the threat landscape - impact and trends of the HP Zero Day InitiativeBrianGorencHP TippingPoint
B3853LNKing the past to the present – the curious case of CVE-2010-2568 and CVE-2015-0096DaveWeinsteinHP TippingPoint
B3854Assembling an HP ArcSight dream team - how a small group of skilled security professionals can build an enterprise-level…ThomasPaceHP ArcSight
B3854Assembling an HP ArcSight dream team - how a small group of skilled security professionals can build an enterprise-level…RichardTeepleHP ArcSight
B3855Building a secure mobile development lifecycle - a success storyRayKellyHP Fortify
B3855Building a secure mobile development lifecycle - a success storyRajRajagopalanHP Fortify
B3859Reach for the clouds - how to get the most from the newest HP Fortify on Demand capabilitiesDylanThomasHP Fortify
B3859Reach for the clouds - how to get the most from the newest HP Fortify on Demand capabilitiesBenTraynorHP Fortify
B3866Principle and practice - making continuous diagnostics and mitigation workJeffKalibjianHP TippingPoint
B3866Principle and practice - making continuous diagnostics and mitigation workGeorgeRomasHP TippingPoint
B3866Principle and practice - making continuous diagnostics and mitigation workPeteSchmidtHP TippingPoint
B3869Which hostile countries are talking to your protected assets?AparnaVaranasiHP ArcSight
B3869Which hostile countries are talking to your protected assets?OswaldoDimasHP ArcSight
B3869Which hostile countries are talking to your protected assets?YunPengHP ArcSight
B3869Which hostile countries are talking to your protected assets?DatNguyenHP ArcSight
B3870HP ArcSight network model automationJoePartlowHP ArcSight
B3877The journey to a true enterprise software scanning capabilityMichaelPapayHP Fortify
B3878Enhancing the security of a software-defined data center across private, public or hybrid cloudsParthaPandaHP ArcSight
B3879Targeted attack! A real-time simulation video exerciseBobCorsonHP TippingPoint
B3888HP ArcSight integration to a case management solution – a customer case studyJosephLovelandHP ArcSight
B3895Stunning visualization for your security events of HP ArcSight SIEM through Interactive DiscoveryBrianWolffHP ArcSight
B3895Stunning visualization for your security events of HP ArcSight SIEM through Interactive DiscoveryPaulCarmanHP ArcSight
B3896How to create your own custom parsers and parser overridesDonSlifeHP ArcSight
B3896How to create your own custom parsers and parser overridesJarrodEcholsHP ArcSight
B3904HP ArcSight network modeling - beyond the runwayJarrodEcholsHP ArcSight
B3904HP ArcSight network modeling - beyond the runwayDonSlifeHP ArcSight
B3908Identifying cyber key terrain using HP ArcSightRayMooreHP ArcSight
B3909What it takes to protect your apps - a journey through and beyond the SDLCBarakRazHP Fortify
B3909What it takes to protect your apps - a journey through and beyond the SDLCSasi SiddharthMuthurajanHP Fortify
B3914Load balancing solutions for SmartConnectorsGaryMaxeyHP ArcSight
B3914Load balancing solutions for SmartConnectorsNanjooBanHP ArcSight
B3919Progress report: State of Minnesota implements HP ArcSight Activate FrameworkPrenticeHayesHP ArcSight
B3919Progress report: State of Minnesota implements HP ArcSight Activate FrameworkPhilJorgensenHP ArcSight
B3919Progress report: State of Minnesota implements HP ArcSight Activate FrameworkChrisMickelsonHP ArcSight
B3920Logger momentum - new capabilities in HP ArcSight Logger 6.1MojFarhangianHP ArcSight
B3921Benefit from the first security SaaS to achieve FedRAMP authorizationEricAdamsHP Fortify
B3921Benefit from the first security SaaS to achieve FedRAMP authorizationBrooksGarrettHP Fortify
B3923Scale your HP ArcSight deployment through virtualizationPaulHusarikHP ArcSight
B3923Scale your HP ArcSight deployment through virtualizationRogerCollinsHP ArcSight
B3923Scale your HP ArcSight deployment through virtualizationScottMurrayHP ArcSight
B3925HP ArcSight ESM - what's new and what's cookingSureshVenkataramanHP ArcSight
B3926Monitoring anomalous activities of the privileged – uncovering UBA use cases in ESMTimWenzlauHP ArcSight
B3927Manage users centrally through HP ArcSight Management Center - work smart and play hardSarwatAleemjeeHP ArcSight
B3927Manage users centrally through HP ArcSight Management Center - work smart and play hardSimranBrarHP ArcSight
B3928EMV chip migration - countdown to the liability shiftMattLandrockHP Atalla and HP Security Voltage
B3930Intralinks’ HP ArcSight Connector - securing and monitoring content beyond the firewallMushHakhinianHP ArcSight
B3934Managing an army of loggers made easy!SnehalAdlingeHP ArcSight
B3934Managing an army of loggers made easy!JessielyJuachonHP ArcSight
B3942Reduce false positives through endpoint telemetry to supplement event dataPaulShomoHP ArcSight
B3943The right HP ArcSight management tools help you get the job done simply and effectivelyMadhuraChopdaHP ArcSight
B3943The right HP ArcSight management tools help you get the job done simply and effectivelyVictorLeeHP ArcSight
B3948Get the most out of HP ArcSight SIEM from a managed service provider expertBryanBorraHP ArcSight
B3949Secure ABAP development – one bug is enough to put your application at riskPatrickHildenbrandHP Fortify
B3950Hacking the money machineAnthonyPolzineHP ArcSight
B3952The state of the cyber-threatSharonVardiHP ArcSight
B3952The state of the cyber-threatChrisInglisHP ArcSight
B3953CISO panel - user behavior analytics deep-dive and use casesStewartDraperHP ArcSight
B3953CISO panel - user behavior analytics deep-dive and use casesIgorBaikalovHP ArcSight
B3960Implementing software security in a joint internal and external contractor-based environmentScottSnowdenHP Fortify
B3962Maslow's hierarchy of security monitoringJosephBonnellHP ArcSight
B3962Maslow's hierarchy of security monitoringSriKadatiHP ArcSight
B3964Combat targeted attacks with the HP TippingPoint Advanced Threat AppliancePatrickHillHP TippingPoint
B3967Open-source fairy dustJohnMenerickHP Fortify
B3972Are you a smart connector?MarkUlmerHP ArcSight
B3973Find the hackers in your system landscape with SAP Enterprise Threat DetectionJürgenAdolfHP ArcSight
B3981Deep-dive regex parser development demoChristopherSchaferHP ArcSight
B3995Build a highly available HP ArcSight architectureBrendanColfordHP ArcSight
B3995Build a highly available HP ArcSight architectureMichaelLoyHP ArcSight
B4005Crypto manifesto 2015YekaterinaO'NeilHP Fortify
B4005Crypto manifesto 2015AlvaroMunozHP Fortify
B4007Securing vulnerable payment systems from sophisticated attacksPhilSwellHP Atalla and HP Security Voltage
B4007Securing vulnerable payment systems from sophisticated attacksMarkBowerHP Atalla and HP Security Voltage
B4008Data protection with whole-stack encryption solutionsSteveWierengaHP Atalla and HP Security Voltage
B4008Data protection with whole-stack encryption solutionsTerenceSpiesHP Atalla and HP Security Voltage
B4009Collaboration security - classifying and protecting unstructured data across the enterprise, in the cloud and integrated…AshishKarHP Atalla and HP Security Voltage
B4009Collaboration security - classifying and protecting unstructured data across the enterprise, in the cloud and integrated…ChrisGriffithHP Atalla and HP Security Voltage
B4009Collaboration security - classifying and protecting unstructured data across the enterprise, in the cloud and integrated…MichaelNicosiaHP Atalla and HP Security Voltage
B4019Hit the security trifecta by leveraging HP detection, enforcement and intelligenceTJAlldridgeHP TippingPoint
B4020Best practices to improved protection from advanced threatsTJAlldridgeHP TippingPoint
B4024HP Fortify performance guideSimonCorlettHP Fortify
B4026Giving your AppSec program the edge - using OpenSAMM for benchmarking and software security improvementBruceJenkinsHP Fortify
B4026Giving your AppSec program the edge - using OpenSAMM for benchmarking and software security improvementJohnDicksonHP Fortify
B4029Higher-order analysis in HP Fortify SCAShuyingLiangHP Fortify
B4029Higher-order analysis in HP Fortify SCAScottBursonHP Fortify
B4030Reduce the complexity of enterprise security through a new approach – security control planeGerardGaglianoHP ArcSight
B4030Reduce the complexity of enterprise security through a new approach – security control planeRichardFeezelHP ArcSight
B4044Application Security Analytics - Increase Scan Result Accuracy to Establish, Accelerate, or Scale Your AppSec ProgramEmilKinerHP Fortify
B4045Establishing and maturing an enterprise SSA program - objectives, challenges, solutions and prioritiesAkshaySivandaHP Fortify
B4078A treatise on transparency - an open look behind the curtain of the HP Security Research teamJewelTimpeHP TippingPoint
B4096Innovating an established software security program at SAPCarstenHuthHP Fortify
B4098Continuous monitoring - a hacker’s view of your internet security postureDanielMiesslerHP Fortify
B4098Continuous monitoring - a hacker’s view of your internet security postureSasaZdjelarHP Fortify
B4102Evolution of a Security Operations Center (SOC) - moving beyond monitoringKeithDuemlingHP ArcSight
B4109Intrusion detection, prevention and monitoring across IT and ICS systemsZhi XiangLinHP TippingPoint
B4109Intrusion detection, prevention and monitoring across IT and ICS systemsDonTobinHP TippingPoint
B4110State of security operations - maturity and capabilities 2015 reportRobertoSandovalHP ArcSight
B4111CISO panel - what CISOs expect from the security operations organizationJesseEmersonHP ArcSight
B4112Panel Discussion on Building a hunt team through real-world case studiesChrisCalvertHP ArcSight
B4112Panel Discussion on Building a hunt team through real-world case studiesMarcelHoffmannHP ArcSight
B4112Panel Discussion on Building a hunt team through real-world case studiesDougHeltonHP ArcSight
B4112Panel Discussion on Building a hunt team through real-world case studiesMitchWebbHP ArcSight
B4113HP ArcSight ESM health checkTracyBarellaHP ArcSight
B4121Collaboration security - keeping your data and applications safe in the cloudChrisGriffithHP Atalla and HP Security Voltage
B4121Collaboration security - keeping your data and applications safe in the cloudFarshadGhaziHP Atalla and HP Security Voltage
B4122The challenge of securing Big Data due to its broader attack vectorsReinerKappenbergerHP Atalla and HP Security Voltage
B5237Data security case study - Allegiant TravelChrisGullettHP Atalla and HP Security Voltage
B5251How to make the threat of data theft irrelevantAkiElderHP Atalla and HP Security Voltage
B5251How to make the threat of data theft irrelevantMauricioGuerraHP Atalla and HP Security Voltage
B5252HP TippingPoint – in-line IPS or network security Swiss army knife?KarloArozquetaHP TippingPoint
B5256Learn big data collection and analytics strategy from MicrosoftJennLeMondHP ArcSight
B5257Aruba Networks and HP ArcSight for wired and wireless access controlDannyJumpHP ArcSight
B5258Red team, blue team - Joint Users Interoperability Communications Exercise case studyAdamHallHP TippingPoint
B5298Swiss Railways stays on track with HP TippingPoint IPSErwinJudHP TippingPoint
B5301Z_1test Philippa MarsHP ArcSight
B5374z_1 Test BreakoutMegz_1OBWebEvents Global SessionGeneral
B5390Learn from Microsoft how to forward Windows events into HP ArcSight at an enterprise scaleRinUreMicrosoftHP ArcSight
B5393Secure your HP Helion OpenStack deployment with virtualized IPS/NGFW network protectionRussellMeyersHPHP TippingPoint
B5655End-of-support operating systems and the virtual patch - patching a vulnerability at the network levelStevePovolnyHPHP TippingPoint
B5662Introduction to Aruba ClearPass for secure network accessTrentFierroHP Aruba NetworksAruba Networks
B5663Solving today’s network access security challengesMadaniAdjaliHP Aruba NetworksAruba Networks
B5664Fundamentals of security and policy management for mobile devicesNeelaSanbandamHP Aruba NetworksAruba Networks
B5665Enabling enterprise security policy on HP ProVision switches with ClearPassAustinHawthorneHP Aruba NetworksAruba Networks
B5666Deploying government network access security for mobilityJohnGarsideHP Aruba NetworksAruba Networks
B5696Virtual patching in the modern data center and cloudAndrewCaldwellTrend MicroSponsor
B5697Defeating anti-forensics; supplementing log files with kernel level artifactsPaulShomoGuidance SoftwareSponsor
B5698User Behavior Analysis for proactive visibility and actionable insights into cyber risk and cybersecurity threatsHumphreyChristianBay DynamicsSponsor
B5699Neutralizing breaches by using a data-centric approach to encryptionDerekHanDeloitte AdvisorySponsor
B6230Protecting assets when the corporate network is obsoleteMarkMooreDeloitte AdvisorySponsor
B6231Securing content beyond the firewallMushHakhinianIntralinksSponsor
B6232Cyber-defense in the digital eraHarpreetSidhuAccentureSponsor
B6233Applied  User Behavior AnalyticsIgorBaikalovSecuronixSponsor
B6254Rugged DevOps - continuous security “takes a village”JoshuaCormanSonatypeHP Fortify
B6258Extending the power of fail2ban with HP Threat CentralAmirKibbarHP ESPHP ArcSight
B6260SAP security - how to steal a million dollars and get away with itErtungaArsalESNC - Enterprise Security and ComplianceHP ArcSight
GS5667Strength in numbersGeneral
PT6234Automate incident response with HP ArcSight and EnCase Endpoint SecurityAnthonyDiBelloGuidance SoftwareSponsor
PT6235Airplanes – are they hackable?AliSuraniProtivitiSponsor
PT6236The mobility of vulnerabilitiesAnthonyPolzineProtivitiSponsor
PT6237Insider threats – malice, mistakes and mountain lionsMichaelRuttyVaronisSponsor
PT6238User Behavior Analysis for proactive visibility and actionable insights into cyber risk and cybersecurity threatsRyanStolteBay DynamicsSponsor
PT6239The latest trends in POS hacksAndrewCaldwellTrend MicroSponsor
PT6240Advanced privacy and fraud monitoring using TAP (part 1 of 2)AliKhanDeloitte CanadaSponsor
PT6240Advanced privacy and fraud monitoring using TAP (part 1 of 2)UmangHandaDeloitte CanadaSponsor
PT6241Advanced privacy and fraud monitoring using TAP (part 2 of 2)AliKhanDeloitte CanadaSponsor
PT6241Advanced privacy and fraud monitoring using TAP (part 2 of 2)UmangHandaDeloitte CanadaSponsor
PT6242Data sovereignty in the cloudToddPartridgeIntralinksSponsor
PT6249Graphing user behaviorsMatthewCarverAccenture Technology LabsSponsor
PT6249Graphing user behaviorsLouisDiValentinAccentureSponsor
PT6250Maximizing the value of your HP Security Voltage investment across the sensitive data landscapeMirKashifuddinPwCSponsor
PT6251Detecting the outliers with HP ArcSight UBAColinHendersonPwCSponsor
PT6252Building an insider threat programStewartDraperSecuronixSponsor
PT6279Disrupt advanced threatsRichardArchdeaconHPSponsor
PT6280Stay out of the news!ChrisLeachHPSponsor
TK4006Eliminating breach catastrophes - how data-centric security protects your most sensitive dataAlbertBiketiHPHP Atalla and HP Security Voltage
TK52647 (plus 1) habits of successful application security programsTySbanoCapital OneHP Fortify
TK52647 (plus 1) habits of successful application security programsRayStiribeiRalph LaurenHP Fortify
TK52647 (plus 1) habits of successful application security programsJasonSchmittHPHP Fortify
TK5296Fireside chat with HP ArcSight leadership on strategy and roadmap for 2016EricSchouHewlett-PackardHP ArcSight
TK5296Fireside chat with HP ArcSight leadership on strategy and roadmap for 2016MiguelCarreroHP ESPHP ArcSight
TK5296Fireside chat with HP ArcSight leadership on strategy and roadmap for 2016SteveDyerHP ESPHP ArcSight
TK5296Fireside chat with HP ArcSight leadership on strategy and roadmap for 2016RobertHippsHP ESPHP ArcSight
TK5386The case for actionable threat intelligenceDonClosserHPHP TippingPoint
TK5386The case for actionable threat intelligenceJohnHaberlandQualysHP TippingPoint
TT3562Create custom Windows parsers using HP ArcSightVictorThamHPHP ArcSight
TT3563Cloud access monitoring and security analytics through HP ArcSight and HP AtallaVictorThamHPHP ArcSight
TT3753Logger troubleshooting - learn what's under the hoodMarcinMalickiHPHP ArcSight
TT3811Logger data migration toolMarcinMalickiHPHP ArcSight
TT3812SmartConnector best practiceMoehadiLiangHPHP ArcSight
TT3816Search 1000x faster with HP ArcSight ESM 6.8c – bloom filteringPengfeiLiHP EnterpriseHP ArcSight
TT3818Centralizing threat feeds and intelligence into HP ArcSight ESMOferBachnerHPHP ArcSight
TT3818Centralizing threat feeds and intelligence into HP ArcSight ESMTamirMitelmanHPHP ArcSight
TT3824Powering forward - HP ArcSight in the electric utility industryTomHayesHPHP ArcSight
TT3857Security intelligence resources in ESM – deploying use cases tutorialJavierInclanHP ArcsightHP ArcSight
TT3857Security intelligence resources in ESM – deploying use cases tutorialSureshVenkataramanHP ArcSightHP ArcSight
TT3862Logger API – coexisting in an analytical worldAaronKramerHPHP ArcSight
TT3862Logger API – coexisting in an analytical worldKevinRomeroHPHP ArcSight
TT3867How HP ArcSight categorization can simplify your development of cutting-edge use casesJavierInclanHP ArcsightHP ArcSight
TT3867How HP ArcSight categorization can simplify your development of cutting-edge use casesYunPengArcSightHP ArcSight
TT3867How HP ArcSight categorization can simplify your development of cutting-edge use casesIssaDrammehHP ArcsightHP ArcSight
TT3876Achieving PCI compliance through a strategic application security programSandeepNainHPHP Fortify
TT3891HP ArcSight troubleshooting - understanding the logs through data abstractionBrianFreedmanHPHP ArcSight
TT3892HP ArcSight ESM upgrade and migration best practicesBrianFreedmanHPHP ArcSight
TT3894Looking beyond your network - insights from real-time threat intelligenceGlennWongRecorded FutureHP ArcSight
TT3894Looking beyond your network - insights from real-time threat intelligenceDrewPerryTiberium SecurityHP ArcSight
TT3916Build your own real-time security threat intelligence feedsAmitKhandekarHP ESPHP ArcSight
TT3922Monitoring new devices through HP ArcSight Activate FrameworkPrenticeHayesHPHP ArcSight
TT3922Monitoring new devices through HP ArcSight Activate FrameworkPhilJorgensenState of MinnesotaHP ArcSight
TT3922Monitoring new devices through HP ArcSight Activate FrameworkDebraStaffordMN.IT (State of MN)HP ArcSight
TT3937Common Event Format simplifies custom, in-house applicationsFaridMerchantHewlett PackardHP ArcSight
TT3937Common Event Format simplifies custom, in-house applicationsMorganDerodeffhewlett packardHP ArcSight
TT3937Common Event Format simplifies custom, in-house applicationsMikeWestonHewlett PackardHP ArcSight
TT3939Tools you can use to build a flex connectorFaridMerchantHewlett PackardHP ArcSight
TT3939Tools you can use to build a flex connectorAaronKramerHPHP ArcSight
TT3991Deep dive into patterns and tactics of real-world breachesKenTietjenHPHP ArcSight
TT3992End-to-end use cases with SIEM analyticsBrandieAndersonHewlett-PackardHP ArcSight
TT3996Building high availability for HP ArcSight SmartConnectorsPaulBrettleHPHP ArcSight
TT3997Syslog, the pain and the glory - how to make it work for youPaulBrettleHPHP ArcSight
TT4010PCI, compliance, tokenization and EMV readinessTerenceSpiesHPHP Atalla and HP Security Voltage
TT4011What’s so interesting about a Cloud Access Security Broker (CASB)?ChrisGriffithHPHP Atalla and HP Security Voltage
TT4011What’s so interesting about a Cloud Access Security Broker (CASB)?MichaelNicosiaAdallomHP Atalla and HP Security Voltage
TT4012Collaboration security - achieving end-to-end email security with HP Security VoltageMadhusudhanReddyHP Security VoltageHP Atalla and HP Security Voltage
TT4023How to handle false results from SCAJoshAndersonHP FortifyHP Fortify
TT4046How to start a RASP security initiativeCindyBlakeHPHP Fortify
TT4057Fitting SAST and DAST into DevOpsRickSmithHPHP Fortify
TT4104AppSec in a real-world, automated continuous delivery processAndyEarlehpHP Fortify
TT4114Convergence of physical and cyber securityHP ArcSight
TT4115Top five adversary personas and how they thinkKerryMatreHPHP ArcSight
TT4116Four ways to start hunting todayJeffMcGeeHP ESP PSHP ArcSight
TT4117Eight ways to increase your security workforce by 40%marykarnesHP ESP PSHP ArcSight
TT4117Eight ways to increase your security workforce by 40%KerryMatreHPHP ArcSight
TT4119Five key considerations when running HP ArcSight in the cloudTracyBarellaHPHP ArcSight
TT5254HP WebInspect SDK - learning how to fishSasi SiddharthMuthurajanHPHP Fortify
TT5254HP WebInspect SDK - learning how to fishNidhiShahHewlett PackardHP Fortify
TT5254HP WebInspect SDK - learning how to fishJeremyBrooksHPHP Fortify
TT6261Leveraging HP Threat Central in the investigation process with MaltegoNickBrandsHPHP ArcSight
4 people found this helpful

Outcomes