August 6 at 1pm ET | 10am PT
You finally got your SIEM up and running, but how do you know if it’s actually working and providing real security value to your organization?
Join Sr. Incident Response Engineer Amanda Berlin and VP of Ops Patrick Garrity as they explain common threat detections your SIEM should be identifying and alerting you on.
During this webinar, you’ll learn:
- The top 5 key detections and threats your SIEM should be identifying
- What types of logs you should be sending to your SIEM for these detections
- How to test if your SIEM can detect each threat and what tools/resources we recommend using
- How Blumira’s platform can detect the top 5 threats and enable your team to respond quickly
Amanda Berlin, Sr. Incident Detection Engineer
Based in Ohio, Amanda is a highly accomplished network defender well-regarded throughout the Midwest infosec community. She’s spent the last three years with NetWorks Group’s MDR team and Blumira, while most recently as a Sr. Incident Detection Engineer specializing in threat detection research as well as SecOps. Amanda serves as the founder and CEO of Mental Health Hackers, a nonprofit dedicated to providing education and guidance to tech workers around mental health topics. Amanda is also the co-host of the Brakeing Down Security podcast. She is the author of a Blue Team best practices book called “Defensive Security Handbook: Best Practices for Securing Infrastructure” with Lee Brotherston through O’Reilly Media.
Patrick Garrity, VP of Operations at Blumira
Patrick has years of experience in the security industry building and scaling usable security products. He currently leads Blumira’s product, sales and marketing teams. Prior to joining Blumira, he led sales engineering, product marketing and international expansion for Duo Security.