Top Threat Monitoring Implementation Strategies
Date: Friday, June 14th at 10 a.m. PT / 1 p.m. E.T.
Addressing 24/7 threats with 24/7 vigilance
You have heard why you must proactively monitor, detect, deter, defend, remediate, and protect against various threat risks. Now it's time to roll up your sleeves, dig in, unpack, right-click, and look at multiple approaches and top threat monitoring strategies for SMBs and Enterprises. What are some options, pros, cons, and gotchas, and where and how to implement an effective monitoring strategy to improve your security posture and enable good data infrastructure hygiene?
Join Greg Schulz, Author, founder, and Sr. Analyst of Server StorageIO and Microsoft MVP (CDM), as he discusses top threat monitoring implementation strategies. Greg will discuss industry trends, technologies and techniques, best practices, and implementation strategies.
What you will learn:
- Leveraging automated intelligence, MDR and other technologies
- Wizards, assessment, health check, and reporting tools
- Role of AI for anomaly detection, notification, remediation
- Where and what to monitor, from on-prem, core, edge to cloud
- Best practices, tips, and recommendations
Here is the AGENDA for the summit:
9 a.m. PT / 12 noon ET
Detect Early and Detect Often: The Case for Threat Monitoring
10 a.m. PT / 1 p.m. ET
Top Threat Monitoring Implementation Strategies
11 a.m. PT / 2 p.m. ET
Threat Monitoring Toolkit: Best Third-Party Solutions
About the presenter:
Greg Schulz, Founder and IT Analyst, Server StorageIO
Greg has worked as the customer in various IT organizations in different roles, as well as a vendor, consulting analyst and author of several books including “Software-Defined Data Infrastructure Essentials” (CRC Press). Greg brings a diverse background with real world perspective across applications, data infrastructures, hardware, software, and clouds. Greg is a Microsoft MVP Cloud Data Center Management and previous ten-time VMware vExpert
Register now!