- About KEYW
There are no scheduled events at this time.
Webinar: Security Information Management: What Cybercriminals Know That You Don’t
Recorded, Thursday, November 8, 2012
Presented by Joe Gottlieb, GM Commercial Division, Sensage (a KEYW company)
Ed Jaehne, Chief Strategy Officer, KEYW
Joe Gottlieb and the executive team for an exclusive customer webcast:
Title: KEYW and Sensage: Learn more
Recorded: September 18th, 2012
Speaker(s): Joe Gottlieb, President and CEO of Sensage
Webinar: The Emerging Metrics-Minded Security Team
Recorded, Thursday, September 13, 2012
Presented by Joe Gottlieb, President and CEO of Sensage
Learning from Logs: SANS 8th Log and Event Management Survey, Part II
On demand webcast - Recorded May 3, 2012
Sponsored by Sensage
Making SIEM work: Processes and policies to enable success
On demand webcast - Recorded Jan 16, 2012
Sponsored by Sensage
Sensage Customer Webcast
Webcast ceremony between a Security Guru and Business Intelligence Quant
Recorded: October 25, 2011
Join Andrew Hay, Senior Analyst for The 451 Group, and Joe Gottlieb, President and CEO of Sensage, as they discuss the bond growing between proactive security practitioners and their Business Intelligence counterparts.
Breaking Down Barriers to Achieve Security, Visibility and Velocity
Recorded August 23, 2011
Presenters McAfee and Sensage
Is your organization one of the 22% minority that achieved a passing grade in Payment Card Industry compliance according to Verizon’s recent report? Or are you a progressive security professional looking to protect your organization from the risks of external and internal security breaches and improve overall governance and compliance? Join Sensage for a webinar that takes a look at how organizations are falling short in their compliance with PCI, especially in the area of measurement, and how they can fix the problem. Understanding PCI compliance helps improve overall security best practices.
Achieving Compliance with the HITECH Act and HIPAA
Recorded, November 16, 2010
This webinar provides a useful overview of the different aspects of the HITECH Act and the impact it will have on organizations trying to comply with the Health Insurance Portability and Accountability Act of 1996 (HIPAA). This information will be helpful to Chief Information Officers, Chief Medical Information Officers, Chief Security Officers, Healthcare Information Managers, Compliance Officers, and anyone concerned with privacy, security and compliance of ePHI.
Leveraging Event Data Warehousing for Security Information Management
Recorded: June 15, 2010
This Sensage webinar explores how data warehousing is enabling new security initiatives and new levels of security intelligence in the enterprise.
The EMC Centera/Sensage Solution is an integrated event data warehouse and storage solution designed for Communications Service Providers (CSPs). It reduces the cost of deployment and ongoing management associated with CDR/IPDR capture, retention, and analysis. View this recorded webcast at EMC.
Companies face a daily barrage of attacks and threats against their data. The risk is immense. A successful attack can lead to loss of business, and especially a loss of trust and reputation.
In this program, leading experts from Gartner and Sensage look at the drivers behind the growing adoption of Security Information and Event Management, the benefits these solutions can yield and, most importantly, how to determine the best solution for your security needs. View this recorded webcast at Accelacast.
Jim Pflaging explains how the SenSage purpose-built data warehouse gives rapid answers from mountains of event-based log data. View this recorded webcast at B-eye-Network.
New European anti-terrorism legislation places a greater burden on telcos and ISPs to retain call records, and to deliver them to the relevant authorities without any undue delay. With Andy Stubley of EMC and Jim Pflaging of Sensage. View this recorded webcast at TelecomTV.
Attack two major IT security burdens at once! Learn how to implement your VISA PCI compliance solution in a manner that also detects sophisticated, low-and-slow, or insider abuse attacks. Overcome event-data management obstacles, and streamline investigation, monitoring and audit processes for the massive volumes of event log data you are required to capture. View this recorded webcast at SANS.
The security team at Premier needed to quickly review log data in detail and store it for a prolonged period of time-something their current solution didn't allow. Though compliance wasn't a factor, the product they purchased helped with audits and pleased their board of directors with the voluntary move to comply with regulations. They also found a vendor that extended itself far beyond its own product to meet the larger customer need. View this recorded webcast at SANS
This Webcast details how to use the power of SIM information gathering and correlation to detect patterns of behavior indicative of insider misuse or attack. View this recorded webcast at SANS
At this webcast, hear Joseph O’Laughlin, Technical Product Marketing Manager from SenSage and Dave Shackleford, SANS Instructor speak to how SIM technology functions, and how these technologies can be used to effectively meet a number of the requirements within the twelve (12) areas of the PCI DSS. View this recorded webcast at SANS