[Pikes-peak-pm] [Fwd: UG News - O'Reilly Webcast - Top Five Log Analysis Mistakes]

Tim Chambers timc+perl at divide.net
Thu May 22 21:39:42 PDT 2008


Does anyone object to me passing these blubs along?

-- Tim

-------- Original Message --------
Subject: 	UG News - O'Reilly Webcast - Top Five Log Analysis Mistakes
Date: 	Tue, 20 May 2008 16:48:35 -0700
From: 	Marsee Henon <webcast at oreilly.com>
To: 	timc+pppm+oreilly at divide.net



If you cannot read the information below, click here 
<http://oreilly.com/emails/webcast-warrior2.html>.

webcast lead graphic
You are invited to a free webcast:
The Top Five Log Analysis Mistakes

DATE
Tuesday,
May 27

TIME
10:00am PDT
(17:00 GMT)

HOW TO JOIN
Register Now <http://oreilly.com/go/webcast-warrior>
*Register Now* <http://oreilly.com/go/webcast-warrior> and we'll send 
you a reminder!

Meeting link: *oreilly.com/go/webcast-warrior* 
<http://oreilly.com/go/webcast-warrior>
Teleconference dial-in:
*East Coast US:* +1 617 231-0350 and pin 8136507
*West Coast US:* +1 213-455-0500 and pin 8136507

WEBCAST
The Top Five Log Analysis Mistakes

PRESENTER
Anton Chuvakin

The Book
Security Warrior <http://www.oreilly.com/catalog/9780596005450/>
*Security Warrior* <http://www.oreilly.com/catalog/9780596005450/> --- 
Covering everything from reverse engineering to SQL attacks, and 
including topics like social engineering, antiforensics, and common 
attacks against UNIX and Windows systems, this book teaches you to know 
your enemy and how to be prepared to do battle. *Learn more.* 
<http://www.oreilly.com/catalog/9780596005450/>

In this live webcast, security expert Anton Chuvakin will cover 
operational security challenges that organizations face while deploying 
log and alert collection and analysis infrastructure. The talk will 
center around the common mistakes organizations may make in that 
process, which include not storing logs long enough, not preserving the 
forensic quality of the logs, only looking for known bad records, and 
others. Learn how to avoid these and other mistakes and how to get the 
most value out of various log files, generated by systems, applications 
and security devices.

Attendance is limited, so register now. 
<http://oreilly.com/go/webcast-warrior> We'll send you a reminder before 
the webcast. And please feel free to share this invitation with others.

*Date:* Tuesday, May 27 at 10am PDT (17:00 GMT)
*Cost:* Free
*Duration:* 45 minutes
*Meeting link:* oreilly.com/go/webcast-warrior 
<http://oreilly.com/go/webcast-warrior>
*Teleconference dial-in:*
(select the number that is closest to your location)
East Coast US: +1 617 231-0350 and pin 8136507
West Coast US: +1 213-455-0500 and pin 8136507
*Questions?* Please send email to webcast at oreilly.com 
<mailto:webcast at oreilly.com>


      About Anton Chuvakin

Dr Anton Chuvakin is a recognized security expert and book author. His 
current role is Chief Logging Evangelist with LogLogic, a log management 
company. He is an author and contributor to several security books 
including "Security Warrior 
<http://www.oreilly.com/catalog/9780596005450/>", "Know Your Enemy II", 
"Information Security Management Handbook", "Hacker's Challenge 3" and 
"PCI Compliance." Chuvakin has also published numerous papers on 
security issues; he is also an active blogger (see *securitywarrior.org* 
<http://www.securitywarrior.org>) and frequent speaker at security 
conferences. He participates in various security industry initiatives 
and standards organizations.


Available online at http://www.oreilly.com/store/ 
<http://www.oreilly.com/store/>O'Reilly.com <http://www.oreilly.com>
O'Reilly Media, Inc. 1005 Gravenstein Highway North, Sebastopol, CA 
95472   (707) 827-7000
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mail.pm.org/pipermail/pikes-peak-pm/attachments/20080522/e265d4a3/attachment.html 


More information about the Pikes-peak-pm mailing list