Session Title | SIEM (not only) for security
General SIEM overview, what is the purpose of the system, What we think is missing? Typical sources overview, Use cases for regular security, and Adding new scope for the data. Use cases: SLA management, IOC Correlation and dashboarding among sources Building up IT data warehouse Asset management OS inventory Application management Creating CMDB Possible integrations
Experienced IT specialist and specialist in the field of IT systems security and monitoring of their stability. Has many years of experience in improving system monitoring tools, specializes in both administration and servicing of Splunk and Elasticsearch, carries out implementation projects of Log Management and SIEM class systems.