Event Log Managment

Logs .. Logs and More Logs

Webinar and Training Video links

A few days ago I was asked by a customer if I had links to all of the webinars and training videos that I put togther or been apart off.  So I have started to put together that list.  The first group is for webinars hosted on the LogRhythm website; the 2nd group are webinars that I have conducted with Randy F. Smith and hosted at UltimateWindowsSecurity.com; the last group is a webinar I did for WhiteHat World.  As I conduct more webinars and training sessions I will add them to the list.

LogRhythm

Sept 15, 2011

HIPAA & HITECH Act | Get ready for Tougher Privacy, Security Rules and Enforcement

Prism Microsystems

**Feb 14, 2011; Do to some unforseen issues at Prism I can no longer in good faith promote their product or services and I have removed all links to their website.

Ultimate Windows Security

Hosted By Randy F. Smith

December 2, 2010

5 Real World Ways to Use Anomaly Detection with Security Logs

November 11, 2010

Auditing IIS with the Windows Security Log

October 14, 2010

Building a Security Dashboard for Your Senior Executives

June 30, 2010

Taming SharePoint Audit Logs with LOGbinder SP and EventTracker

June 23, 2010

Top 5 Daily Reports for Monitoring Windows Servers

May 6, 2010

Configuring Windows Audit Policy to Minimize Noise: Provide Compliance, Support Forensics and Detect Intrusions

March 4, 2010

Security Log Exposed: Auditing Changes, Deletions and Creations in Active Directory

February 4, 2010

Insider Gone Bad: Tracking Their Steps and Building Your Case with the Security Log

October 1, 2009

Security Log Exposed: What is the Difference Between “Account Logon” and “Logon/Logoff” Events?

July 23, 2009

Using Windows Server 2008’s New Log Management Features: Archival, Forwarding, Views and Triggers

May 14, 2009

Top 9 Ways to Detect Insider Abuse with the Security Log

March 19, 2009

Leveraging the XP and Vista Security Logs to Ensure Workstation Security and Compliance

January 20, 2009

Anatomy of a Hack: Tracking an Intruder with Security Logs

WhiteHat World

February 10, 2009

Security Beyond the Windows Event Log – Monitoring Ten Critical Conditions

Advertisements

July 1, 2010 Posted by | Webinars | , | Leave a comment