You’ve taken the steps to invest in a SIEM — now it’s time to make sure you’re reaping the rewards.
A SIEM that sits in your environment collecting proverbial dust won’t generate the ROI that you’re looking for. Not only is it an annoyance to security and IT teams, but it’s a waste of valuable budget and resources for the C-suite.
But that doesn’t have to be the case. Join Blumira's Amanda Berlin, Lead Incident Detection Engineer, and Nato Riley, Integrations Engineer, to learn how to sink as few resources into a SIEM as possible while still meeting your organization’s security or compliance goals.
You’ll learn about:
This interactive, conversational-style session encourages questions and engagement with viewers – so sign up today for access to our security experts.
Based in Ohio, Amanda is a highly accomplished network defender well-regarded throughout the Midwest infosec community. She’s spent the last three years with NetWorks Group’s MDR team and Blumira, while most recently as a Sr. Incident Detection Engineer specializing in threat detection research as well as SecOps. Amanda serves as the founder and CEO of Mental Health Hackers, a nonprofit dedicated to providing education and guidance to tech workers around mental health topics. Amanda is also the co-host of the Brakeing Down Security podcast. She is the author of a Blue Team best practices book called “Defensive Security Handbook: Best Practices for Securing Infrastructure” with Lee Brotherston through O’Reilly Media.
Nato Riley, Integrations Engineer, Blumira
Nato is dedicated to helping Blumira build the most effective and efficient SIEM on the market for small to mid-sized businesses. Prior to joining Blumira, he held roles at LogRhythm and Data Network Group. Other ventures include notiaPoint, Inc., where Nato invented the Olympiad, a toolbox that makes large scale projects and deployments for cloud development projects more secure and agile. In his spare time, Nato runs a YouTube channel, Nato as Code, where he discusses topics such as infrastructure as code and building a cybersecurity career.