Log Analysis for Breach Prevention

Solutionary's Don Gray on Steps Companies Can Take to Predict Threats
Log Analysis for Breach Prevention
Don Gray
Log analysis is often used for managed security, but are organizations going far enough with the information they have at their fingertips? Don Gray, chief security strategist for Solutionary, says there is much more organizations could be doing to predict breaches.

Most organizations don't understand why they need forensic log analysis, he says. During an interview at the RSA Conference 2014, Gray discusses:

  • The keys to testing incidence response;
  • Differences between malware detection and forensic log analysis; and
  • Why most organizations are failing to adequately use log analysis to prevent breaches.

Gray brings "in-the-trenches" information security experience to his role as chief security strategist for Solutionary, where he leads the security engineering research team. He is a member of the NTT Group security research team, and is directly involved with researching new threats and overall information security trends. Before joining Solutionary, Gray was a technologist for marchFIRST, Idea Integration and Mellon Bank.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.