Top Threat Monitoring Implementation Strategies

Date: Friday, June 14th at 10 a.m. PT / 1 p.m. E.T.

Addressing 24/7 threats with 24/7 vigilance

You have heard why you must proactively monitor, detect, deter, defend, remediate, and protect against various threat risks. Now it's time to roll up your sleeves, dig in, unpack, right-click, and look at multiple approaches and top threat monitoring strategies for SMBs and Enterprises. What are some options, pros, cons, and gotchas, and where and how to implement an effective monitoring strategy to improve your security posture and enable good data infrastructure hygiene?

Join Greg Schulz, Author, founder, and Sr. Analyst of Server StorageIO and Microsoft MVP (CDM), as he discusses top threat monitoring implementation strategies. Greg will discuss industry trends, technologies and techniques, best practices, and implementation strategies.

What you will learn:

  • Leveraging automated intelligence, MDR and other technologies
  • Wizards, assessment, health check, and reporting tools
  • Role of AI for anomaly detection, notification, remediation
  • Where and what to monitor, from on-prem, core, edge to cloud
  • Best practices, tips, and recommendations

Here is the AGENDA for the summit:

9 a.m. PT / 12 noon ET
Detect Early and Detect Often: The Case for Threat Monitoring

10 a.m. PT / 1 p.m. ET
Top Threat Monitoring Implementation Strategies

11 a.m. PT / 2 p.m. ET
Threat Monitoring Toolkit: Best Third-Party Solutions

About the presenter:

Greg Schulz, Founder and IT Analyst, Server StorageIO

Greg has worked as the customer in various IT organizations in different roles, as well as a vendor, consulting analyst and author of several books including “Software-Defined Data Infrastructure Essentials” (CRC Press). Greg brings a diverse background with real world perspective across applications, data infrastructures, hardware, software, and clouds. Greg is a Microsoft MVP Cloud Data Center Management and previous ten-time VMware vExpert

Register now!

Duration: 1 hour


Your e-mail address is used to communicate with you about your registration, related products and services, and offers from select vendors. Refer to our Privacy Policy for additional information.