Log Analysis for Breach PreventionSolutionary's Don Gray on Steps Companies Can Take to Predict Threats
Most organizations don't understand why they need forensic log analysis, he says. During an interview at the RSA Conference 2014, Gray discusses:
- The keys to testing incidence response;
- Differences between malware detection and forensic log analysis; and
- Why most organizations are failing to adequately use log analysis to prevent breaches.
Gray brings "in-the-trenches" information security experience to his role as chief security strategist for Solutionary, where he leads the security engineering research team. He is a member of the NTT Group security research team, and is directly involved with researching new threats and overall information security trends. Before joining Solutionary, Gray was a technologist for marchFIRST, Idea Integration and Mellon Bank.
Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.