Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Events » Demystifying Business Intelligence and Deriving Value from Converged Security Reporting

Refine your results by

Demystifying Business Intelligence and Deriving Value from Converged Security Reporting

KEYWORDS: business intelligence / incident management systems / incident reporting / incident response / Security / security analytics / security risk management / security system integration / security systems / Security trends
11/21/13 2:00 pm to 11/21/14 2:00 pm EST
Online
Contact: Adam Thomas

What: FREE webinar
Where: Right from your computer
Duration: 60 minutes, including LIVE Q&A
Tweet: #secwebinars

Demystifying Business Intelligence and Deriving Value from Converged Security Reporting


There has been a groundswell in the demand for meaningful security metrics and reporting. It’s no longer enough to tell the business how many incidents occur; it needs to be articulated how security is contributing to the mitigation of such events and the reduction of associated losses.

The real value and next focus will be on deriving value from big data analytics for situational awareness and the extraction of meaningful value for the organization. Business Intelligence tools such as dashboards and analytics provide the security team timely access to the right data to make proactive security and risk based decisions.

This Webinar will discuss:

  • Industry research related to BI reporting and analytics
  • Now that we have common platforms of converged security data collection, what's next?
  • The building blocks of BI
  • How to pick analytics/metrics that matter
  • The various tools and applications available for Integration, Information Delivery and Analysis
  • How to leverage the value of security-related information to provide a more accurate and timely picture of the risk environment (How to tell your story)
  • The application of data analytics to close the security reporting loop, providing effective feedback and measurements

Can't attend live? Register to view the webinar on-demand!

Speakers:    
James Moore   John Kindervag
James Moore
Vice President
iView Systems
  John Kindervag
Principal Analyst Serving Security & Risk Professionals
Forrester Research, Inc.

Sponsored By:

Register for this Event

Related Articles

Security New Ground 2012 Moved to November 2013

Managing Fraud in E-Commerce: Is Your Online Business Bulletproof?

83% Avoid a Business Following Breach and 21% Never Return

Business Continuity Awareness Week is March 21-25

Related Products

Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Man in suit

How to Safeguard Executives Through Proactive Planning and Managing Online Presence

2026

What Security Leaders Could Expect in 2026

NFL footballs

Security Risks Around Super Bowl LX: What Security Leaders Should Be Watching

Phone with message icon

The Post-Breach Narrative: Winning Back Trust After the Headlines Fade

Coding on screen

This Website Exposed ICE Data — Now, It’s Faced a Cyberattack

SEC 2026 Benchmark Banner

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing