Virtual Conference Oct 23-24, 2024

New Paragraph

Call for Speakers 

Shared Experience, Shared Success 

Help us shape the Graylog GO agenda! We're looking for dynamic speakers to share their experiences and insights with our virtual community. Whether your expertise is in using Graylog for cybersecurity or log management, your voice can make a difference.

What We're Looking For

Submission Deadline: August 1st

Click here to register your submission. 


Learn more

This is a paragraph. Writing in paragraphs lets visitors find what they are looking for quickly and easily.

This is a paragraph. Writing in paragraphs lets visitors find what they are looking for quickly and easily.

Learn more

Solving Cybersecurity Problems

This track explores advanced tactics and strategies to protect digital ecosystems. Speakers should dive deep into specialized topics, provide valuable insights, and share actionable strategies. These sessions should draw in both strategists and hands-on practitioners eager to safeguard their organizations.

 

Sample topics: 

  • Proactive threat-hunting and response strategies 
  • Incident response planning and execution 
  • Advanced threat intelligence integration 
  • Beyond the AI cybersecurity hype 
  • Risk-based prioritization approaches 
  • Effective SIEM alerting strategies 
  • Implementing sigma rules for threat detection 
  • Streamlining security investigations 
  • Advanced SIEM Use Cases 
  • Optimizing alert triage processes 


Solving Data Management Problems  

This track focuses on the critical role of data management in log management for effective SecOps, IT Ops, and DevOps. These sessions should provide actionable insights into managing, utilizing, storing, and retrieving log data efficiently, helping organizations optimize strategies to lower costs, enhance security, and improve operational outcomes.

 

Sample topics: 

  • Effective log retention policies and data lifecycle management 
  • Proactive monitoring and anomaly detection 
  • Data visualization and reporting for actionable insights 
  • Integrating log management with SecOps for improved incident response 
  • Distributed log management systems 
  • Blueprints for an effective Graylog architecture 
  • Best practices in migrating to Graylog 
  • Cross-departmental adoption of log management 
  • Integrating Graylog with enterprise systems 
  • Advanced data management techniques 


Why Speak at GO? 

Elevate your profile: Gain visibility as an expert 

Network with peers: Strengthen relationships with fellow thought leaders

Inspire and influence: Impact the way Graylog users approach their work

Connect: Access the community of Graylog users 

Enhance your digital footprint: Expand your social audience and boost your personal brand

Registration

Coming Soon!

Learn from Industry Experts

New Paragraph

Discuss Trends & Best Practices

New Paragraph

Your headphones should always look amazing! Pick your preferred color.

Colorful

Gain Product Insights

New Paragraph