Links:
[1] http://pulse.veltsos.com/category/it/data
[2] http://pulse.veltsos.com/category/it/security
[3] http://www.slideshare.net/NOVL/preventing-the-next-data-breach-through-log-management
[4] http://www.slideshare.net/
[5] http://www.slideshare.net/NOVL