Security Information and Event Management (SIEM)
<meta name="title" content="Security Information and Event Management (SIEM) - Cybersecurity Solutions" /> <meta name="description" content="Explore SIEM tools and strategies to detect, analyze, and respond to cybersecurity threats effectively for business protection and compliance." />
Dr. Rachel Levitch – Cybersecurity Risk Consultant

Dr. Rachel Levitch is a cybersecurity and risk management professional with a multidisciplinary background in business, performance improvement, and information security. She has presented research at national defense conferences and provides strategic oversight in Governance, Risk, and Compliance (GRC), Security Information and Event Management (SIEM), and cybersecurity automation. Her work spans consulting, research, and executive education with a focus on applied cybersecurity in critical infrastructure and healthcare environments.
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM) is an essential capability in cybersecurity operations. It enables centralized collection, normalization, and analysis of security data from various sources, enhancing visibility and incident response across enterprise environments.
SIEM supports critical business outcomes such as:
- **Real-time threat detection**
- **Incident response automation**
- **Regulatory compliance**
- **Audit trail documentation**
- **Behavioral anomaly detection**
Tools Commonly Used in SIEM
Some widely adopted SIEM platforms include:
- **Splunk**
- **IBM QRadar**
- **LogRhythm**
- **Elastic SIEM**
- **ArcSight**
- **Microsoft Sentinel**
These tools are leveraged to monitor logs, analyze threats, and support compliance reporting. Automation and AI integrations are increasingly part of next-gen SIEM solutions.
Glossary of SIEM Terms
- **Event Correlation** – The process of linking related security events to identify meaningful patterns or threats.
- **Log Aggregation** – Collecting log data from diverse systems (firewalls, servers, databases, etc.) into a centralized system.
- **Threat Intelligence** – Data about threats and threat actors used to improve detection and response.
- **False Positive** – A benign activity incorrectly identified as a threat.
- **Incident Response** – The coordinated effort to address and manage the aftermath of a security breach or cyberattack.
Government and Public Resources
For authoritative resources on cybersecurity and SIEM:
- [United States Computer Emergency Readiness Team (US-CERT)](https://www.cisa.gov/uscert) – Alerts, bulletins, and incident response guidance.
- [National Cybersecurity & Communications Integration Center (NCCIC)](https://www.cisa.gov/nccic) – Federal cybersecurity coordination hub.
- [NIST Computer Security Resource Center](https://csrc.nist.gov) – Standards and guidelines for cybersecurity practices.
- [National Cybersecurity Alliance](https://staysafeonline.org) – Public-private effort promoting online safety.
Professional Engagements and Cybersecurity Conferences
- Annual **Dallas Cyber Security Summit** – Attendee; connects enterprise executives and solution providers.
- **US-CERT/GFIRST Cybersecurity Conference** – Represented Charles Edda and Charles Bouley in corporate sponsorship.
- **Women’s Leadership Luncheon (2018)** – Promoting education and mentorship for at-risk youth.
- **Fort Worth Vendor Symposium** – Featured speaker and community outreach presenter.
Results & Accomplishments
- **Expanded research** into WAN/LAN technologies and veteran healthcare performance systems, incorporating workplace leadership insights and system improvement frameworks.
- **Presidential administration recognition** for contributions to veterans' performance improvement initiatives in technology-supported environments.
- Presented at the **Congressionally Directed Medical Research Program (CDMRP)** and **Telemedicine and Advanced Technology Research Center (TATRC)** on the topic:
_“Veterans Service Experiences in Healthcare: A Self-Service Technology Orientation”_ – Focused on learning and system adoption in self-service technologies.
- **Notable scholarly impact** in combining human performance, IT literacy, and applied cybersecurity research.
Call to Action and Further Reading
- **Books by Dr. Rachel Levitch**
- _WHFF.TV Presents Parenting and Technology: Social Media, Negative Content Creation and Desensitization_ – Kindle Edition - _WHFF.TV Presents Deepfake Pornography: A Historical Lesson For Parents_ – Kindle Edition
- **Professional Memberships & Resources**
- [US-CERT](https://www.cisa.gov/uscert) - [National Cyber Security Alliance](https://staysafeonline.org) - [NIST Cybersecurity Guidelines](https://csrc.nist.gov)
---
Education
- **Ph.D. in Learning, Information Technology, and Performance Improvement**
University of North Texas, College of Information – August 2013
- **M.S. in Communication Studies**
Texas Christian University, Bob Schieffer College of Communication – June 2003
Certifications and Licenses
- **Six Sigma Green Belt Certification** – The Quality Group (June 2013 to June 2018)
- **Lean Six Sigma Yellow Belt Certification** – The Quality Group (Present)
- **Certified Manager of Quality/Organizational Excellence (CMQ/OE)** – ASQ (March 2014 to March 2017)
- **Certified Management and Engineer of Quality** – American Society for Quality
- **TEEX A&M Certification: Principles and Practices of Information Security and Security Measures** – CISRE and CNSS
Professional Conference Attendance and Cyber Update
- The annual **Dallas Cyber Security Summit** connects C-Suite and senior executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission includes access to all interactive panels, roundtable discussions, catered breakfast, lunch, and cocktail reception.
- **2018 Women’s Luncheon** featuring at-risk teens and promoting women helping young girls with dreams, hopes, and advancement toward college education and careers.
- **Fort Worth Vendor Symposium** including city officials and other business owners. Featured company Charles Edda and Charles Bouley’s community service, promoting intelligence and investigation through presentations.
- Fisher-Levitch (March 2018). **United States Computer Emergency Readiness Team (US-CERT)** - Law Enforcement’s Role in Cybersecurity and Incident Response Cyber Security Conference. Corporate Sponsorship Attendee representing Charles Edda and Charles Bouley. Participated in the Government Forum of Incident Response and Security Teams.
Published Book

== WHFF.TV Presents Parenting and Technology: Social Media, Negative Content Creation and Desensitization (Episode Book 1) Kindle Edition by Dr. Rachel Levitch (Author) Format: Kindle Edition ==
"You want children to learn how to defend themselves against bullying? Teach them how to box. You want your kids to understand the nuance, discipline, and self-control? Teach them how to clean the home, mow the grass, and build an outdoor fireplace. And if you want your children to be protected online — then teach them to code. Help them with bridges, onions, and proxies: place trackers in their pictures and how to scrub their information from the web."
Free parenting and technology episodes available at WHFF.TV Parenting and Technology Series.
Streaming now: WHFF.TV Presents Deepfake Pornography.
Published Book

- *WHFF.TV Presents Deepfake Pornography: A Historical Lesson For Parents (WHFF.TV Presents Deepfake Pornography Technology)*, Kindle Edition. Get it now on Amazon.
Dr. Levitch supports security teams in monitoring and protecting the organization's security posture now and into the future. Companies are improving their privacy standards with the help of their employees to comply with government laws and retain their customer base. With the new wave of artificial intelligence, parents need to approach security to comprehensively protect what matters most to them. Visit The Shape Your Own Future firm at Shape Your Own Future.
See also
- Financial Risk Management
- FinTech
- Business Analytics and Consulting
- Risk Quantification and Management
- Governance Risk and Compliance (GRC)
- Incident Response
Summary
SIEM platforms support Incident Response and enforce controls within Governance, Risk, and Compliance frameworks.