Come join us to explore practical ways by which Business Intelligence tools can be used to root through and filter your security logs.