As the cybersecurity industry continues to shift, consolidation among major SIEM (Security Information and Event Management) players is reshaping the landscape. Companies like Cisco with its recent acquisition of Splunk are positioning themselves at the forefront.
This webinar will explore how these market...
DevSecOps embraces security as a practice that must be thoughtfully and seamlessly integrated into every aspect of the DevOps process. By consolidating the traditionally separate disciplines and tools used for observability and security, organizations can leverage economies of scale, gain cross-disciplinary insights,...
Traditional data center security approaches do not translate very well to cloud environments as cloud computing and Layer 7 applications have fundamentally changed the way organizations should implement security controls, said Traceable AI's Richard Bird.
Adam Geller discusses his shift from Exabeam CEO back to product leadership at Zscaler, where he plans to use the company's vast data insights and security operations to drive growth. Geller emphasizes the importance of CXO-level visibility and robust customer adoption strategies.
The threat landscape has evolved for state and local government entities as well as higher education institutes. Mary Lou Prevost from Splunk and Bruce Johnson of TekStream discuss innovative public-private partnerships that boost institutional defense mechanisms.
Piotr Ciepiela, EMEIA cybersecurity leader at EY, discusses the challenges of securing OT systems and contrasts them with IT SOC environments. He emphasizes the need for specialized tools, dedicated personnel and strong collaboration with engineering teams to manage OT SOC operations.
The “Three Pillars” (people, process, and technology) management framework requires a delicate balance in order to achieve successful operations outcomes. Despite the ‘technology’ pillar dominating the conversation as of late, cybersecurity practitioners are the backbone of your organization's defense against...
Kevin Kin, global vice president of systems engineering at Palo Alto Networks, and Matt Shriner, global executive partner of threat management at IBM, outline the role of AI in the cybersecurity landscape, the evolution of threats, and collaborative solutions.
BlueVoyant's Cyber Defense Platform combines proactive and reactive security measures with internal and external capabilities. CEO Jim Rosenthal explains how this comprehensive approach allows clients to manage cyber risks effectively and achieve a desired state of cyber defense readiness.
According to a recent SecOps and Automation report, 56% of large companies handle at least 1000 alerts per day. 99% said the alert volume created problems for their IT security teams and 93% said they could only address some alerts on the same day.
In this volatile landscape, threat management is an important...
SOC teams have been clear for some time that additional operational capacity and expertise to detect and respond to today’s threats are needed.
MDR’s outsourced model of workload and network protection that can help intrusion analysis and investigation teams more rapidly and efficiently prevent, detect, and...
In today's digital landscape, cyber threats are more advanced and persistent than ever before. To effectively combat these threats, its crucial to adopt a comprehensive framework that guides the entire process from threat detection to mitigation.
The MITRE ATT&CK Framework provides a structured approach to...
The threat surface is ever-expanding, with multiple entry points available to threat actors. According to the latest report, the average time to detect and contain a breach is 277 days.
Setting up an internal SOC can be time-consuming, and lack of threat visibility due to siloed security and technologies across...
With the continual industrialized cyber-criminal operations and increased nation state sponsored cyber espionage activities, many organizations are struggling to keep up with attackers, and their security teams are often overwhelmed by the number of security alerts being generated by a multitude of security...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.