Hi [[ session.user.profile.firstName ]]

What makes a Next Gen SOC?

As the business landscape redefines itself with the adoption of big data, mobile computing and social media, traditional Security Operations Centres (SOC) that only monitor an organisation’s network no longer provide adequate protection.

In a Next Gen SOC, data monitoring extends beyond the organisation, into its cloud services, key executives’ personal email accounts, mobile devices, and more. Equipped with complex tools, strict processes, and experienced security analysts, a Next Gen SOC provides real-time and actionable intelligence, to better protect your organisation from the latest threats.

Join our upcoming webinar and learn about:

- Core requirements for a Next Gen SOC
o Flexible Log Collection
o Big Data Processing
o Advanced Analytics
o Real-Time Intelligence
- SOC-centric services: Incident Response and Advanced Intelligence
- SOC operating models – Building your own SOC, Operating Models & Extending Services
- Developing the next generation of security professionals
Recorded Jul 21 2016 52 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Mr Peter Sparkes Senior Director, Cyber Security Services, Asia Pacific and Japan, Symantec
Presentation preview: What makes a Next Gen SOC?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Defending Against Today's Sophisticated Attacks on Healthcare Organisations Dec 12 2018 3:00 am UTC 67 mins
    Axel Wirth, Distinguished Healthcare Architect
    In the eyes of cyber criminals, there are few targets more lucrative than healthcare organisations due to the comprehensive nature of the information held by them, and the high value of health data on the black market. And, it is not just about protecting information – cybersecurity incidents in healthcare can also impact hospitals' ability to deliver care, or could result in harm to patients should critical systems get taken down by a malicious actor.

    Join us in our upcoming 'Defending Against Today's Sophisticated Attacks on Healthcare Organisations' webinar as we discuss the specific cybersecurity challenges pertaining to the healthcare industry, including:

    • The latest threat trends and incidents
    • The challenges of securing healthcare ecosystems
    • Effective cybersecurity strategies
  • Solving Mobile Security: Peer-tested Strategies That Work Dec 5 2018 3:00 am UTC 61 mins
    Brian Duckering, Mobile Security Specialist, Symantec and Brian Jacome, Director of Applications and Controls, RBC
    Businesses of all sizes are wary of the added risk that comes from the use of mobile devices and are struggling to figure out the best strategies to protect their sensitive information.

    Attend this webinar to hear the advice from experienced security professionals who have successfully navigated the path to protect their businesses from mobile threats.

    Hear from Brian Jacome, Director of Applications and Controls from Royal Bank of Canada and learn about his journey and get answers to the following questions and more:

    - Why is it important to secure mobile devices?
    - What is your advice to your peers who are starting their mobile security journey?
    - What are the most important requirements of a mobile security solution?

    By the end of this webinar, you will have gained important advice and perspective from those who have gone before you and are able to sleep better at night.

    Register Today
  • The IoT Enterprise: Why Your Organisation Is Already IoT'd Nov 28 2018 3:00 am UTC 61 mins
    Nick Savvides, Chief Technology Officer APAC, Symantec
    With the potential for energy savings, improvement of business processes, automation of the supply chain and more, organisations around the world are giving IoT a serious look - but security concerns are proving to be a barrier for adoption.

    With most IoT devices and platforms missing even basic security hygiene and existing network security tools lacking the capability to properly manage an IoT network, implementing IoT devices can be a security nightmare.

    Join us in our upcoming webinar as we discuss the current state of IoT in enterprises, the challenges of properly securing IoT devices, and our top recommendations on how to resolve these challenges and prepare your organisation for the age of automation.
  • Stop Phishing Attacks with Email Threat Isolation Nov 22 2018 5:00 am UTC 60 mins
    Naveen Palavalli, Director, Product & GTM Strategy & Anant Vadlamani, Principal Product Manager, Symantec Corporation
    Advanced phishing attacks and ransomware continue to plague Organizations with a 55% increase according to Symantec threat research. Users continue to be easily social engineered into opening phishing emails which can steal confidential data like credentials. In addition, email continues to be the number one vector for malware including ransomware. Combating these insidious threats requires a powerful combination of advanced protection and user security awareness.

    This webinar introduces email threat isolation, a paradigm shift in the fight against phishing attacks and ransomware.

    Join us to learn how Symantec Email Security can:

    - Isolate malicious threats in links and attachments to prevent malware payloads and credential theft.

    - Pre-empt phishing attacks with real-world simulations and built-in user security awareness tools, tracking readiness over time.

    - Anticipate future campaigns with comprehensive security analytics gathered from previous attacks against your organization.

    - Fully secure your Office 365 or Google G Suite apps with integrated DLP and CASB for both advanced data and threat protection.

    In addition, we will show you Symantec Email Threat Isolation, in action, with a demo that showcases safe rendering of links.

    Register Today
  • A CTO’s Perspective: Network Security for the Cloud Generation Nov 21 2018 3:00 am UTC 31 mins
    Dr. Hugh Thompson, CTO Symantec and Mark Urban, VP Product Strategy & Operations, Symantec
    Data, devices and employees are mobilised and traffic is increasingly going to the internet and cloud applications. Traditional approaches to network protection are going away as the concept of a secure perimeter disappears.

    In this webinar, we'll look at today's new business paradigm, the challenges we now face, along with best practices for building a secure network in the cloud.

    Join Dr. Hugh Thompson, CTO of Symantec, and Mark Urban, VP Product Strategy & Operations, Symantec, as they share their vision for Cloud Generation Network Security and how they see leading companies of all sizes prepare for the future.

    In this session, they'll discuss:
    • A security insider's view of market trends and the 24/7/365 demands of a distributed workforce.
    • The increased complexity of managing full security stack with limited resources.
    • The technical challenges of securing cloud applications.
    • Cloud solutions that solve cloud problems.

    It promises to be an insightful event for all security, network and IT professionals. After their presentation, the speakers will also take questions from the audience.

    We highly encourage you to register and reserve your spot today.

    Register Now
  • When the Walls Come Tumbling Down – Network Security for the Cloud Generation Recorded: Nov 14 2018 62 mins
    Mike Chen, Director of Product Marketing, Tim Murphy, Sr. Manager Network Product Marketing, Robert Arandjelovic EMEA
    Cyber security professionals are at a crossroads. The game has changed, and the bad guys are getting more aggressive and inflicting more and more damage on corporate assets—and reputations—worldwide.

    Ransomware is through the roof, zero-day exploits are exploding, threats are hiding in encrypted traffic and email is riddled with malware. There is no perimeter anymore. Data, devices and employees are mobilized and traffic is increasingly going to the internet and cloud applications. So, the question now is, how do you protect a castle—by which we mean your enterprise—when the walls are tumbling down?

    In this webinar we'll discuss:
    - Why you should embrace cloud-based network security
    - The tools you need to provide protection against a variety of attacks
    - Why a proxy belongs at the center of your cloud service
    - Cloud migration strategies
    - Integrations that orchestrate defenses across control points and attack vectors

    Register Today
  • See How Easy It Is To Hack a Mobile Device (Video Demo) Recorded: Nov 7 2018 5 mins
    Symantec
    Watch a demonstration of two iPhone hacks - malicious profiles and malware (spyware) - to see how a hacker can take full control of a device, steal credentials, control and manipulate communications, steal identities and remotely record conversations without detection.

    In each case, see how Symantec Endpoint Protection Mobile (SEP Mobile, formerly Skycure), the leading Mobile Threat Defense solution, protects the device and data from these attacks.
  • Ask the Experts—Securing Data and Email in Office 365 Recorded: Oct 30 2018 63 mins
    Mark Bowker, Senior Analyst, ESG / Richard Diver,Cloud Security Architect. Insight/ Jereme Lee, System Engineer, Symantec
    Its your job to secure email, sensitive data and apps in Office 365. Now What?

    Moving to cloud applications provides the opportunity to get your security right. This is the time to set up optimum data loss prevention, malware and phishing prevention, and access controls on your systems. No matter if you are still planning, have just started, are in the midst, or are fully migrated to Office 365, there are security policies and procedures to implement and optimize.

    Join ESG industry analyst Mark Bowker, Insight’s Cloud Security Architect, Richard Diver, and Symantec’s System Engineering Manager, Jereme Lee to learn how to:

    - Get the most out of your Office 365 instance by enhancing the security

    - Understand what Microsoft offers and how Symantec compliments their security offering

    - Enhance your email, app and data security in Microsoft Office 365 which can be used across all your cloud apps

    Register Today
  • Improving compliance and governance through automation Recorded: Oct 4 2018 59 mins
    Puneet Kukreja, Deloitte Partner, Cyber Risk Advisory | Paul McPhee, Symantec Strategic Sales Manager, Emerging Technologies
    Businesses and Individuals, need to have clear visibility of the strength and application of their security controls, to protect their systems.

    Governance over the controls is as important as implementing the controls in the first place and understanding what the important controls are and how they need to be measured is vital. The ability to measure the application and effectiveness of cyber controls in a streamlined and automated way to allow effective decision making and remediation of issues is key to ensuring they are providing the protection required.

    Australian businesses face several Cyber Governance & Compliance challenges:

    - Compliance Validation: Concerns over verifying technology compliance

    - Cyber Threat: Concerns over detection of advanced cyber threats causing a data breach

    - Privacy or Regulatory: Concerns over PII, PCI, MAS regulation, Mandatory data breach and data privacy

    - Security Visibility: Concerns over inefficient reporting of security posture or security controls

    - Establish Controls: Architect, design, implement and operationalise new security controls

    Deloitte and Symantec are hosting a live webinar to discuss cyber governance and compliance challenges in Australia.

    Join this webinar for insights into cyber operations, business reporting and strategies for navigating the current landscape.
  • Defending Against Today's Sophisticated Attacks on Healthcare Organisations Recorded: Aug 30 2018 67 mins
    Axel Wirth, Distinguished Healthcare Architect
    In the eyes of cyber criminals, there are few targets more lucrative than healthcare organisations due to the comprehensive nature of the information held by them, and the high value of health data on the black market. And, it is not just about protecting information – cybersecurity incidents in healthcare can also impact hospitals' ability to deliver care, or could result in harm to patients should critical systems get taken down by a malicious actor.

    Join us in our upcoming 'Defending Against Today's Sophisticated Attacks on Healthcare Organisations' webinar as we discuss the specific cybersecurity challenges pertaining to the healthcare industry, including:

    • The latest threat trends and incidents
    • The challenges of securing healthcare ecosystems
    • Effective cybersecurity strategies
  • Solving Mobile Security: Peer-tested Strategies That Work Recorded: Aug 23 2018 61 mins
    Brian Duckering, Mobile Security Specialist, Symantec and Brian Jacome, Director of Applications and Controls, RBC
    Businesses of all sizes are wary of the added risk that comes from the use of mobile devices and are struggling to figure out the best strategies to protect their sensitive information.

    Attend this webinar to hear the advice from experienced security professionals who have successfully navigated the path to protect their businesses from mobile threats.

    Hear from Brian Jacome, Director of Applications and Controls from Royal Bank of Canada and learn about his journey and get answers to the following questions and more:

    - Why is it important to secure mobile devices?
    - What is your advice to your peers who are starting their mobile security journey?
    - What are the most important requirements of a mobile security solution?

    By the end of this webinar, you will have gained important advice and perspective from those who have gone before you and are able to sleep better at night.

    Register Today
  • The IoT Enterprise: Why Your Organisation Is Already IoT'd Recorded: Aug 16 2018 61 mins
    Nick Savvides, Chief Technology Officer APAC, Symantec
    With the potential for energy savings, improvement of business processes, automation of the supply chain and more, organisations around the world are giving IoT a serious look - but security concerns are proving to be a barrier for adoption.

    With most IoT devices and platforms missing even basic security hygiene and existing network security tools lacking the capability to properly manage an IoT network, implementing IoT devices can be a security nightmare.

    Join us in our upcoming webinar as we discuss the current state of IoT in enterprises, the challenges of properly securing IoT devices, and our top recommendations on how to resolve these challenges and prepare your organisation for the age of automation.
  • Securing Containers with Symantec Control Compliance Suite Recorded: Aug 7 2018 53 mins
    Suresh Ramkumar, Principal Product Manager, Symantec
    Container technologies are still a relatively small part of the overall cloud and application portability market, but that is changing. Use of containers is exploding at an estimated annual growth rate of 40%.

    Containers provide some very compelling benefits especially in terms of speed and cost savings. But like with any new tool, there are security concerns that must be addressed.

    Join us for this special webinar where we will discuss the security challenges that arise from using containers, and how to assess the security of containers and container images to reap the full benefits of this exciting technology.
  • A CTO’s Perspective: Network Security for the Cloud Generation Recorded: Jul 31 2018 31 mins
    Dr. Hugh Thompson, CTO Symantec and Mark Urban, VP Product Strategy & Operations, Symantec
    Data, devices and employees are mobilised and traffic is increasingly going to the internet and cloud applications. Traditional approaches to network protection are going away as the concept of a secure perimeter disappears.

    In this webinar, we'll look at today's new business paradigm, the challenges we now face, along with best practices for building a secure network in the cloud.

    Join Dr. Hugh Thompson, CTO of Symantec, and Mark Urban, VP Product Strategy & Operations, Symantec, as they share their vision for Cloud Generation Network Security and how they see leading companies of all sizes prepare for the future.

    In this session, they'll discuss:
    • A security insider's view of market trends and the 24/7/365 demands of a distributed workforce.
    • The increased complexity of managing full security stack with limited resources.
    • The technical challenges of securing cloud applications.
    • Cloud solutions that solve cloud problems.

    It promises to be an insightful event for all security, network and IT professionals. After their presentation, the speakers will also take questions from the audience.

    We highly encourage you to register and reserve your spot today.

    Register Now
  • When the Walls Come Tumbling Down – Network Security for the Cloud Generation Recorded: Jun 27 2018 66 mins
    Mike Chen, Director of Product Marketing, Tim Murphy, Sr. Manager Network Product Marketing, Robert Arandjelovic EMEA
    Cyber security professionals are at a crossroads. The game has changed, and the bad guys are getting more aggressive and inflicting more and more damage on corporate assets—and reputations—worldwide.

    Ransomware is through the roof, zero-day exploits are exploding, threats are hiding in encrypted traffic and email is riddled with malware. There is no perimeter anymore. Data, devices and employees are mobilized and traffic is increasingly going to the internet and cloud applications. So, the question now is, how do you protect a castle—by which we mean your enterprise—when the walls are tumbling down?

    In this webinar we'll discuss:
    - Why you should embrace cloud-based network security
    - The tools you need to provide protection against a variety of attacks
    - Why a proxy belongs at the center of your cloud service
    - Cloud migration strategies
    - Integrations that orchestrate defenses across control points and attack vectors

    Register Today
  • Get all your questions on GDPR answered Recorded: Apr 24 2018 60 mins
    Sunil Choudrie, Giampiero Nanni, Robert Arandjelovi, Alexander Peters, Ramses Gallego
    Do you have a burning question you’d like to ask about the GDPR? Now you have a chance to get an answer – straight from the experts. We’ll be hosting a live Q&A with a panel of GDPR experts. And with the clock ticking down to the May 25th deadline, this is a perfect opportunity to get the answers you need.

    The discussion will enable you to successfully prepare for the GDPR by:

    • Understanding its full implications for your organisation
    • Identifying and tracking personal data, wherever it may be
    • Implementing cyber security to protect your data systems
    • Detecting and responding effectively to security breaches
    • Building a GDPR compliance program for the long term

    Get all your questions answered and ensure you’re ready for May 25th by joining our Q&A.
  • 2018 Internet Security Threat Report. The Latest Threat Trends Explained. Recorded: Apr 12 2018 61 mins
    Peter Sparkes, Senior Director, Cyber Security Services, Symantec
    From the sudden spread of WannaCry and Petya/NotPetya, to the swift growth in coin miners, 2017 provided us with another reminder that digital security threats can come from new and unexpected sources. Not only has the sheer volume of threats increased, but the threat landscape has become more diverse, with attackers working harder to discover new avenues of attack and cover their tracks while doing so.

    Join Symantec's leading threat expert, Peter Sparkes as he shares findings from the 2018 Internet Security Threat Report (ISTR) including insights on:

    - The Coin Mining Gold Rush
    - Shifting Trends in Ransomware
    - Targeted Attacks by the Numbers
    - Infecting the Software Supply Chain
    - The Surge in Mobile Threats

    Register Today
  • Phish me not! Stop Sophisticated Phishing Attacks with Email Threat Isolation Recorded: Mar 20 2018 60 mins
    Naveen Palavalli, Director, Product & GTM Strategy & Anant Vadlamani, Principal Product Manager, Symantec Corporation
    Advanced phishing attacks and ransomware continue to plague Organizations with a 55% increase according to Symantec threat research. Users continue to be easily social engineered into opening phishing emails which can steal confidential data like credentials. In addition, email continues to be the number one vector for malware including ransomware. Combating these insidious threats requires a powerful combination of advanced protection and user security awareness.

    This webinar introduces email threat isolation, a paradigm shift in the fight against phishing attacks and ransomware.

    Join us to learn how Symantec Email Security can:

    - Isolate malicious threats in links and attachments to prevent malware payloads and credential theft.

    - Pre-empt phishing attacks with real-world simulations and built-in user security awareness tools, tracking readiness over time.

    - Anticipate future campaigns with comprehensive security analytics gathered from previous attacks against your organization.

    - Fully secure your Office 365 or Google G Suite apps with integrated DLP and CASB for both advanced data and threat protection.

    In addition, we will show you Symantec Email Threat Isolation, in action, with a demo that showcases safe rendering of links.
  • Unpacking the Hype: What do the new privacy laws really mean to your business? Recorded: Mar 20 2018 60 mins
    Brian Fletcher, Director, Government Affairs, Symantec, Asia Pacific and Japan
    With the new Privacy Amendment (Notifiable Data Breaches) Act 2017 now in effect, many Australian businesses and government agencies are starting to take action to ensure their data protection and breach response plans are up to date and comply with the new scheme. However, knowing how to avoid the higher penalties and reputational damage caused by data breaches is a tough challenge for any business.

    Don't miss this opportunity to join Symantec's privacy expert Brian Fletcher, Director, Government Affairs, Symantec, Asia Pacific and Japan to learn more about the new laws and what you can do to ensure your business is not making headlines for all the wrong reasons.

    " Hear about new challenges introduced by the Australian mandatory data breach notification laws and the wide reaching General Data Protection Regulation (GDPR)
    " Learn about key steps in the journey towards privacy compliance and why most Australian businesses have approached privacy wrong
    "Understand how these regulations can enable you to gain trust and enhance customer experiences
  • Securing the Cloud Generation: Who’s Using My Cloud Recorded: Mar 6 2018 43 mins
    John Cunningham, VP - Cloud Security APAC, Symantec
    Do you know who’s using your cloud?

    Organisations around the world are embracing cloud solutions like Office 365 at a breakneck pace, but online collaborative platforms can leave an unprepared organisation vulnerable to cyber-attacks. Who is accessing your cloud applications? Are they truly authorised users, and are they conducting illegitimate activities?

    Without sufficient visibility, detection and protection, it can be easy for a cyber-criminal, or rogue employee to slip through the cracks – and when they do, your sensitive data won’t be their only target. Cyber-criminals have been known to load partial payloads for ransomware attacks, access email accounts for targeted phishing campaigns, host malware on SharePoint, and more.

    On 6 March 2018, Symantec will be hosting the ‘Securing the Cloud Generation: Who’s Using My Cloud’ webinar. Join our speaker and panel of experts as they discuss:

    •The state of today’s cloud security landscape
    •How to detect unauthorised access or risky user activity
    •How to protect your cloud from cyber threats

    Sign up for the webinar now, and gain critical insights on cyber security in the era of cloud applications and services.
Symantec APAC Integrated Cyber Defense Webinar Series
Symantec Corporation (NASDAQ: SYMC), the world’s leading cyber security company, helps businesses, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Likewise, a global community of more than 50 million people and families rely on Symantec’s Norton suite of products for protection at home and across all of their devices. Symantec operates one of the world’s largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats. For additional information, please visit http://www.symantec.com/en/aa/index.jsp or connect with us on Facebook, Twitter, and LinkedIn.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: What makes a Next Gen SOC?
  • Live at: Jul 21 2016 5:00 am
  • Presented by: Mr Peter Sparkes Senior Director, Cyber Security Services, Asia Pacific and Japan, Symantec
  • From:
Your email has been sent.
or close