Hi [[ session.user.profile.firstName ]]

Automating detection & response to security threats - Tim Roddy

Minimizing the time taken to identify a security breach enables a company to mitigate the problem and limit the potential damage to its data and reputation.
Deploying an automated detection and response tool gives security practitioners the insight they need to respond to cyber-security attacks.
Recorded Jan 5 2018 11 mins
Your place is confirmed,
we'll send you email reminders
Presented by
IT Chronicles Media
Presentation preview: Automating detection & response to security threats - Tim Roddy

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • ITSM and SecOps: A Critical Intersection Recorded: Nov 13 2018 56 mins
    Michael Dortch - DortchonIT.com; Mike Bombard - Virima Technologies; Taylor Lehmann - CISO at Wellforce & Tufts
    IT service management (ITSM) is evolving rapidly as more and more enterprises pursue digital transformation. At the same time, cyber security threats are growing in number, sophistication, and impact on the operations, revenues, and reputations of victimized companies. Meanwhile, at too many companies, service and security management are still operating in separate silos, with cooperation happening only after a threat becomes a successful breach.

    How best to move to a structure in which service and security management are integrated, proactive enablers and accelerators of your business?

    At many companies, this is one of the goals driving an increased focus on security operations, or SecOps. But there are technological, cultural, and organizational challenges to your efforts to bring IT service management and security management closer together.

    Join Industry experts Michael Dortch, Mike Bombard and Taylor Lehmann for a stimulating and informative discussion of these challenges and how companies are addressing them successfully. You’ll learn things you can do now to improve both service and security management at your company.
  • ITSM and SecOps: A Critical Intersection Recorded: Nov 13 2018 49 mins
    Michael Dortch - DortchonIT.com; Mike Bombard - Virima Technologies; Taylor Lehmann - CISO at Wellforce & Tufts
    IT service management (ITSM) is evolving rapidly as more and more enterprises pursue digital transformation. At the same time, cyber security threats are growing in number, sophistication, and impact on the operations, revenues, and reputations of victimized companies. Meanwhile, at too many companies, service and security management are still operating in separate silos, with cooperation happening only after a threat becomes a successful breach.

    How best to move to a structure in which service and security management are integrated, proactive enablers and accelerators of your business?

    At many companies, this is one of the goals driving an increased focus on security operations, or SecOps. But there are technological, cultural, and organizational challenges to your efforts to bring IT service management and security management closer together.

    Join Industry experts Michael Dortch, Mike Bombard and Taylor Lehmann for a stimulating and informative discussion of these challenges and how companies are addressing them successfully. You’ll learn things you can do now to improve both service and security management at your company.
  • Be ready for the 3am call - 5 ways Major Incident Management can be improved Recorded: May 15 2018 46 mins
    ITSM process expert Ryan Schmierer & IT Service Management technology expert Mike Bombard
    Continual Service Improvements and minimizing the impact of Major Incident Management are critical to keeping your business running smoothly and out of the nightly news headlines.

    This webinar, presented by ITSM process expert Ryan Schmierer and IT Service Management technology expert Mike Bombard will explore the role technology capabilities and process improvement can play to improve outcomes.

    Ryan and Mike will discuss lessons learned from a major healthcare company case study and the challenges this company faced in managing major incidents. They will provide 5 things you can do today to improve major incident management and will discuss how by leveraging capabilities from discovery and infrastructure visualization tools will help your staff gain the insights they need to resolve issues quickly and continually make better-informed decisions.
  • Why EA should be a part of every ITSM practice Recorded: Jan 18 2018 23 mins
    Ryan D. Schmierer, Principal, RS Consulting NW
    The modern digital enterprise depends on EA, ITSM and IT project teams working together and sharing information as a cohesive unit. In this session, we will share some tips on how to make that a reality. In many organizations, Enterprise Architecture and Service Management & Operations are separate functions that rarely interact with each other and business users are the ones paying the price. This session will look at how architects can use operational insights to design better technology solutions; how operations staff can use architecture models along with other configuration data to better assess impacts, risks and diagnose issues; and how these functions together can enable a more agile business environment.

    E-mail: rsconsultingnw@outlook.com

    Connect with Ryan on LinkedIn

    Catch up on the latest IT trends at IT Chronicles

    Other BrightTALK Presentations by this presenter
  • Automating detection & response to security threats - Tim Roddy Recorded: Jan 5 2018 11 mins
    IT Chronicles Media
    Minimizing the time taken to identify a security breach enables a company to mitigate the problem and limit the potential damage to its data and reputation.
    Deploying an automated detection and response tool gives security practitioners the insight they need to respond to cyber-security attacks.
  • Artificial Intelligence & Machine Learning where is it going? - Marcel Shaw Recorded: Jan 5 2018 15 mins
    IT Chronicles Media
    While still in its infancy, Artificial Intelligence and Machine learning technologies have the ability to recognize trends in data patterns, analyse and learn from them.The advances promise to bring huge value to business that can leverage this information.
  • Achieving "World class ITSM" Kevin J. Smith Recorded: Jan 5 2018 15 mins
    IT Chronicles Media
    Kevin talks about his book "World Class ITSM" which focuses on the journey of the Helpdesk to Service Management, where it has been proven to work and what is aspirational for the future of ITSM to do things better.
  • Security breaches are inevitable. Chris Goettl ( @ChrisGoettl ) Recorded: Dec 27 2017 13 mins
    IT Chronicles Media
    There are many aspects to security, whether it be mitigating personal risk from an unsecured wifi connection, to managing risk for an enterprise. Security is about trust and being able to identify all areas of risk, then mitigate them. Its also about being adequately prepared to handle a breach should the worse happen.
  • Optimizing End User Computing. Jed Ayres Recorded: Dec 21 2017 11 mins
    IT Chronicles Media
    Jed talks about End User Computing (EUC) and how IGEL (@igel_technology) has revolutionized endpoint management software by standardizing the user experience with their Universal Management Suite.
  • Issue advocacy, redefined. Bryan Fratkin, Founder, Whistle Stop Digital Recorded: Dec 6 2017 13 mins
    IT Chronicles Media
    Bryan talks to the 10 in Tech team about SparkInfluence, a new breed of advocacy and engagement platform to quickly educate and empower stakeholders to action, identify influencers, reach decision makers and affect change.
  • What is Modern Service Management? with John Clark Recorded: Oct 16 2017 11 mins
    IT Chronicles Media
    Modern Service Management is not another framework, or set of books or IP. It is designed to enable ITSM professionals to focus on business outcomes.
  • DevOps Automation - The real business value - Steve Brodie Recorded: Oct 12 2017 12 mins
    IT Chronicles Media
    Steve Brodie talks about how to create a simple, repeatable way to collect and view information from any DevOps tool along the pipeline in the context of a single release, and deliver metrics that provide real business value.
  • Security, the importance of a human-centric approach. Brandon Swafford Recorded: Oct 6 2017 12 mins
    IT Chronicles Media
    As traditional security perimeters dissolve, companies are becoming more reliant on human-centric cyber security systems that can protect their most valuable assets at the intersection of users, data & networks.
  • Security compromise is inevitable, but breaches can be stopped. Ashwini Almad Recorded: Oct 5 2017 15 mins
    IT Chronicles Media
    Attacks are getting more sophisticated and more targeted. Endgame takes a different approach to security and extends traditional anti virus protection from malware, to exploits, malwareless attacks, and ransomware. Ashwini speaks to the 10 in tech team about the changing nature of security threats.
  • With improved monitoring you make better, smarter, business decisions Recorded: Oct 4 2017 11 mins
    IT Chronicles Media
    Improved server monitoring solutions provide IT staff with better visibility into their operations, enabling them to deliver more effective IT services. Jon Cavanaugh, Sr Sales Engineer / Mgr Operations at OP5 talks to the 10 in Tech team about how this drives better business outcomes.
  • Workforce mobility and the death of the Desk Phone - Brian Peterson, Dialpad Recorded: Oct 3 2017 12 mins
    IT Chronicles Media
    How cloud based business phone systems are enabling true workforce mobility through ease of use voice communication from any device. Effectively eliminating the need for a traditional desk phones and PBX systems is discussed with Brian Peterson, Co-Founder & VP Engineering at Dialpad talks and the 10 in Tech team.
  • How can game developers use game emulation tools? Recorded: Oct 2 2017 9 mins
    IT Chronicles Media
    Game Emulation Module tool for managing interactive narratives that simplifies the challenges for game developers handling complex, interactive story development is discussed by Mark Kennedy, CEO, and 10 in Tech team.
  • How to drive more value from IOT Data? Anupam Wahi, Incedo Inc. Recorded: Sep 29 2017 12 mins
    IT Chronicles Media
    The IOT ecosystem is now a reality for many organizations. The proliferation of IOT sensors generate masses of data that can be looked at in new ways. Using AI and machine learning to analyse this data can drive more value for companies.
  • What is a Liquid Studio? How will it help my digital transformation journey? Recorded: Sep 28 2017 11 mins
    IT Chronicles Media
    Steven Convey (@SteveAccenture) Managing Director, Technology, Accenture Inc. (@AccentureCanada) chats with the Ten in tech team about the new Liquid Studio that has recently opened in Toronto. He outlines how it brings together people, tools and technology to help them understand and manage the changes being driven by digital transformation.
  • Driving ITSM to deliver positive business outcomes - instead of IT goals Recorded: Sep 27 2017 10 mins
    IT Chronicles Media
    Ryan Ogilvie talks to the Ten in Tech team about how IT teams are focused on driving ITSM initiatives to deliver business value to Inter Pipeline.
IT Happens Here - Learn, Engage and Grow!
In today's digital marketplace, information is everywhere. You spend countless hours trying to stay up to date with news, informative how to's and vendor information for solutions you need to run your business.

IT Chronicles is built for you. We have taken what we know is missing and given you what you want. One destination that delivers all the current information from the best minds in the industry and a collective set of resources that help you get what you need.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Automating detection & response to security threats - Tim Roddy
  • Live at: Jan 5 2018 9:45 pm
  • Presented by: IT Chronicles Media
  • From:
Your email has been sent.
or close