Hi [[ session.user.profile.firstName ]]

Key Tips for Security Teams for Expanding Visibility and Streamlining Operations

How are security teams keeping up with the evolving security landscape? What are some of the solutions security teams are using to gain better visibility and proactivity? Discover how security teams are leveraging automation to prioritize proactive analysis and hunt activities.

Join this video interview from RSA Conference 2019 as we discuss how best to streamline operations and improve visibility. Viewers will be able to learn more about:
- How organizations are expanding visibility into their environments at enterprise scale
- The importance of automation for security teams
- How companies are approaching SOAR rollouts
- How security teams keep up with the latest attack tools and techniques
- Key methods for effective threat hunting
- Essential components in building out a mature corporate Security Model
- Key trends in security that we'll continue to see for the next year or two
Recorded Mar 7 2019 29 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Joe Partlow, Chief Technology Officer, ReliaQuest & Chris Roberts, Chief Security Strategist, Attivio Networks
Presentation preview: Key Tips for Security Teams for Expanding Visibility and Streamlining Operations

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • RSAC 2019 Recap - Emerging Tech, Threats and AI Recorded: Mar 26 2019 62 mins
    Chris Roberts (Attivio Networks), Nathan Wenzler (Moss Adams), Jessica Gulick (Katzcy), Joseph Carson (Thycotic)
    What were the highlights of this year's RSA Conference in San Francisco? Discover the major security developments that happened in the past year and the biggest topics discussed during RSAC.

    Join this exclusive panel of security experts as they share their experiences, insights and recommendations in an interactive Q&A discussion on:
    - Top security challenges and how are we solving them
    - Biggest buzzwords: Hype vs. reality
    - Exciting new tech
    - Top conference highlights
    - Cybersecurity as a boardroom issue
    - CISO's toolbox
    - Words of wisdom for people interested in security

    This is an interactive session and the audience is encouraged to ask questions during this live webcast.
  • What is the Future of Identity Authentication and Key Trends Recorded: Mar 7 2019 23 mins
    Thomas French, Industry Consultant, SAS & Vince Tocce, Host, Vince in the Bay Podcast
    Join Thomas French, Industry Consultant, SAS for a live Q&A interview at RSA Conference 2019 to learn more about the key trends in digital identity and authentication, specifically in the Financial Services industry.
    Discussion topics will include:

    Tends in payments fraud
    Ways this data is being monetized today
    Emerging cybersecurity and fraud trends that have resulted from the adoption of faster payments
    How financial institutions manage their risk postures with increasing security and fraud challenges
    How the concept of digital identity is changing in financial institutions
  • Defending Against Cyber Threats Recorded: Mar 7 2019 46 mins
    Sushila Nair (NTT Data Services), Liz Goldberg (SAS), Ken Bagnall (FireEye), Joseph Carson (Thycotic)
    "As cyber threats continue to grow, cyber vigilance is more critical than ever. How are CISOs and their security teams addressing the threat of cyber attacks like phishing, IoT-powered DDoS attacks, crippling ransomware or other attacks? How prepared are today's businesses to detect an attacker or launch the appropriate response?

    Join top security leader and experts as they discuss:
    - Top 5 cyber threats businesses face today
    - Notable cyber attack methods and strategies and how to protect against them
    - Solutions for network visibility, breach detection and response
    - Recommendations for improving security and steps to take today"
  • Enabling Privacy and Security for the Modern Enterprise Recorded: Mar 7 2019 46 mins
    Rishi Bhargava (Demisto), Sharon Besser (Guardicore), Bogdan Botezatu (Bitdefender), Vince Tocce (Vince in the Bay Podcast)
    "The world of privacy and data protection can be a minefield. With the recent regulations, how are enterprises instituting changes to achieve and maintain compliance? Join this panel of experts to get the answer to all of your privacy, security and compliance questions.

    Viewers can learn more about:
    - Current state of data regulation and the impact to businesses
    - What to expect at GDPR's first anniversary
    - Should you prepare for California's Consumer Privacy Act (CCPA)
    - Challenges to achieving compliance in an IoT world
    - How to bake privacy and security into your processes
    - Best practices for data protection and privacy from the ground up"
  • How To Help Security Be The Hero For Business Agility Recorded: Mar 7 2019 22 mins
    Cindy Blake, Senior Security Evangelist, GitLab & Greg Reber, Partner, Moss Adams
    Security is often seen as the barrier to business agility in an effort to balance risk with speed. You want to stay out of the hackees-hall-of-fame headlines. At the same time, the business is pressuring IT to reduce costs and increase flexibility, necessitating a full tilt charge toward containers, open source, and cloud (whether public or private). DevOps tools enable faster velocity while orchestrating the increasingly complex moving parts. Security wants a lasso for that bull in the china shop.

    How can you be the hero in this seemingly lose-lose situation? Join Cindy Blake, Senior Security Evangelist, GitLab as she talks about how to help reduce risk by repositioning app sec program to be more ubiquitous.
  • Latest Advances in Cloud-Deployed Security Automation and Orchestration Recorded: Mar 7 2019 27 mins
    Andrew Plato, CEO, Anitian & Rob Clyde, CISM, Board Chair, ISACA and Board Director, Titus
    Join us as Andrew Plato discusses how the latest advances in cloud-deployed security automation and orchestration are making security and compliance faster and easier than ever before possible.

    Discussion topics will include:
    - Challenging points of security and compliance in today’s environment
    - New developments in cybersecurity to meet the challenges
    - What would happen to the security team if security were to be automated
    - How data-privacy can actually be better with cloud vendors
  • Key Tips for Security Teams for Expanding Visibility and Streamlining Operations Recorded: Mar 7 2019 29 mins
    Joe Partlow, Chief Technology Officer, ReliaQuest & Chris Roberts, Chief Security Strategist, Attivio Networks
    How are security teams keeping up with the evolving security landscape? What are some of the solutions security teams are using to gain better visibility and proactivity? Discover how security teams are leveraging automation to prioritize proactive analysis and hunt activities.

    Join this video interview from RSA Conference 2019 as we discuss how best to streamline operations and improve visibility. Viewers will be able to learn more about:
    - How organizations are expanding visibility into their environments at enterprise scale
    - The importance of automation for security teams
    - How companies are approaching SOAR rollouts
    - How security teams keep up with the latest attack tools and techniques
    - Key methods for effective threat hunting
    - Essential components in building out a mature corporate Security Model
    - Key trends in security that we'll continue to see for the next year or two
  • AI For Security: What can we Learn from the Human Brain? Recorded: Mar 6 2019 27 mins
    Rudolph Araujo, VP Marketing, Awake Security & Rob Clyde, CISM, Board Chair, ISACA and Board Director, Titus
    Much has been made about the promise of artificial intelligence to solve ALL of our security problems. One way to cut through the marketing hype is to think about how “natural intelligence” or the human brain works in similar situations.

    Join Rudolph Araujo, VP Marketing at Awake Security as we discuss:
    -How the brain operate and why is that relevant to information security
    -The importance of cognition
    -The role attention filters play
    -The meaning of AI and humans

    Rudolph is 20-year security veteran that has responded to incidents, advised customers on risk posture and helped them ship secure software. He currently works at Awake Security, the world’s leading advanced network traffic analysis company, where he strives to make prospects and customers successful with Awake.
  • Managing Security for the Multi-Cloud Recorded: Mar 6 2019 46 mins
    Dave Klein (Guardicore), Tim Woods (FireMon), Tom McAndrew (Coalfire), Praveen Jain (Cavirin)
    "Enterprises today are leveraging multiple clouds and thousands of applications. What are the security and compliance risks associated with a multi-cloud strategy?

    Join cloud and security leaders in an interactive discussion to learn about:
    - The current state of cloud
    - Security risks and recommendations
    - Managing and automating security across multiple clouds and applications
    - What to expect in 2019
    - Recommendations for improving enterprise cloud security"
  • Addressing Cyber Threats and Enabling Security for the Enterprise Recorded: Mar 6 2019 51 mins
    Robert Fly (Elevate Security), Jason Pfeiffer (ReliaQuest), Chris Hatter (Nielsen), Christopher Pierson (BLACKCLOAK)
    What are the biggest cyber threats CISOs are worried about in 2019? In today's age of breaches, staying ahead of cyber threats is becoming more critical than ever. Dive into how organizations are addressing the threat of cyber attacks, how they are measuring risk, and what they are doing about improving security from some of the top experts in the field.

    Join this interactive Q&A panel of cyber security experts to learn more about:
    - What's new on the threatscape
    - Lessons from cyber attacks: methods, strategies and recommendations on how to protect against them
    - Why network visibility is key
    - What's needed for faster breach detection and response
    - How to move from ""reactive"" to ""proactive"" approach to security
    - Managing your cyber risk
    - Recommendations for improving security and steps to take today
  • Cyber Security Battles: How to Prepare and Win Recorded: Mar 6 2019 45 mins
    Shahrokh Shahidzadeh (Acceptto), George McGregor (Imperva), Avishai Wool (Algosec), Chris Morales (Vectra)
    What is the future of cyber warfare and how does it impact enterprise security? While the world has yet to see a cyber battle between AI systems, experts predict this might be on the horizon in the next three to five years.

    Join this interactive Q&A panel with security experts to learn more about:
    - The current state of cybersecurity and AI
    - How to deploy AI to detect malware
    - What is adversarial AI (or offensive AI) and how to protect against cyber attacks
    - Preparing for battle
    - What's needed to build an AI system and how to build one that can be used to bypass other AI systems
    - How to fight adversaries that have better resources
    - Protecting against nation state attacks
    - Lessons and recommendations for a more resilient enterprise
  • M-Trends 2019: Trends Behind Today’s Most Impactful Breaches and Cyber Attacks Recorded: Mar 6 2019 22 mins
    Jurgen Kutscher, Executive Vice President, Service Delivery, FireEye & Rena Stern, Director, Product Marketing, Mandiant
    The cyber security landscape is constantly evolving, with attackers becoming more and more aggressive. Companies need to know what they’re up against to ensure they are fully prepared for when a breach occurs. Over the last decade, consultants from FireEye Mandiant have shared the latest cyber security investigations and trends from the front lines with the release of the annual M-Trends Report.

    Learn more about the latest developments from the newly launched M-Trends 2019 report. Get direct insight from Jurgen Kutscher, Executive Vice President, Service Delivery, FireEye as he highlights some of the report’s most interesting and impactful findings.

    Discussion topics will include:
    - Which trends in the cybersecurity landscape should we be more mindful of than in previous years
    - New/emerging security technologies and solutions becoming more important
    - Innovative ways the industry is addressing the skills gap
    - Examples of attackers taking advantage of cloud-related weaknesses
  • The State of Open Source Security Management Recorded: Mar 6 2019 20 mins
    Rami Sass, CEO, WhiteSource & Vince Tocce, Host, Vince in the Bay Podcast
    It is no secret - open source has become the main building block in modern applications, and it is almost impossible to develop software at today's pace without it. However, as the open source community grows, and the number of reported vulnerabilities keeps climbing, manually verifying the security and compliance of open source components can no longer provide the necessary control over the security of these components.

    Join Rami Sass for a video interview at RSA Conference 2019 to learn more about:
    Why open source is being so widely embraced by enterprises for their development nowadays?
    Why should organizations take steps toward open source vulnerability management?
    What are the risks when it comes to using open source components? Are open source libraries riskier than proprietary code?
    For those businesses that are ready to implement open source management and security, where should they start?
    Where does WhiteSource see open source usage moving in the next 5 years? What are going to be the challenges that companies are going to require solutions for managing better?
  • Where Did My Password Go? Authentication Trends to Know in 2019 Recorded: Mar 5 2019 25 mins
    Jeffrey Carpenter (Crossmatch, Part of HID Global) & Vince Tocce (Vince in the Bay Podcast)
    Managing your user logons can be a daunting affair. New platforms, technologies, and regulations form the perfect storm of confusion. Join industry veteran Jeff Carpenter, cloud authentication director for Crossmatch, part of HID Global, as he walks through and makes clarion sense of the topics and trends that are top-of-mind of cybersecurity professionals.

    Join this interview where we will cover:
    - What’s driving identity assurance and authentication in 2019
    - What is risk-based authentication and why its relevant
    - Are passwords really going away?
    - Trends in Biometrics
    - Can biometrics be spoofed, and if so, what should organizations be asking their vendors?
  • CISO Challenges and Tips for a More Secure Enterprise Recorded: Mar 5 2019 43 mins
    Terence Jackson, Rudolph Araujo, Jeffrey Carpenter, Masha Sedova
    What are the key challenges CISOs are facing in 2019? Security leaders and practitioners are struggling to secure their organizations on a limited budget, a lack of trained cyber talent, ever-changing threatscape, and a disappearing security perimeter.

    Join security leaders, researchers and experts for an interactive discussion on:
    - CISO priorities for 2019
    - How to get the board on your side
    - What keeps CISOs up at night
    - Coping with analyst fatigue: Challenges and solutions
    - Recommendations for breach prevention, detection and response

    Panelists: Terence Jackson (Thycotic), Rudolph Araujo (Awake Security), Jeffrey Carpenter (Crossmatch, Part of HID Global), Masha Sedova (Elevate Security)
  • How To Survive a Data Breach Recorded: Mar 5 2019 48 mins
    Chris Roberts (Attivo Networks), Matthew Rose (Checkmarx), Chris Eng (Veracode), Nathan Wenzler (Moss Adams)
    "Data breaches continuing to make the headlines and enterprises are no longer questioning ""if"" a breach will occur, but ""when."" With the organization's data assets and reputation at stake, having a breach response plan in place is becoming increasingly important.

    Join security thought leaders and experts for an interactive Q&A to learn more about:
    - Today’s cybersecurity threat landscape
    - The true costs of a breach
    - Preventing breaches: Key factors to consider
    - Why early breach detection is critical
    - How to develop an effective incident response plan and get C-Suite buy-in
    - How to keep your company secure in 2019"
  • Improving Security in a DevOps World Recorded: Mar 5 2019 43 mins
    Michelle McLean (StackRox), Azi Cohen, (WhiteSource), Cindy Blake (GitLab), Vikram Kapoor (Lacework)
    The average enterprise today leveraging hundreds of applications across multiple clouds. With the risk of cyber attacks and breaches looming large, application security is becoming a key area of focus for organizations.

    Join this interactive Q&A panel of industry experts to learn more about:
    - How to integrate application security testing into the DevOps process early on
    - Why automation, speed and coverage are critical to the success of DevSecOps programs
    - Speed vs Security: Where do you draw the line?
    - Recommendations for improving security in 2019
  • Favorite Talks, Topic Trends…The Inside Scoop on RSA Conference 2019 Recorded: Feb 7 2019 46 mins
    Britta Glade, Wendy Nather, Rich Mogull, Diana Kelley, Ryan Berg
    Join RSA Conference Director of Content Curation and four Program Committee Members for a panel discussion about the topics they’re most excited about at RSA Conference 2019. Plus, some hints at the big discussions to take place in areas like Blockchain, security strategy and more:

    * Is Blockchain bulletproof?
    * Are there technical risks related to cryptocurrencies?
    * How to assess the coverage and gaps in your security portfolio
    * The theme of “acceptance” in security strategy
    * Exciting sessions in our Hackers & Threats track from chipset to containers, as well as smart contracts
    * Closing the enterprise gaps when it comes to moving to the cloud

    You’ll have a chance to ask questions during this live webcast. Join us for this exclusive preview of what you’ll hear about at RSA Conference 2019, March 4-8 in San Francisco.

    Britta Glade, Director Content & Curation, RSA Conference
    Wendy Nather, Director, Advisory CISOs, Duo Security
    Rich Mogull, Analyst & CEO, Securosis
    Diana Kelley, Cybersecurity Field CTO, Microsoft
    Ryan Berg, Fellow, Alert Logic
Insights from RSAC 2019
BrightTALK @ brings you insights from RSA Conference 2019

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Key Tips for Security Teams for Expanding Visibility and Streamlining Operations
  • Live at: Mar 7 2019 12:00 am
  • Presented by: Joe Partlow, Chief Technology Officer, ReliaQuest & Chris Roberts, Chief Security Strategist, Attivio Networks
  • From:
Your email has been sent.
or close