Hi [[ session.user.profile.firstName ]]

Creating the SOC of the Future

The Security Operations Centre (SOC) has historically played the important role of ‘command and control’ hub for an organisation’s cybersecurity efforts. However, the reactive SOC of yester-year cannot keep up with today’s advanced adversaries and is failing to keep organisations safe from unknown cyber threats. This must change.

In this webcast you will learn:

- How the global security community is coming together to define the SOC of the Future requirements

- How Human-Machine intelligence, Artificial Intelligence and Advanced Analytics Software give organisations an enduring advantage over the adversary.

- Emerging analytics tools, real world use cases and software-driven solutions that are transforming the way security teams detect, investigate, and respond to unknown threats across endpoints, networks, and the cloud
Recorded Jan 7 2020 43 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Wendy Thomas, Chief Product Officer, Jon R. Ramsey, Chief Technical Officer
Presentation preview: Creating the SOC of the Future

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Creating the SOC of the Future Recorded: Jan 7 2020 43 mins
    Wendy Thomas, Chief Product Officer, Jon R. Ramsey, Chief Technical Officer
    The Security Operations Centre (SOC) has historically played the important role of ‘command and control’ hub for an organisation’s cybersecurity efforts. However, the reactive SOC of yester-year cannot keep up with today’s advanced adversaries and is failing to keep organisations safe from unknown cyber threats. This must change.

    In this webcast you will learn:

    - How the global security community is coming together to define the SOC of the Future requirements

    - How Human-Machine intelligence, Artificial Intelligence and Advanced Analytics Software give organisations an enduring advantage over the adversary.

    - Emerging analytics tools, real world use cases and software-driven solutions that are transforming the way security teams detect, investigate, and respond to unknown threats across endpoints, networks, and the cloud
  • The Transformative Effect of Data Science and Machine Learning Recorded: Sep 3 2019 58 mins
    Tim Vidas - Senior Distinguished Engineer, Nash Borges PhD - Sr Director of Engineering and Data Science
    The combination of big data and machine learning is making it possible for defenders with limited resources and expertise to detect and respond to unknown threats faster than ever before.

    In an industry forever locked in an adversarial battle with increasingly sophisticated actors, Tim Vidas, Distinguished Senior Engineer, and Nash Borges PhD, Sr Director of Engineering and Data Science at Secureworks explain how the power of machine learning combined with human intelligence have become fundamental to defending the digital economy.

    You will learn:

    - What the threat looks like on a global scale, as observed through Secureworks' Incident Response engagements
    - Data Science 101, including definitions of Data Science (DS), Artificial Intelligence (AI), Machine Learning (ML) and Deep Learning (DL)
    - How our detectors work, including Domain Generation Algorithm (DGA) Detection
  • Introducing Red Cloak™ Threat Detection & Response Recorded: Aug 29 2019 58 mins
    John H. Collins, CISSP - Director, Solution Engineering SaaS Security Applications
    For more than 20 years, you’ve known the world-leading threat intelligence and industry-recognised services from Secureworks. Now, it’s time you know Red Cloak Threat Detection and Response, and hear directly from our experts.

    Red Cloak Threat Detection and Response is a cloud-based security analytics application that transforms the way your security team detects, investigates and responds to threats across your endpoints, network and cloud. Built by a team of data scientists and engineers with experience solving big data cybersecurity challenges for intelligence agencies, Red Cloak TDR enables you to detect advanced threats, trust your alerts, streamline and collaborate on investigations and automate the right action.

    What You Will Learn:

    - What is Red Cloak TDR?
    - The benefits of TDR in advanced threat detection
    - How TDR helps to improve investigation to enable organisations to take the right action.
Tradecraft for the good guys
At Secureworks, we’ve helped you detect and respond to threats for 20 years. Now, Red Cloak™ Threat Detection and Response puts that power in your hands.

We’ve obsessively studied threat actor tactics since 1999 and know the hallmarks of even the stealthiest of attack techniques. So, when Red Cloak Threat Detection & Response analyses data from your environment, it applies our advanced analytics and threat intelligence to alert you to suspicious activity that needs attention.

From there, investigation is simple and collaborative to get you to a conclusion fast. And when an incident requires a response, you can automate actions to contain incidents with minimal effort and maximum speed. The icing on the cake? We don’t charge by data consumption so you are free to process the security-relevant data you need to keep your organisation safe.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Creating the SOC of the Future
  • Live at: Jan 7 2020 2:00 pm
  • Presented by: Wendy Thomas, Chief Product Officer, Jon R. Ramsey, Chief Technical Officer
  • From:
Your email has been sent.
or close