Hi [[ session.user.profile.firstName ]]

Common and Best Practices for Security Operations Centers

The 2019 SANS Security Operations Center (SOC) Survey is focused on providing objective data to security leaders who are looking to establish a SOC or optimize an existing one. This webcast will capture common and best practices, provide defendable metrics that can be used to justify SOC resources to management, and highlight the key areas that SOC managers should prioritize to increase the effectiveness and efficiency of security operations.
Attendees at this webcast will learn:
- What types of SOC infrastructures are used most frequently
- How SOCs interact with network operations centers and incident response teams
- What activities typically define a SOC and how many of them are outsourced
- Which SOC-related technologies organizations are most satisfied with
- How organizations use metrics to evaluate SOC performance
- What challenges inhibit integration and utilization of a centralized SOC model
Recorded Aug 20 2019 64 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Chrristopher Crowley, SANS Senior Instructor
Presentation preview: Common and Best Practices for Security Operations Centers

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • New Approaches To DFIR That Can Radically Reduce Your Time To Respond to Attacks Dec 10 2019 5:00 pm UTC 60 mins
    Shiran Grinberg, Senior DFIR Research Analyst at CyberProof
    As cyber attacks continue to evolve, many organizations find they require digital forensics (DF) to identify and thwart attacks. But what is DF, and how does it relate to security operations?
    What you will learn:
    - What is DFIR and why is it important in today’s expanding attack surface?
    - What are the essential elements (people, technologies, processes) needed for DFIR?
    - How does an effective DFIR program help security operation centers and improve performance such as mean time to response (MTTR)?
    - How can CyberProof help you optimize your DFIR and SOC team effectiveness
  • How To Prevent The Next Breach With Threat Intelligence Nov 6 2019 5:00 pm UTC 60 mins
    Orel Pery, Senior Threat Intelligence Analyst
    How do you develop a cyber security strategy for a business. The quandary is that it’s simply not possible to defend a business against every potential threat. There isn’t enough time, money, or human resources. How does one know where to invest?
    That’s where cyber threat intelligence (CTI) comes in.

    What you will learn:
    - What is CTI and why is it so important to have such expertise in today’s expanding attack surface?
    - Discussion about the latest tools and methodologies used by CyberProof’s CTI team
    - How does an effective CTI program help security operation centers and improve performance and reduce risk?
    - How can CyberProof help you optimize your Threat Intelligence and SOC team effectiveness
  • How AI Can Increase the Efficiency of Your SOC Oct 8 2019 5:00 pm UTC 60 mins
    Tony Velleca, CEO CyberProof
    AI is becoming increasingly important in cyber security – while the involvement of humans remains ever more critical. According to Deloitte’s 2019 Global Human Capital Trends, most organizations expect to increase use of AI over the next three years. This increased adoption of AI is creating many more alerts. And although there is an increase in security spend it’s not enough to cover the explosion of information alerts and threat techniques – without using AI for efficiency.

    This webinar focuses on how AI can augment the capabilities of the human analysts to increase the effectiveness of your security team.

    What you will learn about:
    • Trends in AI for cyber security
    • How AI Impacts the work of human analysts
    • Leveraging AI to Work Faster and Minimize Damage
    • The unique role of human analysts in an advanced, AI-driven SOC
    • How AI increases the security posture of enterprises
  • How Threat Intelligence-Driven Security Ops Reduces Cyber Incidents Sep 26 2019 4:00 pm UTC 60 mins
    Orel Pery, CyberProof Threat Intelligence Team Leader
    In this webinar, we will look into Dark Web marketplaces where cyber criminals, hacktivists, fraudsters, and malware developers share, sell, and pay for proprietary data and compromised credentials.
    What you will learn about:
    •New and emerging exploits and hacking tools being developed and traded in dark web marketplaces
    •Virtual HUMINT research that deploys and operates Avatars for collecting the traded malicious codes, which are used by forensics teams for analyzing and uncovering technical indicators associated with the exploit or the malware
    •How Indicators of Compromise (IOCs) are created to generate alerts on active threats within the organization to help spot and block malicious actors before they turn into active attackers
    •How CyberProof can help you optimize your Threat Intelligence and Security team effectiveness
  • Common and Best Practices for Security Operations Centers Recorded: Aug 20 2019 64 mins
    Chrristopher Crowley, SANS Senior Instructor
    The 2019 SANS Security Operations Center (SOC) Survey is focused on providing objective data to security leaders who are looking to establish a SOC or optimize an existing one. This webcast will capture common and best practices, provide defendable metrics that can be used to justify SOC resources to management, and highlight the key areas that SOC managers should prioritize to increase the effectiveness and efficiency of security operations.
    Attendees at this webcast will learn:
    - What types of SOC infrastructures are used most frequently
    - How SOCs interact with network operations centers and incident response teams
    - What activities typically define a SOC and how many of them are outsourced
    - Which SOC-related technologies organizations are most satisfied with
    - How organizations use metrics to evaluate SOC performance
    - What challenges inhibit integration and utilization of a centralized SOC model
  • End-to-End Vulnerability and Risk Management Across the Enterprise Recorded: Aug 14 2019 44 mins
    Brian McGraw, Global Head of Advisory Services, CyberProof, a UST Company; John Steven, CTO, ZeroNorth
    Digital transformation is redefining organizations in all industries into software-centric businesses. Assessing, planning and implementing vulnerability management across your organization is therefore crucial. In this webinar, CyberProof, a UST Global company, and ZeroNorth will share details on the companies’ integrated solution and discuss how customers are benefitting from end-to-end vulnerability & risk management across the enterprise.
  • Security Thought Leadership: New insights uncover ways to reduce risk Recorded: Jul 9 2019 59 mins
    Jeff Pollard, Principal Analyst, Security & Risk, Forrester and Tony Velleca, CEO, CyberProof
    New research from Forrester indicates that today more than ever, companies struggle to protect themselves from the imminent threat of cyber attacks. Recognizing the need for a security solution, companies are understanding that this requires substantial resources and time, forcing many of them to outsource this mission to vendors who have the available capacity to measurably reduce their risk. Sign up for this webinar to learn how to:
    - Augment your security team while maintaining control and transparency.
    - Learn how emerging MSSPs are changing the rules of the game with outcomes based service offerings
    - Outsourcing staffing closes the skills gap effecting many organizations
    - Emerging MSSPs contribute to improved cybersecurity and reduces risk
Managed Security Services
CyberProof is a security services provider, whose mission is to relentlessly help our customers stay ahead of security threats by leveraging our advanced analytics and highly automated detection and response platform. In the face of a hostile and evolving threat landscape, we collaborate with our clients, academia and start-up innovators to create secure digital ecosystems and continuously advance the art of cyber defense.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Common and Best Practices for Security Operations Centers
  • Live at: Aug 20 2019 4:35 pm
  • Presented by: Chrristopher Crowley, SANS Senior Instructor
  • From:
Your email has been sent.
or close