Hi [[ session.user.profile.firstName ]]

Common and Best Practices for Security Operations Centers

The 2019 SANS Security Operations Center (SOC) Survey is focused on providing objective data to security leaders who are looking to establish a SOC or optimize an existing one. This webcast will capture common and best practices, provide defendable metrics that can be used to justify SOC resources to management, and highlight the key areas that SOC managers should prioritize to increase the effectiveness and efficiency of security operations.
Attendees at this webcast will learn:
- What types of SOC infrastructures are used most frequently
- How SOCs interact with network operations centers and incident response teams
- What activities typically define a SOC and how many of them are outsourced
- Which SOC-related technologies organizations are most satisfied with
- How organizations use metrics to evaluate SOC performance
- What challenges inhibit integration and utilization of a centralized SOC model
Recorded Aug 20 2019 64 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Chrristopher Crowley, SANS Senior Instructor
Presentation preview: Common and Best Practices for Security Operations Centers

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Cracking the Code: Quality Engineering Models for Continuous Delivery Apr 6 2020 2:30 pm UTC 60 mins
    Featuring guest speaker, Forrester analyst, Diego Lo Giudice and UST's Head of Testing & Quality Engineering, George Ukkuru
    As continuous delivery practices accelerate the volume of releases, test teams must find ways to validate software performance faster without compromising quality. Traditional testing practices can’t keep pace with modern application developments, and scaling testing for efficiency, accuracy and speed is critical. Test Automation has become an essential element of the end to end test lifecycle in every organization. Most tool-based testing approaches fall short of addressing test lifecycle automation needs or make it quite challenging. This has paved the way to platform-centric Quality Engineering.

    Join Forrester’s expert on SDLC processes and practices--our guest speaker, Vice President and Principal Analyst Diego Lo Giudice – and UST Global’ s Head of Testing and Quality Engineering Services, George Ukkuru, for a webinar discussing the modern methods and techniques around quality engineering. Learn about how UST’s quality engineering platform, NoSkript™ can improve quality, efficiency, and cost while accelerating cycle time.

    What you will learn:
    - How to apply Shift Left and Shift Right practices for early defect identification and to minimize business risks
    - Why should a quality engineering team focus on an API-led automation approach
    - How can automated test design help to optimize test cases and reduce maintenance efforts
    - How to use prefabricated test data to improve the accuracy of Artificial Intelligence Solutions
  • Streamlining Your Response to Cyber Attacks – An Analyst’s Perspective Recorded: Mar 18 2020 30 mins
    Hen Porcilan, Senior Security Analyst
    How does CyberProof help organizations respond to cyber threats more effectively? And how does CyberProof help cyber analysts in the day-to-day work of security operations? In this interview, cyber security analyst Hen Porcilan gives us unique insight into what it’s really like to work with CyberProof’s platform and reduce cyber security risk.
    Learning Outcomes:
    • The role of automated alerts and enrichment in streamlining cyber security processes
    • Integrating multiple tools efficiently
    • How to reduce human error in the security operations center
    • Running an SOC with a relatively small team of human analysts, whose work is augmented by artificial intelligence tools
    • Leveraging virtual analysts to reduce mean time to detect and respond
  • A Digital Chat for Financial Operations: Navigating the Path to Automation Recorded: Feb 20 2020 59 mins
    Speakers: Ramya Kannan, VP Delivery and Venkata Sankaran, Director Finance; Moderator: Sajesh Gopinath, GM UST SmartOps
    Are you in procurement or financial operations? Do you manage a huge number of vendors, the account and payment of invoices, and cash reconciliation? You probably recognize that financial operations are typically highly manual, repetitive tasks that are critical for cash flow and managing operations.

    Now you can re-imagine your finance operations with automation from extracting key data to keeping accurate accounting records, automating workflows and paying vendors on time - not too early, not late.

    Learn more to see how we at UST Global and our customers have approached modernizing financial operations with automation.
  • Pro-Active Intruder Hunting – Part 2 Recorded: Feb 18 2020 51 mins
    Bruce Roton: CISSP, CISA, CISM, CIPP/US, C|EH, C|CISO, CRISC, ISO-27001, CGEIT, CSSGB(IT), ITIL, CSMCP
    In the last decade, it has been a common axiom of cyber security that it is not a question of if an organization’s defenses will be breached, but only of when. And while cyber-attacks and data breaches are always business disrupting, they can also be very costly. Therefore, Time to Detection and Time to Effective Respond have become critical measurements for the success of any organization’s cyber security program.
    This is the second webinar in a 2-part series where we'll delve deeper into the issues and processes of intruder detection, from first response through intruder eviction and remediation.
  • Introduction to Pro-Active Intruder Hunting - Part 1 Recorded: Jan 14 2020 49 mins
    Bruce Roton, CISSP, CISA, CISM, CIPP/US, C|EH, C|CISO, CRISC, ISO-27001, CGEIT, CSSGB(IT), ITIL, CSMCP
    It is a common axiom of cyber security wisdom that it is not a question of if an organization’s defenses will be breached, but only a question of when. Further, while cyber-attacks and data breaches are always business disrupting, they can also be very costly. Therefore, Time to Detection and Time to Effective Respond have become critical measurements for the success of any organization’s cyber security program. An effective and proactive Intruder Hunting Program, combined with a well-planned cyber response, can help stop cyber-attacks before they become business disrupting events, and should be a cornerstone of any Enterprise Cyber Security Program.
  • UST SmartOps: Reimagining IT Operations with Cognitive Computing Recorded: Jan 9 2020 46 mins
    Adnan Masood, Ph.D., Chief Architect AI/ML and Jibu George, Head of Customer Success-- UST SmartOps
    The fourth industrial revolution is upon us, and IT Operations is at the forefront. The office of the CIO is constantly evaluating how to maintain legacy systems, migrate to the latest technologies, assess operational and security risk, and making those lasting commitments for what decision-making engines are to be handled by humans versus bots. What are the challenges to your current environments in adopting intelligent automation? Learn more to see how to transform your IT Operations.
  • New Approaches To DFIR That Can Radically Reduce Your Time To Respond to Attacks Recorded: Dec 10 2019 23 mins
    Sagi Sandik, Senior SOC-DFIR Analyst at CyberProof and Howard Silverman, Head of Marketing at CyberProof
    As cyber attacks continue to evolve, many organizations find they require digital forensics (DF) to identify and thwart attacks. But what is DF, and how does it relate to security operations?
    What you will learn:
    - What is DFIR and why is it important in today’s expanding attack surface?
    - What are the essential elements (people, technologies, processes) needed for DFIR?
    - How does an effective DFIR program help security operation centers and improve performance such as mean time to response (MTTR)?
    - How can CyberProof help you optimize your DFIR and SOC team effectiveness
  • How AI Can Increase the Efficiency of Your SOC Recorded: Nov 11 2019 31 mins
    Tony Velleca, CEO CyberProof
    AI is becoming increasingly important in cyber security – while the involvement of humans remains ever more critical. According to Deloitte’s 2019 Global Human Capital Trends, most organizations expect to increase use of AI over the next three years. This increased adoption of AI is creating many more alerts. And although there is an increase in security spend it’s not enough to cover the explosion of information alerts and threat techniques – without using AI for efficiency.

    This webinar focuses on how AI can augment the capabilities of the human analysts to increase the effectiveness of your security team.

    What you will learn about:
    • Trends in AI for cyber security
    • How AI Impacts the work of human analysts
    • Leveraging AI to Work Faster and Minimize Damage
    • The unique role of human analysts in an advanced, AI-driven SOC
    • How AI increases the security posture of enterprises
  • How to Reverse Cyber Security’s Self-Inflicted Staffing Shortage Recorded: Nov 6 2019 51 mins
    Jeff Pollard, Forrester Principal Cyber Security Analyst and Howard Silverman, CyberProof Head of Marketing
    Every day, we hear news stories, speeches, and vendor pitches that lament our acute cybersecurity talent shortage, one that will take years to address. However, the shortage is largely self-inflicted, which means CISOs can tackle it quickly by changing the ways they recruit, train, and retain people. In this webinar you will learn about:
    - The myths and facts around cyber security staffing
    - How automation and orchestration is being used to reduce analyst overload and fatigue
    - A more effective way for security pros to build a complete, qualified security team.
    - Tips for retaining staff and augmenting team skills.
  • How AI Can Increase the Efficiency of Your SOC Recorded: Oct 8 2019 32 mins
    Tony Velleca, CEO CyberProof
    AI is becoming increasingly important in cyber security – while the involvement of humans remains ever more critical. According to Deloitte’s 2019 Global Human Capital Trends, most organizations expect to increase use of AI over the next three years. This increased adoption of AI is creating many more alerts. And although there is an increase in security spend it’s not enough to cover the explosion of information alerts and threat techniques – without using AI for efficiency.

    This webinar focuses on how AI can augment the capabilities of the human analysts to increase the effectiveness of your security team.

    What you will learn about:
    • Trends in AI for cyber security
    • How AI Impacts the work of human analysts
    • Leveraging AI to Work Faster and Minimize Damage
    • The unique role of human analysts in an advanced, AI-driven SOC
    • How AI increases the security posture of enterprises
  • How Threat Intelligence-Driven Security Ops Reduces Cyber Incidents Recorded: Sep 26 2019 28 mins
    Orel Pery, CyberProof Threat Intelligence Team Leader
    In this webinar, we will look into Dark Web marketplaces where cyber criminals, hacktivists, fraudsters, and malware developers share, sell, and pay for proprietary data and compromised credentials.
    What you will learn about:
    •New and emerging exploits and hacking tools being developed and traded in dark web marketplaces
    •Virtual HUMINT research that deploys and operates Avatars for collecting the traded malicious codes, which are used by forensics teams for analyzing and uncovering technical indicators associated with the exploit or the malware
    •How Indicators of Compromise (IOCs) are created to generate alerts on active threats within the organization to help spot and block malicious actors before they turn into active attackers
    •How CyberProof can help you optimize your Threat Intelligence and Security team effectiveness
  • Common and Best Practices for Security Operations Centers Recorded: Aug 20 2019 64 mins
    Chrristopher Crowley, SANS Senior Instructor
    The 2019 SANS Security Operations Center (SOC) Survey is focused on providing objective data to security leaders who are looking to establish a SOC or optimize an existing one. This webcast will capture common and best practices, provide defendable metrics that can be used to justify SOC resources to management, and highlight the key areas that SOC managers should prioritize to increase the effectiveness and efficiency of security operations.
    Attendees at this webcast will learn:
    - What types of SOC infrastructures are used most frequently
    - How SOCs interact with network operations centers and incident response teams
    - What activities typically define a SOC and how many of them are outsourced
    - Which SOC-related technologies organizations are most satisfied with
    - How organizations use metrics to evaluate SOC performance
    - What challenges inhibit integration and utilization of a centralized SOC model
  • End-to-End Vulnerability and Risk Management Across the Enterprise Recorded: Aug 14 2019 44 mins
    Brian McGraw, Global Head of Advisory Services, CyberProof, a UST Company; John Steven, CTO, ZeroNorth
    Digital transformation is redefining organizations in all industries into software-centric businesses. Assessing, planning and implementing vulnerability management across your organization is therefore crucial. In this webinar, CyberProof, a UST Global company, and ZeroNorth will share details on the companies’ integrated solution and discuss how customers are benefitting from end-to-end vulnerability & risk management across the enterprise.
  • Security Thought Leadership: New insights uncover ways to reduce risk Recorded: Jul 9 2019 59 mins
    Jeff Pollard, Principal Analyst, Security & Risk, Forrester and Tony Velleca, CEO, CyberProof
    New research from Forrester indicates that today more than ever, companies struggle to protect themselves from the imminent threat of cyber attacks. Recognizing the need for a security solution, companies are understanding that this requires substantial resources and time, forcing many of them to outsource this mission to vendors who have the available capacity to measurably reduce their risk. Sign up for this webinar to learn how to:
    - Augment your security team while maintaining control and transparency.
    - Learn how emerging MSSPs are changing the rules of the game with outcomes based service offerings
    - Outsourcing staffing closes the skills gap effecting many organizations
    - Emerging MSSPs contribute to improved cybersecurity and reduces risk
A Smarter SOC
CyberProof is a security services company that intelligently manages your incident detection and response. Our solution provides complete transparency and dramatically reduces the cost and time needed to respond to security threats and minimize business impact. SeeMo, our virtual analyst, together with our experts and your team automates and accelerates cyber operations by learning and adapting from endless sources of data and responds to requests by providing context and actionable information. This allows our nation-state cyber experts to prioritize the most urgent incidents and proactively identify and respond to potential threats. We collaborate with our global clients, academia and the technology ecosystem to continuously advance the art of cyber defense.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Common and Best Practices for Security Operations Centers
  • Live at: Aug 20 2019 4:35 pm
  • Presented by: Chrristopher Crowley, SANS Senior Instructor
  • From:
Your email has been sent.
or close