Whether you have a full-blown security operations center (SOC) or just a single security person, there are some functions that every organization must execute in order to keep their most sensitive data safe. In this instructive keynote address, top SOC experts discuss some of the key capabilities required for security operations, as well as essential tools, people, and practices for building out the security operations function in your organization.