Hi [[ session.user.profile.firstName ]]

3 Security Automation Capabilities You Won’t See at Black Hat

Attending Black Hat? Whether you are or not, you won’t want to miss this demonstration of some essential security automation capabilities that every SecOps team today needs. More than just security orchestration, automation and response (SOAR), security operations teams must embrace codified best-practices and real-time collaboration that is built to track, manage and respond to threats with executive-level metrics and reporting. In this session you will quickly realize the power of security automation as a “system of record” for security operations.

In this demo, you will see several cutting-edge capabilities that include:
- Reporting and dashboarding that extends beyond the SOC to provide instantaneous feedback on critical metrics for SOC and non-SOC personnel.
- As data continues to change in an incident, your severity, classification and other values may need to change too. Continuous workflow evaluation ensures the record is consistently re-evaluated and the updated record executes additional tasks and workflows needed based on the new values.
- A Collaboration Hub that can leverage common communication channels within your organization to collaborate with security team business partners to break down cross-organizational communication silos.

Join us for this security automation insight you won’t see at Black Hat.
Recorded Aug 11 2021 42 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jay Spann, Security Automation Evangelist, Swimlane
Presentation preview: 3 Security Automation Capabilities You Won’t See at Black Hat
  • Channel
  • Channel profile
  • Common SOAR Use Cases to Boost Your SOC Sep 29 2021 4:00 pm UTC 56 mins
    Jay Spann, Swimlane SOAR Evangelist
    Many organizations are adopting Security Orchestration, Automation and Response (SOAR) to improve their security analytics and threat intelligence visibility, as well as enable intelligent decision-making. In this webinar, we’ll take a back-to-basics approach to SOAR to dig into the common use cases where security professionals are seeing the biggest impact in their Security Operations Centers (SOCs).

    During the session you’ll learn:
    - The typical challenges that SOAR platforms address.
    - Five common SOAR use cases that make the biggest improvements in your SOC.
    - A few not-so-common, innovative uses cases for SOAR.

    Register for this webinar now to learn how key SOAR use cases can help to optimize and improve your security operations.
  • How One Organization Embraced Automation for Cyber Resilience Recorded: Sep 8 2021 30 mins
    Bastien Treptel, co-founder of CTRL Group
    Hear from your peers on how one organization embraced security orchestration, automation and response (SOAR) in their cyber resiliency journey. Bastien Treptel, co-founder of Australia's progressive information security firm, CTRL Group, will share how his organization leaned into automation and were able to see massive gains in just a short period.

    At this event, we'll cover: Why automation is imperative in cybersecurity, How Swimlane helps CTRL Group realize great efficiencies in their workflows, and how automation can help with managing an attack, along with a real life case study.
  • 3 Security Automation Capabilities You Won’t See at Black Hat Recorded: Aug 11 2021 42 mins
    Jay Spann, Security Automation Evangelist, Swimlane
    Attending Black Hat? Whether you are or not, you won’t want to miss this demonstration of some essential security automation capabilities that every SecOps team today needs. More than just security orchestration, automation and response (SOAR), security operations teams must embrace codified best-practices and real-time collaboration that is built to track, manage and respond to threats with executive-level metrics and reporting. In this session you will quickly realize the power of security automation as a “system of record” for security operations.

    In this demo, you will see several cutting-edge capabilities that include:
    - Reporting and dashboarding that extends beyond the SOC to provide instantaneous feedback on critical metrics for SOC and non-SOC personnel.
    - As data continues to change in an incident, your severity, classification and other values may need to change too. Continuous workflow evaluation ensures the record is consistently re-evaluated and the updated record executes additional tasks and workflows needed based on the new values.
    - A Collaboration Hub that can leverage common communication channels within your organization to collaborate with security team business partners to break down cross-organizational communication silos.

    Join us for this security automation insight you won’t see at Black Hat.
  • SOAR with Machine-Speed Endpoint Investigation and Remediation Recorded: Jul 20 2021 55 mins
    Jay Spann & Josh Rickard (Swimlane), Jason Teplitz (CrowdStrike)
    The joint integration of the Swimlane security orchestration, automation and response, (SOAR) platform and the CrowdStrike® Falcon boosts enterprises’ response capabilities. In addition to allowing companies to investigate, interact and enforce response and remediation directly with the endpoint at machine-speed, the combined solution also improves collaboration across teams and allows for better tracking of incidents, indicators and responses in disparate tools.
  • Reduce Security Risk with EDR and IR Automation Recorded: Aug 20 2020 48 mins
    Jay Spann, SOAR Evangelist, and Lee Rothman, Vice President of Global Systems Engineering, at Swimlane
    Modern SOCs struggle to respond to threats promptly and consistently because of limited or inadequate personnel, processes and procedures. Your endpoint detection and response (EDR) and incident response (IR) tools are only part of the solution. The key to increasing the value of these tools lies in ensuring they are acted upon immediately and at machine speed. Automated monitoring of your existing tools provides detailed metrics so you can identify areas of success and where improvements are needed, as well as evaluate the effectiveness of your tools, teams and processes.

    Join Jay Spann, SOAR Evangelist and Technical Product Marketing Manager along with Lee Rothman, Vice President of Global Sales Engineering, as they discuss using automation to better leverage your existing EDR and IR solutions and ways to monitor them for valuable feedback. During this live webinar, you will learn:

    • How automation improves the usefulness of your existing EDR and IR solutions
    • Why automating your processes guarantees better results
    • How automation increases analyst efficiency and morale
    • Best practices to implement automated processes with your existing tools and environment
    • Ways to identify and track the most useful metrics

    Register today for this August 20th webinar!
  • Optimizing Data Breach Incident Response Recorded: Apr 14 2020 45 mins
    Nick Tausek, Security Research Engineer, Swimlane
    The average time to identify a data breach is 206 days. In this webinar, we’ll explore the current state of the cybersecurity industry with regards to breach detection and incident response including where we’re succeeding and where we can do better, as well as how security orchestration, automation and response (SOAR) can help to fill the gaps. With data breaches costing organizations millions of dollars per breach, now is the time to take proactive steps to protect your network from malicious actors, ransomware, and insider threats.

    We’ll also discuss the importance of the following:
    - A good incident response plan (IRP)
    - Some tips on how to develop an IRP
    - How SOAR can facilitate your IRP execution

    About the presenter:
    Nick Tausek is a Security Research Engineer at Swimlane. Prior to Swimlane, Nick was an information security analyst for 8 years within the government, NGO, corporate, and MSSPs industries. He has also spent some time working in VOIP, tech support, web design and translation services as well. Nick is trilingual as he speaks English, Japanese, German, and a little French. He is an avid programmer in Python, but is comfortable in a handful of other languages including JS, VBA, HTML, CSS and more.
  • Top CISO Priorities for 2020 Recorded: Feb 26 2020 54 mins
    Chris Roberts, Kunal Anand, Jim Hansen & Hank Thomas
    What are the key areas CISOs are focusing on in 2020 and beyond? From identity management in a multi-cloud world, to protecting assets with encryption and zero trust, to educating DevOps and other teams on security rather than control, to dealing with alert fatigue and an ever-changing threat landscape - how are CISOs coping and what are their key initiatives for 2020? 
    Join this panel of security leaders and experts as they discuss:
    - The NIST model and how it applies to what's currently on the CISO's plate
    - Security strategies for preventing and responding to breaches 
    - Workforce challenges and opportunities
    - CISO to CISO advice
    - Key initiatives to focus on in 2020
    This panel will be broadcast LIVE during RSA Conference in San Francisco.

    Speakers:
    Chris Roberts, Chief Security Strategist, Attivo Networks (Moderator)
    Kunal Anand, CTO, Imperva
    Jim Hansen, President & COO, Swimlane
    Hank Thomas, CEO, Strategic Cyber Ventures
  • How SOAR Can Level Up Your Security Team Recorded: Feb 26 2020 27 mins
    Cody Cornell, CEO & Co-Founder, Swimlane & Frank Downs, Director of Cybersecurity Practices, ISACA
    Many organizations are adopting Security Orchestration, Automation and Response (SOAR) to improve their security analytics and threat intelligence visibility, as well as enable intelligent decision-making. SOAR also speeds up the incident response process by replacing repetitive, manual tasks with automated workflows.

    In the age of breaches, learn how to empower your security operations team with machine-speed decision making. Discover how a security orchestration, automation and response platform adapts to fit your people, security processes and technologies.

    Join this video interview with Cody Cornell, CEO & Co-Founder, Swimlane at RSA Conference in San Francisco to learn more about:
    - What is security orchestration, automation and response or SOAR
    - How SOAR is different from infrastructure automation or network orchestration
    - How SOAR will evolve over the next 5 years
    - What technology is needed before implementing SOAR
    - How to most effectively implement SOAR technology

    This video interview will be broadcast Live from San Francisco during RSA Conference 2020.
  • 7 Steps to Automating Threat Detection and Analysis Recorded: Oct 8 2019 45 mins
    Josh Rickard, Security Research Engineer, Swimlane and Nick Tausek, Security Research Engineer, Swimlane
    There are numerous cybersecurity tools available to help organizations detect threats. But, this volume creates a number of challenges, including siloed and disparate systems. While these tools are intended to improve the organization’s security posture, many of them require sophisticated staff with complex training to leverage them effectively. Sometimes, even with training, systems generate so many alerts the highly-skilled staff is unable to analyze and respond to real threats in a timely manner. This is not sustainable for even the largest security operations center (SOC). A holistic, automated approach to threat detection and analysis is necessary.


    In this webinar, Swimlane’s Josh Rickard will provide seven steps to automate threat detection and analysis that can be used in any-sized SOC. This process enables analysts to stop focusing on detection and focus instead on a proactive SOC model, improving the security posture of the organization and dramatically reducing threat risk. You will learn how to:

    - Monitor everything within your security stack;
    - Build a system that can automatically detect every form of attack;
    - Improve your ability to detect attacks and avoid false positives;
    - Detect security threats in real time;
    - And more!
  • Breach Detection and Response:Establishing Incident Response Processes and Plans Recorded: Aug 22 2019 46 mins
    Josh Rickard, Security Research Engineer, Rebekah Wilke, SOAR Advocate, at Swimlane
    Many organizations lack adequate personnel, processes, procedures and technologies to detect breaches in real time. They have an even harder time responding promptly and accurately.

    In this webcast, Swimlane Research Engineer Josh Rickard and SOAR Advocate Rebekah Wilke will discuss the importance of establishing sufficient incident response processes and clear guidelines surrounding incident response plans.

    The two security orchestration, automation and response (SOAR) experts will outline how formulating, implementing and maintaining an up-to-date, robust breach detection and incident response plan will:

    - Reduce mean time to detection (MTTD) and mean time to resolution (MTTR).
    - Ease analyst burnout, enabling retention.
    - Allow analysts the opportunity to focus on anomalous behavior that could have a larger impact on the business.
    - Expedite disaster recovery for reduced security risk.
Automate the world of security.
Swimlane’s SOAR platform helps organizations manage the growing volume of alerts more efficiently by automating time-consuming incident response processes. The solution collects security alert data from virtually any security platform with minimal effort and then automatically responds to alerts using automated workflows and playbooks.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: 3 Security Automation Capabilities You Won’t See at Black Hat
  • Live at: Aug 11 2021 3:00 pm
  • Presented by: Jay Spann, Security Automation Evangelist, Swimlane
  • From:
Your email has been sent.
or close