Pull your SOC up with continuous security validation and optimization

Logo
Presented by

David Klein, Director, Cyber Evangelist

About this talk

Today’s enterprises are dynamic, changing all the time. Attackers are as well. Traditional methods of validation cannot keep up. Protecting your organization requires developing automated and continuous methodology for security control optimization and a better methodology to nurture and educate your SOC cyber-defenders as they do. In this webinar we look at how adopting an offensive cybersecurity strategy by adopting Breach Attack Simulation methodology to easily and effectively optimize your SoC’s people, processes and security controls. Attend this event/webinar to learn: • Why SOC validation is crucial in confronting threat evolutions. • The elements of a continuous SOC validation and improvement program. • How continuous and automated red teaming and BAS make SOC validation achievable with existing resources. Dave Klein is a veteran cybersecurity professional with extensive enterprise, US federal and state and local government experience. He has worked on many incident response cases and worked on the Presidential Directive for Critical Infrastructure Security and Resilience.
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (116)
Subscribers (15977)
Cymulate exposure management and security validation drives continuous threat exposure management programs and supports both the technical and business requirements of scoping, discovery, prioritization, validation, and mobilization.