InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

5 steps to building an effective SOC optimization program

Presented by

Avihai Ben-Yossef, Co-Founder & CTO at Cymulate

About this talk

Preventive security controls are insufficient to protect an organization effectively. They have to work in tandem with detection, threat hunting, and incident response capabilities. Companies that take a proactive stance to defend their critical assets rely on the people, processes, and technologies that go into their SOC to detect and thwart malicious activity. This creates the demand for ongoing optimization in the face of a dynamic threat landscape. Attend this session to learn: · How to apply MITRE ATT&CK in the detection development process · How to develop and validate detections in an environment that lacks homogeneity · How to leverage automation and build a continuous program of SOC validation
Cymulate Exposure & Security Validation

Cymulate Exposure & Security Validation

16888 subscribers125 talks
Security Validation and Threat Exposure Management
Cymulate exposure management and security validation drives continuous threat exposure management programs and supports both the technical and business requirements of scoping, discovery, prioritization, validation, and mobilization.
Related topics