Hi [[ session.user.profile.firstName ]]

How to Build an Effective Security Operations Center

Building a powerhouse security operations center (SOC) from scratch can be a challenging process when you do it alone. That’s why we’re sharing tips and tricks of how to build an effective SOC for those just starting out, or those looking for some new ideas to fuel their existing cybersecurity team. Jason Miller, CEO of BitLyft Cybersecurity will be sharing industry knowledge of how he’s built a robust SOC that protects large and small networks of organizations around the world.

We’ll cover:
• Challenges in understanding the vulnerabilities in technology (software and hardware)
• Reviewing and understanding log data for more meaningful insight
• Validating your unique network activity
• Getting to know abnormal and normal behavior
• What to look for when hiring
• The role of automation for effectiveness
Recorded May 11 2021 48 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jason Miller
Presentation preview: How to Build an Effective Security Operations Center

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • How to Overcome the Cybersecurity Skills Shortage Jun 29 2021 5:00 pm UTC 60 mins
    Jason Miller
    With 460,000 unfilled job postings in the US in 2021, we need creative and non-traditional approaches to overcoming the skills shortage. In this webinar, we’ll discuss some of the ways we’ve built our security operations center and how you can address the workforce gap by tailoring your approach to “hack” the system and better protect your organization.

    We’ll also be presenting a chance to receive an extremely limited and high-value cybersecurity consulting offer for those who attend. Register, share, and watch to find out more details and how you can enter.
  • How to Build an Effective Security Operations Center Recorded: May 11 2021 48 mins
    Jason Miller
    Building a powerhouse security operations center (SOC) from scratch can be a challenging process when you do it alone. That’s why we’re sharing tips and tricks of how to build an effective SOC for those just starting out, or those looking for some new ideas to fuel their existing cybersecurity team. Jason Miller, CEO of BitLyft Cybersecurity will be sharing industry knowledge of how he’s built a robust SOC that protects large and small networks of organizations around the world.

    We’ll cover:
    • Challenges in understanding the vulnerabilities in technology (software and hardware)
    • Reviewing and understanding log data for more meaningful insight
    • Validating your unique network activity
    • Getting to know abnormal and normal behavior
    • What to look for when hiring
    • The role of automation for effectiveness
  • AI Threat Protection in Higher Education: A Real-World Case Study Recorded: Apr 6 2021 31 mins
    Thomas Coke
    Thomas Coke, Chief Strategy Officer of BitLyft Cybersecurity, dives into the world of artificial intelligence as it pertains to cyber threat detection and neutralization. We’ll cover a real-world case study of an attack against a higher education institution that caused a chain reaction domino affect that was stopped by artificial intelligence.

    What we'll cover:

    - An introduction to AI Threat Protection
    - Real world case study showcasing Central Threat Intelligence (CTI)
    - Threat Neutralization through AI Threat Protection
    - Immunizing networks against drive by scans
  • Demo of Securonix SIEM and BitLyft SOC (Part 1) Recorded: Mar 25 2021 46 mins
    Mike Skeith - Director of SOC
    Join Mike Skeith, Director of the Security Operations Center at BitLyft for a demo of the Securonix security information and event management (SIEM) tool and how our security engineers investigate and remediate threats. We’ll cover the basic of the tool and investigate phishing attempts, account compromise, mailbox configuration, and threats discovered from user behavior analytics (UBA). We’ll also discuss how we remediate and improve the health of organizations through automation of our SOAR and threat intelligence platform.

    The live demonstration will also include a time for Q&A from the audience.
  • CMMC Compliance: Practices and Processes Recorded: Mar 4 2021 33 mins
    Thomas Coke
    On September 23rd, 2020 Join Thomas Coke, Esq., the Chief Strategy Officer of BitLyft Cybersecurity for a discussion around the ‘practices’ and ‘processes’ required at each level of the Cybersecurity Maturity Model Certification (CMMC). This is the second in our series on the CMMC, and will be a more detailed explanation of two of the key elements. Also included will be a list of resources and a proposed timeline for the CMMC. Thomas will follow the presentation with a Q&A session and share his contact information for further engagement.
  • CMMC Compliance 101: Introduction Recorded: Feb 18 2021 31 mins
    Thomas Coke
    The CMMC is changing the landscape of cybersecurity for defense contractors. This session is an overview on what you need to know, what you’ll need to prepare, and how to meet the requirements. We present a reasoned and realistic approach so attendees can better assess where they stand for compliance and determine what steps are necessary to meet their objectives.

    About The Speaker - Thomas Coke (Chief Strategy Officer, BitLyft Cybersecurity)

    Thomas is the Chief Strategy Officer of BitLyft Cybersecurity and a licensed attorney. He has worked with manufacturing clients with a special focus on high compliance and defense contractors. In his spare time he watches and blogs on cybersecurity legislation, trends, economics and policy. Thomas has a JD from the Michigan State University College of Law and a BA in Economics from Kalamazoo College.
  • How To Not Trust Your Vendors: Cybersecurity for SaaS and Cloud Recorded: Jan 28 2021 48 mins
    Jason Miller - CEO of BitLyft Cybersecurity
    With so many of today’s major breaches happening through 3rd party vendors, it’s important to understand the risk of ‘assumed’ security with each cloud and SaaS offering used to help you run your organization. Whether it’s Salesforce, Office 365, SAP, or other cloud offerings, we assume they are secure, until they aren’t! In this webinar, Jason Miller, CEO of BitLyft Cybersecurity will be discussing 3rd party vendor breaches, what we can learn from them, how to hold our vendors to a higher standard, and learn to maintain a healthy skepticism.
  • How to Build an Effective Security Operations Center Recorded: Dec 17 2020 49 mins
    Jason Miller
    Building a powerhouse security operations center (SOC) from scratch can be a challenging process when you do it alone. That’s why we’re sharing tips and tricks of how to build an effective SOC for those just starting out, or those looking for some new ideas to fuel their existing cybersecurity team. Jason Miller, CEO of BitLyft Cybersecurity will be sharing industry knowledge of how he’s built a robust SOC that protects large and small networks of organizations around the world.

    We’ll cover:
    • Challenges in understanding the vulnerabilities in technology (software and hardware)
    • Reviewing and understanding log data for more meaningful insight
    • Validating your unique network activity
    • Getting to know abnormal and normal behavior
    • What to look for when hiring
    • The role of automation for effectiveness
  • Cyber Attack Stories And How To Not Be A Victim Recorded: Dec 8 2020 44 mins
    Jason Miller, Will Baccich, Brian Brignac
    The risk of losing data from ransomware attacks is skyrocketing at an alarming pace. To compound the concern, ransomware attackers have learned through trial and error, that they will not get paid if a company has good backup - so company backups are becoming their first target. Protecting your backups is a mission-critical business practice that can help to ensure business continuity. In this webinar BitLyft and Global Data Vault discuss:

    • Five case studies of "insider threats” and what you can learn from them
    • The current malware
    • How insider access is used against targets
    • How to protect against insider attacks effectively

    About The Speakers--

    Jason Miller - CEO (BitLyft Cybersecurity)
    Jason Miller has over 20 years experience in network, system administration, and cloud technologies. Miller is passionate about helping businesses embrace the next generation of technology including cloud adoption and high performance scaling software. With the constant technical changes organizations face, Miller knows that empowering the people who power the software is the most effective tactic.

    Will Baccich - CEO (Global Data Vault)
    Will co-founded Global Data vault over 20 years ago and has instilled a culture of service first; focusing on quality, results, simplicity, and value. He believes that there is no value in wondering about responsibilities when it comes to DRaaS services, so with GDV, “It’s always our problem.”

    Brian Brignac - Director of Sales (Global Data Vault)
    Brian has more than 35 years experience in configuring backup, disaster recovery, and failover solutions. He is a Veeam VMTSP, Veeam VMSP, Microsoft Certified Systems Engineer, Certified Novell Administrator, and Microsoft Certified Professional. His expertise offers a strong technical background which enables him to provide unique solutions for clients.
  • AI Threat Protection in Higher Education: A Real-World Case Study Recorded: Nov 17 2020 32 mins
    Thomas Coke
    Thomas Coke, Chief Strategy Officer of BitLyft Cybersecurity, dives into the world of artificial intelligence as it pertains to cyber threat detection and neutralization. We’ll cover a real-world case study of an attack against a higher education institution that caused a chain reaction domino affect that was stopped by artificial intelligence.

    What we'll cover:

    - An introduction to AI Threat Protection
    - Real world case study showcasing Central Threat Intelligence (CTI)
    - Threat Neutralization through AI Threat Protection
    - Immunizing networks against drive by scans
  • CMMC Compliance: Practices and Processes Recorded: Sep 23 2020 34 mins
    Thomas Coke
    On September 23rd, 2020 Join Thomas Coke, Esq., the Chief Strategy Officer of BitLyft Cybersecurity for a discussion around the ‘practices’ and ‘processes’ required at each level of the Cybersecurity Maturity Model Certification (CMMC). This is the second in our series on the CMMC, and will be a more detailed explanation of two of the key elements. Also included will be a list of resources and a proposed timeline for the CMMC. Thomas will follow the presentation with a Q&A session and share his contact information for further engagement.
  • CMMC Compliance 101: Introduction Recorded: Aug 25 2020 32 mins
    Thomas Coke
    The CMMC is changing the landscape of cybersecurity for defense contractors. This session is an overview on what you need to know, what you’ll need to prepare, and how to meet the requirements. We present a reasoned and realistic approach so attendees can better assess where they stand for compliance and determine what steps are necessary to meet their objectives.

    About The Speaker - Thomas Coke (Chief Strategy Officer, BitLyft Cybersecurity)

    Thomas is the Chief Strategy Officer of BitLyft Cybersecurity and a licensed attorney. He has worked with manufacturing clients with a special focus on high compliance and defense contractors. In his spare time he watches and blogs on cybersecurity legislation, trends, economics and policy. Thomas has a JD from the Michigan State University College of Law and a BA in Economics from Kalamazoo College.
  • Cyber Attack Stories And How To Not Be A Victim Recorded: Aug 19 2020 45 mins
    Jason Miller, Will Baccich, Brian Brignac
    The risk of losing data from ransomware attacks is skyrocketing at an alarming pace. To compound the concern, ransomware attackers have learned through trial and error, that they will not get paid if a company has good backup - so company backups are becoming their first target. Protecting your backups is a mission-critical business practice that can help to ensure business continuity. In this webinar BitLyft and Global Data Vault discuss:

    • Five case studies of "insider threats” and what you can learn from them
    • The current malware
    • How insider access is used against targets
    • How to protect against insider attacks effectively

    About The Speakers--

    Jason Miller - CEO (BitLyft Cybersecurity)
    Jason Miller has over 20 years experience in network, system administration, and cloud technologies. Miller is passionate about helping businesses embrace the next generation of technology including cloud adoption and high performance scaling software. With the constant technical changes organizations face, Miller knows that empowering the people who power the software is the most effective tactic.

    Will Baccich - CEO (Global Data Vault)
    Will co-founded Global Data vault over 20 years ago and has instilled a culture of service first; focusing on quality, results, simplicity, and value. He believes that there is no value in wondering about responsibilities when it comes to DRaaS services, so with GDV, “It’s always our problem.”

    Brian Brignac - Director of Sales (Global Data Vault)
    Brian has more than 35 years experience in configuring backup, disaster recovery, and failover solutions. He is a Veeam VMTSP, Veeam VMSP, Microsoft Certified Systems Engineer, Certified Novell Administrator, and Microsoft Certified Professional. His expertise offers a strong technical background which enables him to provide unique solutions for clients.
  • The Path Towards Safer Cybersecurity for Public Power Municipalities Recorded: Aug 18 2020 49 mins
    Nicholas Pidek
    Public power municipalities face unique challenges towards understanding their vulnerabilities and how to address them. Whether it’s SCADA systems or just general IT practices, there is a lot to protect and so much is at stake. With the growing trend of municipalities being hacked, being small is no longer a safe guard to being a victim of a cyber attack. In this webinar, BitLyft MCO Nicholas Pidek discusses recent municipality cyber attacks, key insights to prevent them from happening again, and how to build a path towards safer cybersecurity practices for small and large utilities alike.
  • Cybersecurity For Manufacturing In The Digital Age Recorded: Aug 13 2020 60 mins
    Thomas Coke
    Manufacturing companies face unique challenges in identifying and responding to vulnerabilities in their networks and equipment. The transformation to industry 4.0 makes this even more difficult. Cyber criminals (and state-actors) are focusing on stealing and holding hostage the intellectual property so many family-run businesses have built over generations. BitLyft Cybersecurity addresses these issues and more to equip manufacturers with the tools and knowledge to improve their cybersecurity posture to protect against cyber attacks.

    What you'll learn:
    • How to secure manufacturing 4.0
    • Best practices to protect your intellectual property
    • How to identify attacks and how to respond
    • Best approaches to train employees on phishing emails
    • Work from home and security risks
  • Returning to Work Safer Than Before Recorded: Jun 30 2020 40 mins
    Nicholas Pidek
    As your company begins to shift from remote work to safely opening the office again, it’s important to consider that COVID-19 isn’t the only virus that could be coming back to work. We explore the cyber threats all companies should discuss, address, and resolve for a returning workforce. CEO of BitLyft Cybersecurity, Jason Miller, presents actionable items companies can take to help secure their network.

    You Will Learn:
    -Simple steps towards making your IT safer
    -Why small to medium size organizations are an easy target
    -What to look out for in protecting your organization against criminal activity
    -How to stop cyber threats coming into your environment
    -How to reset, revise, and implement cybersecurity goals
illuminating and eliminating cyber threats for a safer world
Join our network of cyber security advocates as we discuss leading IT security tactics, software, and more.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How to Build an Effective Security Operations Center
  • Live at: May 11 2021 5:00 pm
  • Presented by: Jason Miller
  • From:
Your email has been sent.
or close