Hi [[ session.user.profile.firstName ]]

Automating Incident Response Helps Bridge the Gap Between IT and Security

Today’s top cybercriminals are intelligent, well-funded, and tenacious—demanding faster responses with comprehensive visibility across your environment. Security operations teams forced to deal with complex, inefficient processes only impedes response times.

For more effective security, organizations must shift away from this reactive paradigm—automating and accelerating workflows between their security and IT teams.

Join our webinar for insights on how your organization can dramatically reduce incident response time and better scale your security teams—delivering accurate incident reporting and tracking.
Live online May 12 4:00 pm UTC
or after on demand 39 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Karl Klaessig, Director of Product Marketing, Security Operations at ServiceNow
Presentation preview: Automating Incident Response Helps Bridge the Gap Between IT and Security

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Smarter Phishing Playbooks Using Threat Intelligence May 20 2021 4:00 pm UTC 30 mins
    Glenn Wong, Recorded Future and Mike Plavin, ServiceNow
    Recorded Future’s Integration with ServiceNow’s Security Operations Module gives clients easy access to elite Threat Intelligence directly within ServiceNow’s platform, thus helping analysts save precious time by empowering them to resolve incidents quickly, with confidence.

    In this session we will review basic features of the integration and Recorded Future’s threat intelligence, and then quickly transition to an advanced use case: using the integration and phishing-specific risk rules, in conjunction with the ServiceNow Flow Designer, to create a powerful phishing playbook that can automatically triage suspected phishing attacks.
  • Automating Incident Response Helps Bridge the Gap Between IT and Security May 12 2021 4:00 pm UTC 39 mins
    Karl Klaessig, Director of Product Marketing, Security Operations at ServiceNow
    Today’s top cybercriminals are intelligent, well-funded, and tenacious—demanding faster responses with comprehensive visibility across your environment. Security operations teams forced to deal with complex, inefficient processes only impedes response times.

    For more effective security, organizations must shift away from this reactive paradigm—automating and accelerating workflows between their security and IT teams.

    Join our webinar for insights on how your organization can dramatically reduce incident response time and better scale your security teams—delivering accurate incident reporting and tracking.
  • Vulnerability Response: The Cyber Risk Landscape May 4 2021 4:00 pm UTC 47 mins
    Natasha Gupta and Julian Azaret, Security Operations at ServiceNow
    With organizations embracing a remote workforce, the attack surface has greatly expanded and introduced new levels of cyber risk—exposing flaws in existing vulnerability management strategies.

    For remote employee devices, these flaws often include inconsistent patching refreshes, the inability to pinpoint exploitability, and unclear collaboration between IT and Security. Register now and learn how ServiceNow® Vulnerability Response can help you:

    - Providing centralized reporting and visibility of exploitability data, remediation progress, and playbook effectiveness
    - Establishing workflows for a variety of use cases, including application and IT-based vulnerabilities, and software misconfiguration
    - Enabling proactive and contextual prioritization of vulnerabilities
    - Accelerating your response by 25%, dramatically reduce case backlog
  • Effectively Respond to the Cyber Storm of the Century with SOAR Apr 29 2021 4:00 pm UTC 26 mins
    Karl Klaessig and Mike Plavin, ServiceNow
    The almost overnight migration to a virtual employee workforce has tasked Security and IT teams to deliver and secure digital transformation at lightening speed! Not an easy task for teams already stretched thin and juggling multiple tools and limited resources. With the volume of threats in mind and the scaling that essentially needs to happen overnight for these teams, security orchestration and automation (SOAR) solutions are critical for their success.

    Learn how automating workflows and shared data and actions between security and IT teams can help ensure that threats to your business are resolved before they can impact the business and your employees.

    Karl Klaessig, Director of Product Marketing, Security Operations at ServiceNow
    Mike Plavin, Technical Product Marketing Manager, Security Operations at ServiceNow
  • Drive operational resilience with IT and security teams collaboration Apr 21 2021 4:00 pm UTC 27 mins
    Barbara Kay, Senior Director, Product Marketing for Risk & Security at ServiceNow
    When security and IT are working in harmony, they’re able to drive continuous improvement and use accurate and repeatable processes to customize playbooks and policies for smarter, automated responses that unlock new efficiencies.

    Join this webinar to better understand, how you can be secure in the knowledge that by pairing human action with AI and automation, you’ve got all angles covered, no matter what the threats are, or where your teams happen to be.
  • Best Practices in Adopting NIST and CIS Control Frameworks Apr 13 2021 4:00 pm UTC 36 mins
    James Blake, Advisory CISO at ServiceNow
    Proven frameworks offer reliable structure for maturing security programs.

    Join this discussion to learn how you can most efficiently adopt the NIST CSF and RMF frameworks or the CIS Top 20 Controls. We'll present coverage, fine-grained alignment, and quick time-to-value examples based on the ServiceNow Security and Risk portfolio with other ServiceNow and ecosystem products.
  • Now on Now: Lessons learned from evolving our own SOC Recorded: Apr 8 2021 26 mins
    Tim Boswell, Senior Solutions Architect Security and Risk at ServiceNow
    Protecting enterprises today is defined by your ability to stay ahead of threats, which requires integrating vast numbers of security tools, correlating key enrichment data, and developing the right workflow and playbooks. You’re also on the hook for delivering the analytics executive leadership requires for assessing your organization’s security posture. Otherwise, you’re sitting exposed to the next big attack. At ServiceNow®, we’ve faced and overcame these challenges.

    Join this session to see how we used our own history and expertise in empowering enterprise cyber-defense, maturing teams, and scaling the Security Operations Center (SOC). You’ll get insights and lessons learned on how our ServiceNow SOC analysts used ServiceNow Security Incident Response (SIR) to:

    - Protect our organization—one of the fastest growing SaaS companies out there
    - Provide the performance metrics you need for assessing your SOC’s capacity and maturity
    - Gain insights into threat impacts and risks to effectively evolve your security team and response workflow
  • Risk-Based Vulnerability Management in Action Recorded: Mar 31 2021 53 mins
    Pallavi Gadepalli and Alex Cox, ServiceNow
    Risk insights can help utilize your teams limited capacity and scale to not only more quickly prioritize new vulnerabilities, but also to determine who should respond, how best to respond, and in what order. With little time and few resources to waste, the question is "how do I get it right the first time?" ServiceNow's Risk-based Vulnerability Management solution, ServiceNow Vulnerabillity Response, has proven its value in hundreds of deployments.

    Join our vulnerability experts to review best practices and to learn about our Top 10 Value Drivers for real customer situations.
  • Unify Detection and Response with MITRE ATT&CK Recorded: Mar 23 2021 14 mins
    Deepak Kolingivadi, Director of Product Management - Security at ServiceNow
    The MITRE ATT&CK framework is a knowledge base of cyberattack tactics and techniques used as a foundation for the development of specific threat models and methodologies. Proactively hunt for threats and stay ahead of adversaries with ServiceNow's Security Incident Response and the MITRE ATT&CK framework.

    Learn how you can empower your incident response teams to know each attacker’s tactics and techniques for the incident under investigation to quickly prioritize and manage detection and response procedures and reduce attack surface.
  • How NCR drove a faster, more efficient security response program Recorded: Mar 18 2021 42 mins
    Dusan Vignjevic and Rajanikanta Dash of NCR Corporation
    Advancing your security maturity level requires building a proactive security program that relies on automation and integrates threat intelligence across your IT environment. ServiceNow® Security Operations makes this all possible.

    In this webinar, NCR Corporation will join us to discuss how it deployed effective security integration by using Recorded Future data, threat intelligence, research, and analysis to support real-time data enrichment against vulnerabilities. Join us and get insights on how NCR:

    -Increased its security response time and boosted efficiency
    -Deployed remediation prioritization based on business impact
    -Reduced daily firefighting for greater focus on future improvements
  • How to Transform and Automate Security Operations Recorded: Mar 10 2021 14 mins
    Lou Fiorello, Head of Security Products at ServiceNow
    It’s been almost 5 years since we shipped our first security orchestration product. We’ve seen tremendous adoption and advances in both incident and vulnerability response. Automation and orchestration are no longer intimidating but have actually become trusted allies in the fight against increasing demands and limited resources. In 2021, your company will depend ever more heavily on digital services, which means you must adapt and extend security and vulnerability operations. Attend this session to learn how digitized, cross-functional workflows can embed best practices, efficiency, and security resilience into operations.
  • 8 weeks to a better vulnerability response program Recorded: Mar 3 2021 21 mins
    Kirk Hogan, CIO, Practice Lead, Security Operations, Iceberg Networks
    Organizations across all industries are seeing threats come in with higher volume, velocity, and coverage. Since there’s no way to address the vast number of vulnerabilities at once, security teams need to identify the threats that could have the largest impact on the business and prioritize their response accordingly. The questions all businesses should be asking themselves are “Have we taken the appropriate measures to ensure that our products/services are delivered securely?” and “How do we know?”

    In this session, we will show you how Iceberg Networks can guide your organization through the vulnerability response journey in just 8 weeks with the ServiceNow Security Operations platform. Through this scalable process, we will show you how to identify the information that you can trust to prioritize your vulnerability response. And, with the help of the ServiceNow Security Operations platform, we will enhance the information available to you, automate workflows and populate dashboards with the answers to the most prominent questions that affect the security of your organization.
  • Closing Doors: Finding Misconfigurations with Configuration Compliance Recorded: Mar 3 2021 25 mins
    Andrea Castillo, Crossfuze | Kevin Urbanek, Crossfuze |Anderson Ferneyhough, Crossfuze
    What if you were focused on the external threat landscape (DoS, malware, phishing) while there was an internal threat you didn’t know about? What if, despite your efforts to protect against outsiders, you were still leaving doors open for them?

    Misconfiguration has become an increasingly popular avenue for hackers to access your organization’s infrastructure. In the 2020 Data Breach Investigation Report by Verizon, misconfiguration surpassed ransomware as a leading cause of data breaches.

    Join us for an overview of the threat posed by misconfiguration and how Configuration Compliance can:

    • link security standards (i.e. HIPAA, CIS Benchmarks, Microsoft Security Compliance) with scanner results and identify failed tests
    • auto-assign remediation tasks to relevant support teams
    • integrate with existing change management processes

    Andrea Castillo, CISSP, Practice Director, Risk & Security, Crossfuze
    Kevin Urbanek, Technical Architect, Risk & Security, Crossfuze
    Anderson Ferneyhough, Masters in Cyber Security, Technical Consultant, Crossfuze
  • Managing Supply Chain Risk in the Age of SolarWinds Recorded: Mar 3 2021 45 mins
    David Soo Hoo, Recorded Future | Alex Cox, ServiceNow
    The SolarWinds breach has quickly attained status as the biggest hack of 2020. By compromising widely-used IT management software suite, SolarWinds Orion, threat actors were able to move across a broader supply chain network. This wide-reaching attack emphasizes the importance of strong vulnerability and vendor management programs with baked-in intelligence.

    By this point your incident response teams have been hard at work managing the immediate tasks to identify, detect, and protect affected systems to mitigate the risk of a security incident. But what’s next?

    David Soo Hoo, Product Manager atRecorded Future
    Alex Cox, Director of Product Management at ServiceNow
  • Federal Incident & Breach Response: Automated Security Event Response Solution Recorded: Mar 3 2021 28 mins
    Geet Grewal, Jeff Derose, Jarrod Alday, Aastha Swaroop and Christian Straubs, Deloitte
    Federal Incident & Breach Response: An Automated Security Event Response Solution for Government Agencies

    Security experts in the Federal space know all too well the importance of adhering to Federal mandates and compliance. In regards to Federal Incident Response, DHS / OMB guidance requires that Government Agencies follow strict protocol around Incident tracking, response, and reporting.

    Deloitte’s Federal Incident & Breach Response Solution incorporates DHS/OMB compliance into ServiceNow’s Security Operations across two primary applications:

    1. Security Incident Response
    Customized to align with DHS’ US-CERT Incident Reporting Requirements

    2. Data Breach Response
    Customized to align with OMB M-17-12 Breach Response Requirements

    Deloitte created a ready-to-deploy solution for Government Agencies that provides Federal Compliance Out-of-the-Box for both the Security Incident Response and Data Breach Response applications.

    Presenters:
    Geet Grewal, ServiceNow Enabling PM at Deloitte
    Jeff Derose, Managing Director, ServiceNow Practice at Deloitte
    Jarrod Alday, ServiceNow SecOps SME at Deloitte
    Aastha Swaroop, ServiceNow Developer at Deloitte
    Christian Straubs, SecOps/Infrastructure SME at Deloitte
  • Automate Security Incident Response: Minimize Risk and Downtime from Threats Recorded: Mar 2 2021 17 mins
    Chris Derton, SE Manager, TOLA, Rubrik | Karl Klaessig, Director of Product Marketing, ServiceNow
    Analyzing network data gives defenders a unique perspective on what the malware is doing versus what the malware could do. It shifts the focus from the software to the attacker. Network data provides unique insights on malicious actions and also on the attackers' decisions and operations. In this session, we will explore real malware traffic, dissecting attackers' behavior, and discussing how we can apply this knowledge to defend our networks better.
  • Accelerate Incident and Vulnerability Response Recorded: Mar 2 2021 31 mins
    Dixon Styres - Solutions Architect, CrowdStrike
    In this session, you will learn how the CrowdStrike and ServiceNow partnership provides joint customers streamlined security operations and accelerated identification, prioritization and remediation of threats.

    Attend this webinar to learn about:
    • Vulnerability assessment and remediation
    • How joint customers can benefit from this integration to help with visibility, efficiency and remediation
    • How a customer has leveraged both technologies to streamline their remediation of threats
  • 4 Factors for More Effective Vulnerability Response with ServiceNow + Tenable Recorded: Mar 2 2021 27 mins
    Nick Keuning, Senior Director, Solutions Architecture, Tenable | Ben Prime, Senior Advisory Solution Architect, ServiceNow
    Your Guide to Streamlining Vulnerability Response using Tenable and ServiceNow

    Prioritization, context, collaboration and automation. These four factors underpin fast and effective vulnerability response.
    By attending this on-demand webinar jointed presented by ServiceNow and Tenable, you will gain insight into practical solutions to the most common vulnerability response challenges.

    Topics covered will include:
    • Despite great tools, effective vulnerability response remains challenging. Why?
    • The importance of having the right data for meaningful prioritization and asset classification
    • How the combined Tenable/ServiceNow solution enables fast, collaborative and effective vulnerability response
  • Security Operations Transformation Recorded: Feb 16 2021 37 mins
    Jon Oltsik, Senior Principal Analyst and Fellow at the Enterprise Strategy Group
    To get a pulse on what challenges cybersecurity professionals face today, ESG reached out to enterprise organizations for their insights and opinions. Of those, 63% surveyed believe that the area of security operations is more difficult today than two years ago.

    Why is this and what actions are organizations taking as countermeasures?

    Join our webinar in which Jon Oltsik, senior principal analyst and fellow at the Enterprise Strategy Group, will present research examining:

    -The internal and external challenges increasing security operations complexity
    -How CISOs are addressing security operations with process automation
    -Future strategies for continuous improvement of security operations
  • Automating Security Incident Response Helps Bridge the Gap with IT and Security Recorded: Feb 11 2021 42 mins
    Karl Klaessig, Director of Product Marketing, Security Operations at ServiceNow
    Today’s top cybercriminals are intelligent, well-funded, and tenacious—demanding faster responses with comprehensive visibility across your environment. Security operations teams forced to deal with complex, inefficient processes only impedes response times.

    For more effective security, organizations must shift away from this reactive paradigm—automating and accelerating workflows between their security and IT teams.

    Join our webinar for insights on how your organization can dramatically reduce incident response time and better scale your security teams—delivering accurate incident reporting and tracking.
Tackle cyber risk with streamlined security and vulnerability response
ServiceNow enables security incident and vulnerability prioritization and a response engine built on the Now Platform. Purpose-built to enable security and IT teams to respond faster and more efficiently to incidents and vulnerabilities, ServiceNow leverages intelligent workflows, automation, and a deep connection with IT to streamline security and vulnerability response. You can dramatically scale your teams’ capacity and accelerate incident and vulnerability response with Security Operation’s automated workflows and collaborative data platform, enabling you to stay ahead of today’s persistent threats and vulnerabilities.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Automating Incident Response Helps Bridge the Gap Between IT and Security
  • Live at: May 12 2021 4:00 pm
  • Presented by: Karl Klaessig, Director of Product Marketing, Security Operations at ServiceNow
  • From:
Your email has been sent.
or close