Hi [[ session.user.profile.firstName ]]

Dissecting the Mind of the Next-Gen SOC

As Security Operations Centers (SOCs) face an ever escalating war to find, train, and keep talented security professionals, the need for more efficient “Next Generation” security operations solutions becomes increasingly important.

But what exactly does “Next Generation” mean? You’ve heard the term before, but is it more than just a buzzword?

Join us in this webinar as we look into what “Next Generation” means in terms of Security Operations programs and how organizations can effectively manage risk in the midst of the industry’s ongoing Talent War. Our SecOps experts will make this a candid discussion into the legitimate challenges for SOCs today and how those challenges will continue to affect organizations over the next 3 – 5 years. We’ll also cover how Micro Focus is working to help your SOC address those issues through the power of layered and informed analytics.
Recorded Feb 25 2020 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Michael Mychalczuk, Dir. Product Mgmt, Security Operations and Mario Daigle, VP Product Mgmt, Analytics, Micro Focus
Presentation preview: Dissecting the Mind of the Next-Gen SOC

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Keys to Scaling an AppSec Program May 12 2020 3:00 pm UTC 60 mins
    Jimmy Rabon, Rick Smith and Harley Adams, Micro Focus Fortify
    Getting an Application Security program started takes a cultural shift, process changes, and a set of tools that don’t disrupt the speed and innovation of your software team. While many organizations have begun their AppSec journey, scaling those efforts from just a few applications to possibly thousands of applications per day come with a completely new set of challenges and issues. How can your organization make this transition from few to many with the current security resources, tools and expertise you have?

    Join Micro Focus Fortify in this webinar, “Keys to Scaling an AppSec Program” to learn:
    • The challenges in Scaling AppSec
    • Common mistakes made by organizations today
    • The keys to success in scaling
    • How Fortify assists organizations grow and mature their AppSec programs
  • Why Open Source Use is Common and Problematic Apr 22 2020 3:00 pm UTC 60 mins
    Brent Jenkins, Micro Focus Fortify and Curtis Yanko, Sonatype
    It's really no secret that organizations are developing faster, doing more builds and releasing more frequently. In order to keep up with this business demand, most applications aren't built completely from scratch. Developers utilize third party, or open source components as building blocks, so they can focus their time and energy on the parts of the application that are specific to their business logic or competitive features. With an average growth of 75% over the last two years, open source component usage continues to increase at a rapid pace.

    Over the past 15 years, thousands of companies such as Apple, JP Morgan Chase, and most notably, Equifax, have suffered breaches because of these open source components. This makes Software Composition Analysis (SCA) a “must-have” AppSec capability.

    Join Micro Focus Fortify and Sonatype in this webinar, “Why Open Source Use is Common and Problematic” to learn:
    • The State of Open Source Consumption
    • The Risk Involved
    • Why Software Composition Analysis is a “must-have”
    • How Micro Focus Fortify and Sonatype are solving the problem
  • Reducing the Friction between Development and Security Recorded: Mar 31 2020 64 mins
    Rick Dunnam, Orasi/Saltworks and Brent Jenkins, Eric Echols and Stan Wisseman, Micro Focus
    Many people believe that development and security teams have competing priorities that often become the biggest barrier to the success of an application security program. Developers are usually resistant to their organization creating an AppSec program for fear of being slowed down in delivering their code. This negative mindset about security is often due to security professionals dictating rules, workflows and tools on developers instead of creating strong partnerships, common goals, and tools that seamlessly integrate with the development toolchain.

    Join Micro Focus in this webinar to learn:

    • Tips on creating partnerships with your devs
    • Why developers are the key to your appsec program success
    • Tools and Integrations vital to keeping developers engaged with security
    • Use case of how one organization was able to reduce this friction
  • DJ MITRE: Achieving Harmony in your SOC Recorded: Mar 26 2020 63 mins
    Emrah Alpa, Sr. Product Manager, ArcSight Global Content, Micro Focus
    Achieving harmony in a chaotic SOC environment is notoriously difficult. But harmony is critical to effective threat detection and mitigation within your SOC.

    Join this webinar to see how success on the dancefloor is surprisingly similar to success in a SOC… you should start slow, then build over time (in the correct order) to achieve harmony. If you define the known threats and write rules to catch them, you’ll be left with a smaller subset of unknown threats. Hunt those down, and they’ll become known. Then, repeat the process.

    The MITRE ATT&CK Framework can be an extremely useful tool to accomplishing these goals. We’ll show you how, and will give you the insights you need to start building a self-defending enterprise.

    Is there really going to be a live-DJ’ing experience?
    Yes. Mr Alpa will start the show with a minimalistic melody and slowly build up to reach a groovy tune in about 30 seconds from start to finish.

    Why learn about the MITRE ATT&CK Framework?
    A SOC is not just a set of tools or perfectly tuned rules and algorithms. Time and people are your most important assets. Train your SOC team using a common language. Then, measure your defense posture, and your SOC maturity, using that same language.

    MITRE ATT&CK Framework is the common language unifying ALL InfoSec and Ops teams worldwide. It is an encyclopedia that can be used by all your security teams, enabling your organization to write prescriptive/actionable steps against all cyber threats.

    Who is Emrah Alpa?
    Mr. Alpa is a diehard cyber warrior. In his own words, he defends castles and builds defenses. As a recognized Thought Leader & Evangelist with 20 years of InfoSec experience, he brings forward something you can't put on paper: a passion for what he does, and a burning sense of mission.

    So please join us for this webinar to discuss “DJ MITRE” and the untold secrets of its real-world SOC implementations.
  • Application Security for Modern Dev Recorded: Feb 25 2020 54 mins
    Harley Adams, Senior Manager, Product Marketing and Brent Jenkins, Director, Product Marketing, Micro Focus
    The speed and complexity of software development is rapidly increasing. Development teams have little to no time to ensure these applications are secure, even while the biggest and most severe data breaches that have affected both the public and private sectors all operate at the application layer.

    Ensuring your applications are secure doesn't have to be a cumbersome process, though. With the right program and tools, you can improve or start your organization's security initiative without getting in the way of developers' productivity.

    This webinar discusses the journey from scanning one application to building a mature program scanning thousands of applications.

    View this webinar and you will learn:
    •How people and process are crucial for success
    •Why integration is essential for speed
    •How to automate the process in a CI/CD pipeline
  • Dissecting the Mind of the Next-Gen SOC Recorded: Feb 25 2020 61 mins
    Michael Mychalczuk, Dir. Product Mgmt, Security Operations and Mario Daigle, VP Product Mgmt, Analytics, Micro Focus
    As Security Operations Centers (SOCs) face an ever escalating war to find, train, and keep talented security professionals, the need for more efficient “Next Generation” security operations solutions becomes increasingly important.

    But what exactly does “Next Generation” mean? You’ve heard the term before, but is it more than just a buzzword?

    Join us in this webinar as we look into what “Next Generation” means in terms of Security Operations programs and how organizations can effectively manage risk in the midst of the industry’s ongoing Talent War. Our SecOps experts will make this a candid discussion into the legitimate challenges for SOCs today and how those challenges will continue to affect organizations over the next 3 – 5 years. We’ll also cover how Micro Focus is working to help your SOC address those issues through the power of layered and informed analytics.
  • California’s own GDPR? It’s not alone Recorded: Jan 28 2020 31 mins
    Carole Murphy, Product Marketing Manager, Security Risk and Governance, Micro Focus
    California's Consumer Privacy Act of 2018 took effect on January 1, 2020. The law gives California residents the right to know what data companies collect about them and how that information is shared. Consumers will also have the authority to prohibit companies from selling their data.

    The bill bears similarities to the EU’s General Data Protection Regulation (GDPR) but it is no clone, so even if you currently must comply with GDPR, the CCPA will be different. And, by the way, it's not the only privacy law at the state level.

    This 20/20 webcast would look at recent privacy acts across the country and how it might affect the way U.S. businesses handle privacy concerns going forward.
  • Next Generation SOC: The Micro Focus Point of View Recorded: Jan 22 2020 50 mins
    Nurettin Erginoz, Director of Field Services, ATAR Labs and AdarshChandra Rai, Micro Focus
    In the face of more data, increasing threats, and a fragmented security ecosystem, the next-gen SOC must be tech-driven and people-enhanced in order to stay ahead of attacks from inside and outside of the organization. Equipped with critical capabilities such as real-time correlation, user and entity behavioral analytics (UEBA), and security orchestration and automation (SOAR), the next-gen SOC fosters a proactive security posture that enables it to detect, investigate, and respond to known and unknown threats—at speed and at scale.

    Instead of relying on disparate security point tools, the next-gen SOC leverages a natively integrated solution that offers fast and comprehensive threat detection, automates manual processes such as event analysis, and enables faster response. This creates a human/machine team where threat leads can be prioritized via human/machine driven analysis and security analysts/threat hunters can investigate leads with a unique contextual understanding.

    This session is planned to demonstrate an End-to-End Integration of the ArcSight Family with Interset and Partner solution ATAR Labs – one of our SOAR integration partners.
  • Secure and Manage Cloud-based Linux Resources with Active Directory Recorded: Dec 11 2019 53 mins
    Tim Sedlack, Charles Davis and Lacy Gruen, Micro Focus
    As Linux continues its rise to a more dominant cloud deployment resource, it is critical for organizations that are adopting cloud-based solutions such as Azure and Office 365 to apply stricter policy controls to their Linux systems. Many are challenged with maintaining standard authentication, configuration, and policy controls for cloud-based Linux resources such as VMs, servers, apps, and services. Resources that are unmanaged or undermanaged can create compliance challenges and expose the organization to greater risk due to bad actors exploiting their deficiencies. Because cloud resources can be quickly and easily provisioned, it is easy to overlook security holes and inconsistencies.

    Join us to discover how you can use the newest Micro Focus AD Bridge solution to leverage your existing AD infrastructure to centralize and normalize how you manage authentication, configuration, and policy across all Linux resources. The result is fully secured and managed Linux VMs in the cloud.

    Why attend this session?
    • Learn how to solve your Linux VM authentication, security, and policy challenges
    • Find out how to standardize configuration using policy across your OS, apps, and services
    • Discover how normalizing policy across the enterprise simplifies compliance audits
    • See a demo of the industry’s first AD Bridge solution to extend to cloud-based Linux
  • Boosting User Adoption for ArcSight and Fortify Software Recorded: Dec 3 2019 50 mins
    John Butot, Micro Focus
    Did you know that there’s a 96% shortfall in trained security analysts in the world? Organizations struggle to provide effective on-boarding and users find it difficult to understand the new security applications and processes.

    Micro Focus Fortify and ArcSight are leaders in the IT security domain. Our Adoption Readiness Tool (ART) delivers structured on-boarding, continuous enablement, and quick access to support content that boosts the user adoption of your security operations team.

    Reserve your seat for our webinar where you will learn about:
    • The 3 key ingredients to boost user adoption rates of your security software
    • Effective on-boarding with Fortify and ArcSight simulation-based training
    • Best practices for documenting security operating procedures and runbooks
    • Customer success stories

    You will also see live demos, showing how to auto-generate Try-Me simulations, product demonstration videos, and step-by-step runbooks.

    Work Smart and start using ART
    Can’t make it to any of the live sessions? Register your seat to receive the presentation materials and recording of the live session. Micro Focus ART is a Software Education product and our consultants are specialists in implementing enablement and adoption programs. Learn more at www.microfocus.com/training and feel free to contact us if you have any questions, at https://microfocus.viewcentral.com/events/uploads/microfocus/contact.html.

    Visit the ART product page for more information here, www.microfocus.com/software/art,
    and try a sample from our simulation-based training here, https://inter.viewcentral.com/events/uploads/microfocus/art-demos.html.
  • Best Practices for taking control of privilege in your organization Recorded: Oct 31 2019 61 mins
    Andras Cser, VP, Principal Analyst, Forrester and Tim Sedlack, Director of Product Management, Micro Focus
    Experts estimate that as many as half of all security breaches occur as the result of abused privileged credentials. Whether the privilege misuse occurs due to employee carelessness or is the work of a cyber-criminal who has leveraged the credentials of an insider to gain access to your IT network, you can best manage this risk by closely controlling and monitoring all privileged access.

    In this webcast, Andras Cser, VP, Principal Analyst with Forrester and Tim Sedlack of Micro Focus will discuss best practices for taking control of privileged access in your organization and why it’s increasingly important to discover and monitor privileged entitlements – wherever they live.
  • Security and Privacy: Two Sides of the Same Coin? Recorded: Oct 2 2019 62 mins
    Pasquale Galdino, Rich Gaston and Carole Murphy, Micro Focus
    The realms of data privacy and information security have traditionally been separate in most organizations. However, these domains are increasingly fusing, and in today's digital world, you need them to work in unison.

    Many companies leave the question of ownership to their legal department, but today's CIOs are concerned with translating legal guidance into technical implementation. In doing so, however, they might be missing critical requirements for compliance with regulations such as CCPA and GDPR. So, how do today's organizations make sure that nothing falls through the cracks in their compliance coverage? And, where do they draw the line in ownership between data privacy and information security?

    For answers to these questions and more, join this webinar for a discussion of CCPA and what's happening with GDPR after more than a year. Then, learn first-hand about how a multi-national auto parts retailer solved business challenges with competing stakeholders to build secure analytics in the cloud.

    Effective data protection enables privacy for the individual and the organization, presenting an opportunity to engage your customers, build trust, and drive value for your business.
  • The Hidden Business Enabler - Advanced Authentication Recorded: Oct 1 2019 59 mins
    Andras Cser, VP, Principal Analyst, Forrester, Kent Purdy, Product Marketing & Troy Drewry, Sr Product Mgr, Micro Focus
    Whether businesses are seeking to protect themselves from outsiders or simply complying with government mandates, identity verification continues to be a cat and mouse game between taking on risk and the security guarding against it. Yet it’s often their tactical view that limits the business’s ability to use their security investment to their full advantage.

    In this webcast, Andras Cser, VP, Principal Analyst with Forrester and Kent Purdy & Troy Drewry of Micro Focus look through the lens of business enablers at why maximizing your authentication flexibility is a best-practice approach to empower your organization.
  • The Pulse of AppSec: 2019 Trends and Insights Recorded: Sep 25 2019 62 mins
    Alex Hoole, Micro Focus
    Attacks targeting the application layer are on the rise. The 2019 Application Security Risk Report by the Micro Focus Fortify Software Security Research team covers the industry trends and insights in the application security landscape.

    Fortify on Demand analysis shows broad vulnerability in apps. 4 out of 5 tested web applications had at least one critical or high severity issue. Furthermore, 61% of tested apps had critical or high vulnerabilities not covered by the OWASP Top 10 2017.

    In this webinar, we share results from our research:
    • The attacks to watch out for in 2019
    • How effective are the controls for application layer vulnerabilities?
    • Privacy, Policy, and Standards
    • Vulnerabilities in Open Source Dependencies
    • Best practices to protect your business

    Join us for the key takeaways of the 2019 Application Security Risk Report.
  • The Role of Data Protection in Unified Endpoint Management Protection Recorded: Sep 24 2019 59 mins
    Ed Gavin, Micro Focus
    According to Verizon’s Mobility Security Index 2019, 83% of those surveyed indicated that their organization was at risk from mobile threats. In the same report, 67% companies said their defenses aren’t keeping pace. As the exposure increases with the continuing rise of mobile workforce, it is critical to adopt a comprehensive approach to mitigate the risk. Now, the new Micro Focus Unified Endpoint Management (UEM) Data Protection solution makes it simple for ZENworks customers to add data protection to their defense against attacks such as ransomware and data losses. Please join Ed Gavin, Head of Micro Focus Endpoint Data Protection, and learn:

    • What is UEMP?
    • Why is data protection necessary in UEMP ?
    • What are Micro Focus’ proven data protection capabilities and benefits?
    • How simple is it to deploy into the ZENWorks environment?
    • Are there flexible deployment options?
    • What upgrade promotions are currently available?
  • Five steps to implement a universal policy strategy Recorded: Jul 18 2019 60 mins
    Lacy Gruen, Tim Sedlack and Danny Kim, Micro Focus
    Most organizations manage policies in silos across their organization. Even those managing group policy within Active Directory find it very difficult to effectively leverage those authorization and authentication policies in other systems. All systems within your environment require some kind of policy controls to be enforced and auditable – from Linux and UNIX servers to a wide variety of cloud resources such as virtual machines, SaaS, containers, etc. It becomes even more challenging when you must prepare your existing security policies for the cloud and find a way to migrate them to cloud services such as Intune. Managing policy in so many different places is highly inefficient and the lack of consistency opens the organization up to a great amount of risk. Bad actors are just waiting to find vulnerabilities when it comes to security policy and will exploit any gaps every chance they get.

    Attend this webinar to learn how to transform the way you manage security policies to improve security, drive efficiency, and reduce the risk of a breach or failed audit. Industry experts Tim Sedlack and Danny Kim will discuss the five steps you can take to implement a modern universal policy strategy.
  • Machine learning in cybersecurity: One size doesn't fit all Recorded: Jun 3 2019 48 mins
    Mario Daigle, VP of Product for Interset (a Micro Focus company)
    Machine learning (ML) is one of today's "must-have" cybersecurity technologies, but is it really able to address every challenge equally? Solving real problems is more important than buying the "best" technology, and you don't need to be a data scientist to figure out the most critical problems that you need to solve. You simply need to understand that different types of ML solve different problems and ask the right questions to determine the right tool for the job at hand.

    Join Mario Daigle, VP of Product for Interset, a Micro Focus company, to discuss two main categories of machine learning—supervised and unsupervised—and how they can be applied practically in the context of solving cybersecurity problems.
  • Optimizing and Maturing an AppSec Program Recorded: May 21 2019 60 mins
    William Hernandez, Stan Wisseman and Brent Jenkins, Micro Focus
    Many organizations turn to the guidance provided by the OWASP Top 10 for their application security programs. While this is a great way to get started, a more mature and optimized program is needed to avoid being the next headline. Over 60% of applications tested by our software security research team last year had one or more critical or high-severity security flaw NOT covered by the OWASP Top 10. Organizations that only test or mitigate security risks found within these Top 10 are still very vulnerable to attacks. In this webinar, we discuss steps to take to mature your application security program, along with some success stories of companies that have done this with the help of Micro Focus Fortify.
  • Micro Focus SecOps Innovation: A look into the future of security insights Recorded: May 15 2019 59 mins
    Mark Fernandes, Accenture; Mario Daigle, Interset; Charles Clawson and Michael Mychalczuk, ArcSight, Micro Focus
    ArcSight has a long, storied history of protecting the world’s leading enterprises through enabling clear and comprehensive insights that help reduce damaging security breaches. Yet with modern digital transformation comes new challenges and threats. How do enterprises reduce complexity at a time of massive data explosion, scale to address a global range of threats and new application requirements, and reduce resource-intensive operations through greater efficiency by doing more with less?

    Hear from product and solution leaders about the core capabilities required for successful SecOps within a modern IT landscape, including the latest innovations to support today’s enterprise digital transformation roadmaps. Micro Focus is joined by Accenture with customer success examples learned on their customer transformation journeys. This overview also includes an introduction to Interset for UEBA, Micro Focus’ newest acquisition, enabling advanced analytics for anomaly detection enabling Micro Focus to help its customers advance the next generation of security operations.

    Join us for this webinar to learn more about:

    • Achieving comprehensive security insights with reduced complexity at greater scale
    • A roadmap designed to address enterprise digital transformation with SecOps
    • Customer success and updates from Accenture with insights from real-world use cases
    • Advances with current and planned SIEM, threat hunting and user behavior analytics capabilities
  • Privacy and Data Protection Recorded: May 13 2019 38 mins
    Manju Lal, Cyber & Data Privacy Practice, PwC and Nathan Turajski, Security, Risk and Governance Solutions, Micro Focus
    With an increasing number of data breaches and mis-use of personal information incidence, organizations are increasingly challenged with protecting individual data privacy and maintaining public trust in this data-driven society. In addition, companies are facing a growing number of new security, privacy and data protection laws across the globe, such as GDPR, CCPA, LGPD, HIPAA, GLBA, etc. This webinar addresses the challenges organizations face in information security and data privacy, and PwC's point of view and approach to transform their privacy and data management programs. Leveraging Micro Focus' security and information management software and PwC's advisory services, organizations will benefit from a holistic end-to-end approach and technology solution to manage cybersecurity and privacy risks.
Leading Security, Risk and Governance Platform
With the industry’s broadest set of integrated Security, Risk, and Governance solutions, combined with deep domain expertise and industry-leading analytics, Micro Focus is uniquely suited to help organizations take a holistic approach to protecting identities, apps, and data. Very few vendors can assure security and governance professionals that they are protecting against breaches, guarding the privacy of individuals and their data, and complying with regulatory and jurisdictional regulations – at scale, with ease, insight and confidence. Visit Micro Focus Security, Risk, & Governance at: https://www.microfocus.com/en-us/trend/security-risk-governance.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Dissecting the Mind of the Next-Gen SOC
  • Live at: Feb 25 2020 4:00 pm
  • Presented by: Michael Mychalczuk, Dir. Product Mgmt, Security Operations and Mario Daigle, VP Product Mgmt, Analytics, Micro Focus
  • From:
Your email has been sent.
or close