How to Do More with Less for a Better Incident Response

How to Do More with Less for a Better Incident Response

Don’t Let Security Alert Fatigue Leave Your Enterprise Vulnerable to Advanced Threats

Available On Demand
Duration 1h 0min
Duane Kuroda
Group Manager
Proofpoint’s Advanced Technologies
Duane Kuroda
Duane Kuroda is a Group Manager for Proofpoint’s Advanced Technologies where he educates and trains customers and staff on advanced technologies and solutions that impact organizations through social, mobile, email, and network channels. Duane is has spoken at conferences and industry events such as FS-ISAC, FBI (Federal Bureau of Investigation) InfraGard, and SecureWorld events.

Duane has experience developing and managing technologies and products in enterprise security, networking, enterprise collaboration, and payments. Most recently, Duane has held leadership roles at NetCitadel for their Automated Incident Response an Orchestration product and at Checkpoint Software Technologies, where he oversaw the introduction of Checkpoint’s Threat Emulation Technology and Threat Center.

A shortage of skilled security staff, and criminals finding new ways to infiltrate corporate networks, is causing security alert fatigue at many organizations. Too many alerts and too few staff members to give all of these potential infiltrations the attention they deserve is resulting in staff cutting corners - at times processing only 5% to 10% of security alerts - in an attempt to keep up.

In this webinar on September 28th, Duane Kuroda will shine a light on this problem and provide best practices to help you take charge. Results of a just-completed survey of your peers about the state of the problem will be shared, as well as actionable tips and tricks, to help you begin to gain control of your incident response process and keep you secured against advanced threats.

Join us to help your security operations team learn:

  • How security alert fatigue impacts them
  • Techniques to apply intelligence and slash investigation time by 50% or more
  • How to contain user or system threats faster
  • Ways to reduce exposure and risk, to deliver more security using existing staff


Already a member? Login