Automating Cybersecurity Functions in Your Enterprise

Organizations face tremendous challenges when trying to keep pace with the volume of cyber incidents they are seeing today. Information security leaders are looking to the benefits of security orchestration and automation to relieve the strain on their incident response teams. While the promise of orchestration is great, achieving success requires great care in choosing which processes and investigative actions to automate.

Available:
On Demand
Duration:
1h 00min

In this webinar:

  • Gain insights from the real-world experiences of SOC leaders and incident response teams
  • Learn how to select the right processes to automate, for what technologies and data sources
  • Discover where strategic use of orchestration can help you get more out of your cybersecurity technology investments

Featured Speakers

  • Tom Parker
    Tom Parker
    Managing Director
    Accenture Security

    Tom Parker, CTO of FusionX, is a recognized throughout the security industry for his research in multiple areas including adversary profiling and software vulnerability research & analysis. Tom has published over four books on the topic of information security including Cyber Adversary Characterization -Auditing the Hacker Mind and a contributor to the popular Stealing the Network Series. Tom is a frequent speaker at conferences including a past speaker at Black Hat. Tom often lends his time to guest lecturing at Universities, involvement in community research initiatives, and is often called to provide his expert opinion to mass media organizations, including BBC News, CNN, Reuters News, Wired and Business Week.

  • Tim White
    Tim White
    Product Manager, Security Orchestration
    Secureworks

    Tim White, Product Manager of Security Orchestration at Secureworks, works closely with experts in Incident Response, Automation, and software development teams to deliver security automation solutions leveraging Secureworks’ unique combination of technology, threat intelligence, and services. He has worked with many large enterprise organizations during his over 20 years of experience in InfoSec and has been instrumental in the development and success of numerous security products throughout his career. Speaking often at industry conferences and events, he leverages his expertise across security domains and compliance mandates to help organizations get the most from their security technology investments while continuously driving improvement in the products and services they rely on every day.

  • Sara Peters
    Sara Peters
    Senior Editor
    Dark Reading

    Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.

Sponsored By