The Future of the Security Operations Center (SOC)

Today's security operations centers (SOCs) are helping enterprises to defend critical data and initiate security incident response. But most experts agree that today’s SOCs will evolve radically in the near future, as technologies such as orchestration, machine learning, artificial intelligence, and security automation become more tightly integrated into SOC processes. In this webinar, top experts will discuss the long-term evolution of SOC technology, staffing, and processes, and how your enterprise can prepare today to implement the SOC of tomorrow.

On Demand
1h 00min

Attend this webinar and you'll:

  • Get a rundown of the leading-edge tools in the SOCs of today, and a glimpse of what is coming in the future
  • Learn how SecOps jobs are evolving
  • Find out how to deploy and orchestrate new tools in a way that will make your SOC more effective, not just more expensive

Featured Speakers

  • Gal Shpantzer
    Gal Shpantzer
    Independent Security Professional

    Gal Shpantzer has over 15 years of experience as an independent security professional and is a trusted advisor to CISOs of large corporations, technology and pharma startups, Ivy League universities and non-profits/NGOs. Since 2014, Gal has focused on emerging threats to availability as well as confidentiality (ransomware and destructive attacks). Gal has been involved in multiple SANS Institute projects since 2002, including co-editing the SANS Newsbites, revising the E-Warfare course and presenting on cyberstalking, CAPTCHAs, endpoint security and hardware roots of trust. In 2009, he founded and led the privacy subgroup of the NIST Smart Grid cybersecurity task group, resulting in the privacy chapter of NIST IR 7628. He is a co-author of the Managing Mobile Device Security chapter in the 6th ed. Vol 4 of the Information Security Management Handbook (2010) with the late Dr. Eugene Schultz, and is a technical editor of an upcoming O'Reilly book on defensive security (2017). Gal collaborated with Dr. Christophe Veltsos to present the ongoing Security Outliers project, focusing on the role of culture in risk management at RSA, CSI, BSides and Baythreat conferences. Most recently, he was involved as a subject matter expert in the development of the U.S. Department of Energy’s Electric Sector Cybersecurity Capability Maturity Model (ESC2M2) in 2012, and is launching the Incident Response Execution Standard project late 2016. Gal was also involved in the Infosec Burnout research project and co-presented on this topic at BSides-Las Vegas and RSA.

  • Peter Havens
    Peter Havens
    Dir, Product Marketing Management
    Palo Alto Networks

    Peter Havens has been developing, architecting and leading product management and marketing for enterprise software and security services for nearly two decades. He currently leads product marketing for Palo Alto Networks Cortex XDR. Prior to Palo Alto Networks, he was a directing product management for a leading vendor in the enterprise mobile management and identity and access management spaces.

  • Sara Peters
    Sara Peters
    Senior Editor
    Dark Reading

    Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.

Sponsored By