Getting Your Security Tech Together: Making Orchestration and Automation Work For Your Enterprise

If your IT shop is like most enterprises’, you’ve got a ton of tools and processes – but no easy way to tie them together and automate them. How can you pull your existing security systems together to improve your data defenses and speed incident response? 

Available:
On Demand
Duration:
1h 00min

Attend this webinar and you'll:

  • Hear experts discuss the tools and frameworks you can use to orchestrate and automate your IT security operations.
  • Get an overview of emerging technologies and practices for orchestration and automation – including SOAR, XDR, and security product integration frameworks (SPIF)
  • Receive recommendations on how you can implement these new approaches to improve your security operations, no matter what your organization’s size.

Featured Speakers

  • Tom Parker
    Tom Parker
    CEO and Founder
    Hubble

    Tom Parker is the CEO and founder of Hubble, a company pioneering the emerging market of technology asset intelligence. Tom is a globally recognized security expert, technologist, author and speaker. He has more than 20 years of expertise in the cyber security space, including extensive experience driving revenue growth and scaling global organizations across the globe. Tom’s prior role at Accenture Security (a $2 billion security business), included head of Growth and Strategy and Global CTO. He joined Accenture in 2015, through the acquisition of FusionX, a leader in the advanced red-teaming space, where he was CTO and co-founder. Tom has held numerous other notable roles, including Deputy CISO at AIG and sits on several advisory and non-profit boards. Tom has published several books on the topic of information security including “Cyber Adversary Characterization - Auditing the Hacker Mind” and a contributor to the popular “Stealing the Network” series. He is a frequent speaker at conferences around the globe including the BlackHat Briefings and lends his time to lecturing at universities, participating in community research initiatives and is often called to provide his expert opinion to mass media organizations, including BBC News, CNN, and online/print outlets such as Vanity Fair, The Register, Reuters News, Wired and Business Week.

  • Barry Fisher
    Barry Fisher
    Cisco SecureX platform

  • Jolene Tam
    Jolene Tam
    Cisco SecureX platform

  • Christopher Tuskan
    Christopher Tuskan
    Network Team Lead
    Acadian Companies

    Christopher began his career in the Marines doing communications and has worked for Unitel, MCI/MCIWorldcom/Verizon Business as a Senior Lead Network Engineer in the Chicago market, Ryerson Steel as a Senior Network Engineer, and is currently Network Services Team Lead at Acadian Companies. Christopher has helped design and build the networks for companies like Nasdaq, USPS, SSA, FAA, FBI, etc., while working for MCI. Projects at Ryerson included redesign/implementation of core/data center switching, Implementing Identity Services Engine (ISE), all while supporting over 300 locations in the United States, Canada, Mexico and China, including data center and disaster recovery operations. Recent projects for Acadian include implementing ISE and all of the Cisco security products that are in use at Acadian, supporting 5 x 911 communications centers, and overseeing data center operations, 300+ ambulance stations and 10 air crew/flight locations. In his current role, Christopher works with route/switch, wireless LAN controllers, ISE, Prime Infrastructure, Firepower Management Console, ASAs, Firepower Threat Defense Firewalls, AMP, Umbrella, Stealthwatch Enterprise/Cloud, SecureX, Cisco Registered Envelope, Cloudlock, Security Management Console, Cisco Cloud Email Security, Defense Orchestrator, Cognitive Threat Analytics, Threat Grid and SolarWinds products, to name a few.

  • Tim Wilson
    Tim Wilson
    Editor in Chief and Co-Founder
    Dark Reading

    Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one of the top cyber security journalists in the US in voting among his peers, conducted by the SANS Institute. In 2011 he was named one of the 50 Most Powerful Voices in Security by SYS-CON Media.

Sponsored By