Smarter Security Automation for Streamlined SecOps

A shortage of skilled IT security professionals has given rise to a whole new class of technology and practices designed to automate repetitive and time-consuming tasks in security operations. But which tasks can enterprises safely automate? How does emerging automation technology work, and how can security teams implement it in a way that is both effective and secure? In this webinar, top experts offer insights on how to make automation work for your security team.

On Demand
1h 00min

Attend this webinar and you'll:

  • Learn about emerging technologies for automation
  • Get tips from experts on implementing automation in your environment
  • Find out about some of the common missteps security teams make with automation
  • Gain insights on which tasks are a good fit for automation

Featured Speakers

  • Christopher Crowley
    Christopher Crowley
    Independent Consultant

    Christopher Crowley has 20 years of experience managing and securing networks, beginning with his first job as an Ultrix and VMS systems administrator at 15 years old. Today, Crowley is a Senior Instructor at the SANS Institute and the course author for the culmination of his thoughts on effective cybersecurity operations. He works with a variety of organizations across industries providing cybersecurity technical analysis, developing and publishing research, sharing expert security insights at conferences, and chairing security operations events. He has provided training to thousands of students globally. Crowley holds a multitude of cybersecurity industry certifications and provides independent consulting services specializing in effective computer network defense via Montance®, LLC, based in Washington, DC. Montance® provides cybersecurity assessments and framework development services that enable clients to develop new security operations centers (SOC) and improve existing security operations. An independent consulting firm, Montance® provides direct, customized services to organizations large and small in the financial, industrial, energy, medical, and defense industries. His current focus is on integrating within existing security operations to fill short term gaps where needed, define effective strategy after careful study. He blends cultural alignment with cybersecurity expertise to implement tactical programs to mature monitoring capability, pen testing, and overall security operations.

  • Erez Harush
    Erez Harush
    Data Scientist Manager
    Palo Alto Networks

    Erez Harush is a Data Scientist Manager at Palo Alto Networks. His career began in the Israeli Defense Forces, "Unit 8200" - an elite military technology unit that has become an incubator for Israel’s renowned high-tech sector. He served in "Unit 8200" for six years, researching and understanding cyber-security attacks. For the past two years, he worked in Demisto (Palo Alto Networks) as a data scientist, with a focus on improving incident response using machine learning. Erez holds a Computer Science and Physics from The Hebrew University, Talpiot Alumni, and a Msc in Computer Science from IDC Herzliya.

  • Joan Goodchild
    Joan Goodchild
    Senior Editor
    Dark Reading

    Joan Goodchild is a veteran journalist, editor, and writer who has been covering security for more than a decade. She has written for several publications and previously served as editor-in-chief for CSO Online.

Sponsored By