Piotr Ciepiela, EMEIA cybersecurity leader at EY, discusses the challenges of securing OT systems and contrasts them with IT SOC environments. He emphasizes the need for specialized tools, dedicated personnel and strong collaboration with engineering teams to manage OT SOC operations.
Kevin Kin, global vice president of systems engineering at Palo Alto Networks, and Matt Shriner, global executive partner of threat management at IBM, outline the role of AI in the cybersecurity landscape, the evolution of threats, and collaborative solutions.
The “Three Pillars” (people, process, and technology) management framework requires a delicate balance in order to achieve successful operations outcomes. Despite the ‘technology’ pillar dominating the conversation as of late, cybersecurity practitioners are the backbone of your organization's defense against...
BlueVoyant's Cyber Defense Platform combines proactive and reactive security measures with internal and external capabilities. CEO Jim Rosenthal explains how this comprehensive approach allows clients to manage cyber risks effectively and achieve a desired state of cyber defense readiness.
Since he joined Jindal Steel & Power as CISO about 18 months ago, Aditya Vardhan has set specific cybersecurity goals. Vardhan established a data classification model, set up a security operations center and unified different identity repositories.
Bryan Palma, CEO of Trellix, shares insights into the company's involvement in cybercrime takedowns and the integration of generative AI into the company's XDR platform. He discusses how Trellix Wise streamlines SOC processes and the company's focus on ransomware detection and data security.
Discover How MDR Enhances Security Maturity
Cyberthreats are becoming more sophisticated and aggressive, but not every organization has the resources to tackle these threats. You don’t have to fight alone.
Managed detection and response (MDR) services have become integral to modern security strategies. They...
Understanding XDR and Modern Threats
Find the latest information to help you improve your endpoint security, extend protection beyond the endpoint, and quickly detect and respond to threats.
Learn how extended detection and response (XDR) take it beyond NGAV or EDR to bring a unified and proactive approach to threat...
In today's rapidly evolving threat landscape, traditional Security Operations Centers (SOCs) face significant challenges in detecting and responding to cyber threats swiftly and effectively. Analysts are overwhelmed with alert fatigue and manual, labor-intensive tasks — decreasing operational resilience and...
Integrating cyberthreat intelligence across all business operations is essential for enhancing security and managing risks effectively. But that valuable threat intel should not be limited to security operations centers, said Tim Gallo, head of global solutions architects, Google.
Securing an organization often requires making fast decisions, said Tom Corn of Ontinue, and AI can gather information that you can use to answer the questions you have about how to handle a security problem. Corn discusses operationalizing an AI-first approach to security.
In this webinar session, you will learn new innovations for our industry-defining SIEM solution, Splunk Enterprise Security, and the rest of our security solutions
Cybersecurity is evolving from an expense to a strategic investment, a concept explored in our latest analysis. TekStream’s Managed Detection and Response (MDR) services stand out by offering a collaborative environment where in-house staff can actively engage in threat management, ensuring greater ownership and...
The government of Maharashtra in India released the first phase of a $100 million grant to L&T Technology Services to establish a state-of-the-art cybercrime prevention center and design a sophisticated cybersecurity system to tackle the growing problem of cybercrime.
The security information and event management landscape is constantly evolving, but “traditional SIEM has classically been stuck in the enterprises due to accessibility,” according to Mike Nichols, vice president of product management for security at Elastic.
Nichols underscored the challenges modern SOC analysts...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.