Events Calendar

Security Orchestration Summit 2020
Tuesday 15 September 2020, 10:00am - 06:00pm
Hits : 297
by This email address is being protected from spambots. You need JavaScript enabled to view it.

To facilitate and ensure open discussions (Chatham House Rules), attendance is restricted to SOC Managers, CERT and CSIRT teams & CISO’s representing Critical Infrastructure Operators & Vital Sectors; National Cyber Security Centers & Government Institutions, ISACs [Sharing Information Sharing and Analysis Centers]; and LSEC Members active in Security Operations or Research. This event is Invitation Only, the registration page is password protected. If you feel that you fit the profile and can contribute to the discussions but did not receive a personal invitation, please request your access code via the event registration page.

 

Abstract

Often, the biggest problem facing Security Operations Centers is not an inability to detect security threats, but rather the methods how to address those threats. With their reliance on manual processes and disconnected solutions, security analysts remain overwhelmed with [ false] alerts and lack the power to be effective at their jobs. There is an increased need to coordinate multiple security products and processes across the organization to manage tools and processes effectively; and ensure a streamlined task flow from detection to threat response and remediation. Implementing Security Orchestration enables organizations to collect security threats data and alerts from difference sources, increase resources on important tasks by automating repetitive tasks; ensure a faster response to incidents by automating integration, investigation & response; and have a stronger defense with the integration of existing security infrastructure. Having said that, security orchestration is not a plug and play wonder solution. Effective security orchestration requires a tightly organization that provides robust capabilities across a multitude of components. At the end of the day, the effectiveness of orchestration is only as strong as the weakest link.

 

Topics:

  • Bridging the Gap between alert overload and analyst capacity
  • Security operations end to end
  • Playbooks for Security Orchestration
  • Gathering and consolidating data from multiple security controls
  • Incident Response flows with security automation
  • Virtualization & Dashboarding supporting security analysts

 

Attendees – Restricted Audiences

  • CISO, Security Manager, SOC Manager, CERT and CSIRT team
  • Security analyst representing Critical Infrastructure Operators, Vital Sectors / Significant Market Operators
  • National Cyber Security Centers & Government Institutions
  • LSEC Members from the vendor & research community

The agenda is still under development, visit this page regularly for updates with abstracts and speakers. Confirmed speakers include Huawei Technologies, ATOS, Splunk, CyberSponse / Fortinet, FireEye, ATAR Labs. Invited and to be confirmed: CloudLock/ Cisco, ThreatQ, Siemplify...

Request your Access Code:

This event is Invitation Only, the registration page is password protected. If you feel that you fit the profile and can contribute to the discussions but did not receive a personal invitation, please request your access code via the event registration page.

 

Security Orchestration Summit 2020
15 September 2020, Brussels
https://securityorchestration2020.eventbrite.com  

LSEC for Security Professionals

lsec-prof

LSEC for Security Companies

lsec-com

LSEC for enterprise & government

lsec-gov

LSEC for academia & research institutes

lsec-research

Request information about LSEC Membership

Click here

Sign up for our newsletter

Click here

Learn more about current projects & industry collaborations

Click here

Contact us

Click here

logo-acdcec

Privacy | Disclaimer | Responsible Disclosure Copyright LSEC - Leaders In Security 2002 - 2017 - Kasteelpark 10, 3001 Heverlee - Leuven | tel. +32.16.32.85.41