Adam Geller discusses his shift from Exabeam CEO back to product leadership at Zscaler, where he plans to use the company's vast data insights and security operations to drive growth. Geller emphasizes the importance of CXO-level visibility and robust customer adoption strategies.
Join us for an insightful webinar exploring how a whole-of-state approach to cybersecurity, driven by a Student Security Operations Center (SOC), is helping to close the cyber skills gap. Through TekStream’s innovative collaboration with state and local governments, students gain hands-on experience dealing with...
The threat landscape has evolved for state and local government entities as well as higher education institutes. Mary Lou Prevost from Splunk and Bruce Johnson of TekStream discuss innovative public-private partnerships that boost institutional defense mechanisms.
Piotr Ciepiela, EMEIA cybersecurity leader at EY, discusses the challenges of securing OT systems and contrasts them with IT SOC environments. He emphasizes the need for specialized tools, dedicated personnel and strong collaboration with engineering teams to manage OT SOC operations.
The “Three Pillars” (people, process, and technology) management framework requires a delicate balance in order to achieve successful operations outcomes. Despite the ‘technology’ pillar dominating the conversation as of late, cybersecurity practitioners are the backbone of your organization's defense against...
BlueVoyant's Cyber Defense Platform combines proactive and reactive security measures with internal and external capabilities. CEO Jim Rosenthal explains how this comprehensive approach allows clients to manage cyber risks effectively and achieve a desired state of cyber defense readiness.
Bryan Palma, CEO of Trellix, shares insights into the company's involvement in cybercrime takedowns and the integration of generative AI into the company's XDR platform. He discusses how Trellix Wise streamlines SOC processes and the company's focus on ransomware detection and data security.
Microsoft-centric organizations who take advantage of the Microsoft 365 E5 license to consolidate security tools have options when it comes to covering their non-Microsoft technologies.
This complimentary white paper provides an overview of the Microsoft 365 E5 offering, looks at Microsoft Sentinel (including cost...
Ranking among the top four vendors globally for strategy and execution, IDC has recognized Secureworks robust presence, exceptional capabilities, and scalable solutions.
Download this report to find out how Secureworks stands out with:
Global reach, multi-industry expertise, and rapid access to top-tier security...
Security controls are your tools to reduce your risk and protect your organization from threats. They are also critical in helping you achieve the most cyber insurance coverage at the least cost, a pain point for many organizations. Looking at the spectrum of prevention and impact reduction, we’ve identified the 10...
Security Operations Centers (SOC) are essential for organizations to quickly detect, analyze, and respond to cyber incidents. Organizations need to decide whether an internal, hybrid, or outsourced SOC model is best for them, and then ensure they use the right metrics to measure its performance for continued security...
Integrating cyberthreat intelligence across all business operations is essential for enhancing security and managing risks effectively. But that valuable threat intel should not be limited to security operations centers, said Tim Gallo, head of global solutions architects, Google.
Securing an organization often requires making fast decisions, said Tom Corn of Ontinue, and AI can gather information that you can use to answer the questions you have about how to handle a security problem. Corn discusses operationalizing an AI-first approach to security.
In this webinar session, you will learn new innovations for our industry-defining SIEM solution, Splunk Enterprise Security, and the rest of our security solutions
Today’s three largest cybersecurity markets are endpoint security, network security, and identity. While there are other large cybersecurity markets, including email security, web security, cloud security, SIEM, and SOC, these three account for over 50% of the cybersecurity market and are a big part of any...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.