How to Build a SOC with Limited Resources

  Presented by LogRhythm

In a perfect world, your organization would staff a 24×7 Security Operation Center, and have no trouble finding the budget or talent to do so. But the truth is, most organizations can’t afford a 24×7 SOC. The cost of having well-trained analysts onsite at all times outweighs the benefits.

If your organization is making do with an informal Security Operation Center, you may be facing delays in responding to incidents. You may even fear that incidents are going unnoticed. It’s a dangerous situation.

Organizations need to think of security operations as a critical business process. Effective security operations are the first line of defense when it comes to preventing cyberattacks. To accomplish this, organizations need mature programs that leverage people, processes, and technology to rapidly detect and respond to sophisticated attacks.

The purpose of this presentation is to provide you guidance and a framework that you can apply to building, assessing, and maintaining your security operations center to ensure its success throughout the business lifecycle.

Mobile Threat Landscape/Mobile Hacking

  Presented by Symantec

Today’s modern operating systems, like iOS and Android, are designed for ubiquitous and wireless access from anywhere in the world and have very different use cases and security requirements compared with traditional PCs and servers. Mobile devices are on and connected 24/7, and often owned and managed by individuals, dramatically increasing the attack surface relative to PCs. Malicious hackers have shifted much of their attention to these new operating systems that may provide a direct link into large companies with valuable assets worth stealing. Today, their methods are less focused on broad and annoying attacks on consumers and more on targeted attacks on specific individuals in specific organizations who have the right access levels to high-value assets. Well-researched social engineering exploits, combined with system vulnerabilities, make these attacks highly effective, even against smart and educated individuals. Solutions exist that protect companies from mobile cyber-attacks by securing mobile devices, whether owned by the company or the individual, from the entire landscape of mobile threats-including malware, network-based threats, vulnerability exploits and other targeted attacks, without changing the mobile user experience, compromising user privacy or adding extra burden to IT. Today we will discuss the Mobile Threat Landscape, show an example of what a Mobile Threat looks like, and discuss best practices to protect your Mobile Data.

Mitigate Cyber Risks: Visibility & Response

  Presented by RSA, the Security Division of Dell EMC

Cyber-attack risks are more prominent and widespread in today’s digital environment. Organizations struggle to respond to the evolving threat landscape—a challenge compounded by visibility and process gaps created by functional silos. This results in uncoordinated responses to cyber incidents that magnify financial, operational, reputational and compliance risks for businesses. This session will cover recommended steps to gain visibility and mitigate ongoing risk.

Infrastructure Modernization: A Framework for Digital Transformation

  Presented by World Wide Technology

As IT operational models evolve, it is becoming increasingly important to align with lines of business on speed to deployment, simplifying management, and creating visibility on metrics.

In this talk we will explore how IT Operations and lines of business are converging efforts and creating brand value by enabling next gen technology through automation, digital strategy, and analytics tools at scale.

Treating Your Information as an Asset: A Holistic Strategy

  Presented by CTG

All organizations have assets — the valuable resources needed to function as an effective business. And Although it might not appear on your balance sheet, data is one of the most valuable assets an organization owns and, like all assets, must be identified, created and maintained.

“Information assets” should take advantage of clearly defined goals, roles and responsibilities, business processes and ownership. In this presentation, we will outline the three concrete steps your organization can follow to realize the tangible benefits of this highly valuable corporate asset and discuss how to derive value from your data at multiple points in the journey to becoming a data-centric organization.

A New Era for Data Protection: Converged DR and Backup

  Presented by Zerto

In today’s always-on, information-driven organizations, business continuity depends completely on IT infrastructures that are up and running 24/7. Being prepared for any data related disaster is key!

  • The cost and business impact of downtime and data loss can be immense
  • Data loss is not only caused by natural disasters, power outages, hardware failure and user errors, but more and more by software problems and cyber security related disasters
  • Having a plan and process in place will help you mitigate the impact of an outage on your business

In this presentation we will address the challenges, needs, strategies, and solutions.

Evolving Your BC/DR Strategy to Protect Today’s Multi-Cloud Environments

  Presented by Unitrends

We are living in a “Less is More” world. IT Professionals are facing more work, projects, and risks than ever before, while having less time and money, and a rapidly decreasing tolerance of downtime. While external threats such as malware and natural disasters are prevalent and may cause significant downtime and data loss without the proper BCDR strategies, organizations must also be prepared to safeguard from within. Data continues to grow at an exponential rate, and not only on-premises. As cloud-delivered solutions such as IaaS and SaaS are rapidly adopted by an increasing number of organizations, these organizations must also consider their data protection strategies to address native gaps within these platforms. Join Adam Marget, Technical Demand Generation Specialist, Unitrends, as we’ll explore the evolving landscape of data protection, cloud’s growing role, BC/DR strategies to safeguard local and cloud-based workloads, and best practices in planning your DR approach.