How to Build a SOC with Limited Resources

  Presented by LogRhythm

In a perfect world, your organization would staff a 24×7 Security Operation Center, and have no trouble finding the budget or talent to do so. But the truth is, most organizations can’t afford a 24×7 SOC. The cost of having well-trained analysts onsite at all times outweighs the benefits.

If your organization is making do with an informal Security Operation Center, you may be facing delays in responding to incidents. You may even fear that incidents are going unnoticed. It’s a dangerous situation.

Organizations need to think of security operations as a critical business process. Effective security operations are the first line of defense when it comes to preventing cyberattacks. To accomplish this, organizations need mature programs that leverage people, processes, and technology to rapidly detect and respond to sophisticated attacks.

The purpose of this presentation is to provide you guidance and a framework that you can apply to building, assessing, and maintaining your security operations center to ensure its success throughout the business lifecycle.

Developing a 360 Data Management Strategy for Your Business

  Presented by World Wide Technology & Veritas

Exponential data growth, rising storage costs, complex cloud migrations, and stringent regulations are forcing organizations to find efficient and economical ways to take control of and manage their growing data environment.

Join this session to learn how a global financial institution and a large data analytics company were both able to successfully implement an end-to-end data management strategy, which encompassed the following:

  • Data Protection: ensure data copies are kept for redundancy to prevent data loss.
  • Compliance Readiness: proper retention and timely destruction of data as regulatory requirements dictate.
  • Data Visibility: understanding what data you have, where it is, and how it’s used.
  • Data/Workload Portability: movement and migration of applications and data among various on-prem and cloud locations.
  • Business Continuity: recovery and resilience that is needed when massive outages or disasters occur.
  • Storage Optimization: automating the storage of data across resources to optimize cost and performance.

Adapting to Fight Back: How Cyber AI Neutralizes Never-Before-Seen Threats

  Presented by Darktrace

In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today’s businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks daily. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.

Shifting from ITSM to ESM as a Way to Enable and Transform the Enterprise

  Presented by ServiceNow

As a member of IT, have you found yourself doubting your relationship with the rest of the organization as you’re perceived as a cost center rather an equal part stakeholder with a common goal? Do you find yourself struggling to collaborate with the rest of the organization as the tech debt in your organization has created seemingly insurmountable silo’s? If you feel any of this describes your work environment and how IT may be perceived, please join the discussion in how the concepts of IT Service Management need to shift to a more inclusive Enterprise Service Management strategy. Ultimately, driving more effective technology purchasing, collaboration across the enterprise and re-branding of IT as an organizational enabler.