Leveraging Security Orchestration and Automation to Defend at Attacker Speed The State of IT and Cybersecurity |
Security teams may be responsible for defending their organization's systems, but the IT department's actions — or inaction — can often make the difference between a strong defense and a news-making data breach. Unfortunately, Dark Reading's new report reveals some major barriers to effective collaboration between Security and IT teams. How does your organization compare? |
| | |
For over 10 years, Dark Reading has been a trusted resource for IT and security pros looking for news about cyber attacks, vulnerabilities and how to defend them. INsecurity: A Dark Reading Conference, draws from the real-world, hands-on experiences of practicing cybersecurity professionals, and digs into the most critical areas of information needed by the infosec community.
Join Dark Reading live at INsecurity 2018 and get practical cybersecurity strategies and solutions to apply to your enterprise. - Hear from security leaders like Stephen Moore, former member of the security team at Anthem Blue Cross Blue Shield, who will share his thoughts on the human side of breach response and how he and his team dealt with Anthem's 2015 data breach of nearly 800 million customer records
- Have "closed-door" conversations with security experts and practitioners from companies like University of Pennsylvania and Baker Hughes (a GE company) about what they're doing to create a more secure enterprise
| | |
Discuss Today's Challenges Including Patch Management, User Provisioning, Security Monitoring and Much More INsecurity will offer introductory-level and general sessions designed to help individuals who may not have a security job title, but still need security know-how. Everyday issues and practices will be covered, including topics like patch management, user provisioning, authentication, security monitoring, and the basics of incident response.
Check out these sessions: - Leveraging Security Orchestration and Automation to Defend at Attacker Speed - Explore the core components of Security Orchestration, Automation and Response (SOAR), the skills required to design and implement in your organization, and common use cases focused on detection & response, threat hunting, and threat intelligence with Threat Hunting Lead/Senior Engineer of Northwestern Mutual, Brian Genz
- Cover Your aaS with DevSecOps - Deputy CISO of Blue Cross Blue Shield of Kansas City, Cindi Carter, and Research Fellow at the Cloud Security Alliance, Yaron Levi, will share their story about building security into DevOps, making it part of the culture for an organization with 3500 developers globally who didn't want to have anything to do with security.
| | |
|
|