Remove Risk Remove Technology Remove Threat Detection Remove Webinar
article thumbnail

20 Years of SIEM Webinar Q&A

Anton on Security

I recently did this fun SANS webinar titled “Anton Chuvakin Discusses “20 Years of SIEM?—?What’s What’s Next?”” (the seemingly self-centered title was suggested by CardinalOps who organized the webinar). As it is common for SANS webinars , we got a lot of great questions that I feel like re-answering here for posterity.

article thumbnail

SOC Trends ISACA Webinar Q&A

Anton on Security

A few days ago we did a very well-attended webinar focused on the modern Security Operations Center (SOC) approach (see “Trend for the Modern SOC” for a replay link). Fully automated onboard log sources, threat detection rule creation, playbook creation, response, automated integration, and execute. Also see this paper.

Risk 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Choosing an MDR provider: Boutique or Big Brand (Part 3)

Jane Frankland

Having begun by discussing the first core feature, technology, I then focused on the second core feature, contract terms. I wove in many data points, including some from Managed Threat Detection and Response firm, e2e-assure, who I’m partnering with, and their latest report, Rejuvenating Cyber Defence Strategies.

article thumbnail

Defining Good: A Strategic Approach to API Risk Reduction

Security Boulevard

How do we gauge how risky it is and how do we ensure that future APIs are not putting the enterprise at risk? Unfortunately, the security challenges associated with APIs can't be solved by simply updating existing testing tools and edge security defenses to check-the-box technologies that claim to provide "API security."

Risk 59
article thumbnail

SOC Trends ISACA Webinar Q&A

Security Boulevard

A few days ago we did a very well-attended webinar focused on the modern Security Operations Center (SOC) approach (see “Trend for the Modern SOC” for a replay link). Fully automated onboard log sources, threat detection rule creation, playbook creation, response, automated integration, and execute. Also see this paper.

Risk 51
article thumbnail

Mitigating Insider Threat Risk in Financial Services

SecureWorld News

Director, Infrastructure Security at FINRA on the SecureWorld broadcast Mitigate Insider Risk in Financial Firms. 4 key findings of insider threats in the financial services sector. Most of the incidents were detected either through an audit, a customer complaint, or coworker suspicion.

article thumbnail

Strengthening Cyber Resilience: A Milestone Partnership

Security Boulevard

At HYAS, we are deeply committed to empowering organizations with the solutions they need to get proactive against the ever-evolving threat landscape. Don’t miss our upcoming threat intelligence webinar! I extend my sincere gratitude to ZainTECH for their visionary leadership and unwavering commitment to excellence.