Adam Geller discusses his shift from Exabeam CEO back to product leadership at Zscaler, where he plans to use the company's vast data insights and security operations to drive growth. Geller emphasizes the importance of CXO-level visibility and robust customer adoption strategies.
The threat landscape has evolved for state and local government entities as well as higher education institutes. Mary Lou Prevost from Splunk and Bruce Johnson of TekStream discuss innovative public-private partnerships that boost institutional defense mechanisms.
In the most recent Nationwide Cybersecurity Review (NCSR), 3,681 U.S. State, Local, Tribal, and Territorial (SLTT) government organizations identified their top five cybersecurity concerns.
In this white paper, we will review these five challenges as well as the critical task of growing cyber maturity and defending...
Piotr Ciepiela, EMEIA cybersecurity leader at EY, discusses the challenges of securing OT systems and contrasts them with IT SOC environments. He emphasizes the need for specialized tools, dedicated personnel and strong collaboration with engineering teams to manage OT SOC operations.
The “Three Pillars” (people, process, and technology) management framework requires a delicate balance in order to achieve successful operations outcomes. Despite the ‘technology’ pillar dominating the conversation as of late, cybersecurity practitioners are the backbone of your organization's defense against...
Kevin Kin, global vice president of systems engineering at Palo Alto Networks, and Matt Shriner, global executive partner of threat management at IBM, outline the role of AI in the cybersecurity landscape, the evolution of threats, and collaborative solutions.
BlueVoyant's Cyber Defense Platform combines proactive and reactive security measures with internal and external capabilities. CEO Jim Rosenthal explains how this comprehensive approach allows clients to manage cyber risks effectively and achieve a desired state of cyber defense readiness.
Bryan Palma, CEO of Trellix, shares insights into the company's involvement in cybercrime takedowns and the integration of generative AI into the company's XDR platform. He discusses how Trellix Wise streamlines SOC processes and the company's focus on ransomware detection and data security.
Ranking among the top four vendors globally for strategy and execution, IDC has recognized Secureworks robust presence, exceptional capabilities, and scalable solutions.
Download this report to find out how Secureworks stands out with:
Global reach, multi-industry expertise, and rapid access to top-tier security...
Microsoft-centric organizations who take advantage of the Microsoft 365 E5 license to consolidate security tools have options when it comes to covering their non-Microsoft technologies.
This complimentary white paper provides an overview of the Microsoft 365 E5 offering, looks at Microsoft Sentinel (including cost...
In today's rapidly evolving threat landscape, traditional Security Operations Centers (SOCs) face significant challenges in detecting and responding to cyber threats swiftly and effectively. Analysts are overwhelmed with alert fatigue and manual, labor-intensive tasks — decreasing operational resilience and...
Security controls are your tools to reduce your risk and protect your organization from threats. They are also critical in helping you achieve the most cyber insurance coverage at the least cost, a pain point for many organizations. Looking at the spectrum of prevention and impact reduction, we’ve identified the 10...
Security Operations Centers (SOC) are essential for organizations to quickly detect, analyze, and respond to cyber incidents. Organizations need to decide whether an internal, hybrid, or outsourced SOC model is best for them, and then ensure they use the right metrics to measure its performance for continued security...
Integrating cyberthreat intelligence across all business operations is essential for enhancing security and managing risks effectively. But that valuable threat intel should not be limited to security operations centers, said Tim Gallo, head of global solutions architects, Google.
Securing an organization often requires making fast decisions, said Tom Corn of Ontinue, and AI can gather information that you can use to answer the questions you have about how to handle a security problem. Corn discusses operationalizing an AI-first approach to security.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.