Research, Security Operations

More Data, More Problems: Applying the Right Automation to Propel Security Operations

In this session, Chris Calvert, one of the foremost designers of global security operations centers, will lead a spirited and informative discussion that will lift the hood on what is hype and what is truly transformative in automation for security operations.

Research, Security Operations

Designing an Effective SOC Part II- How to Build an Efficient & Effective SOC

Today’s SOC models provide two options: build a labor-intensive in-house SOC or outsource to an MSSP. In Part-1 of this two-part series Larry Ponemon shared how dissatisfied security professionals are with the inefficiencies found in both models. Now in Part II, Chris provides a practical guide for designing a new modern SOC model that combines humans and machines to deliver more efficiency and ROI.

Research, Security Operations

Designing an Effective SOC Part I – The Economics of Security Operations

Ponemon Insights - Despite significant investments in 2019, half of the security managers in the survey report that their SOC is ineffective at detecting attacks. What’s keeping us stuck? In Part One of this two-part series, Larry Ponemon joins Respond Software to discuss the most recent Ponemon Report findings, new insights into the economics and effectiveness of SOCs.

Perspective, Security Analysts, Security Operations

AI: ‘We’re Having the Wrong Conversation’

In a video interview at Information Security Media Group’s recent Fraud and Breach Summit in Washington, Chris Calvert discusses: What’s misunderstood about AI; Proper security roles for humans vs. machines; How enterprises need to organize cybersecurity...

Perspective, Security Analysts, Security Operations

Fintech CISO Shares 5 Tips: How Kyriba Automated SecOps

Build a world-class security operation with a lean, nimble team. When security leaders are asked to ‘do more with less’, their choices are 1) reduce their team size 2) think out of the box 3)...

Product, Security Analysts

Security Analysts: Finding Incidents Using Web Filtering Data

Web filter logs contain valuable security data that can be used to recognize adversaries within your network. This data is a top source for incident responders and forensic investigations — once an attack has already been identified. However, the size and complexity of this data makes it nearly impossible to analyze and monitor, let alone to be able to do this in real-time. Respond Analyst is the first security decision automation solution that brings this data to frontline analysis where it’s more valuable. Real-time analysis and triage of web filter data, during network and endpoint analysis, gives security teams an edge in reducing response times and limiting the impact of some of the most stealthy attacks.

Join our growing community! Subscribe to our newsletter, the "First Responder Notebook," delivered straight to your inbox.