Research, Security Operations

Security Leaders: Optimize Your Security Operations Budget

Join Respond Software as we host a live chat with Brett Wahlin, CISO of Amazon Prime Video. Brett will share the best practices he applied to lead security operations at a number of organizations, including Staples, HP and Sony. Hosted by Chris Triolo, VP of Customer Success, get the definitive roadmap for everything you need to maximize your security operations budget.

By automating the monitoring & triage of EDR events with Robotic Decision Automation (RDA), security teams can focus on their response actions and other areas that reduce business risk.
So, in this real training event, we will share research into how to deal with this problem and introduce a unique kind of technology designed to take the grunt work out of alert analysis.

Research, Security Operations

Automating SecOps – Monitoring & Triage for EDR Events

Endpoint Detection and Response (EDR) provides security organizations with highly accurate, detailed, low-level OS information, by way of 10s of thousands of events per day. EDR is a key piece for optimal security posture, however, monitoring requires deep OS and security expertise to achieve a quick and effective response. Many organizations have Tier 1 analysts swiveling between consoles, generating manual queries, and incorporating other context and security events; a method that often leaves security teams with more alerts than they can manage.

By automating the monitoring & triage of EDR events with Robotic Decision Automation (RDA), security teams can focus on their response actions and other areas that reduce business risk.
So, in this real training event, we will share research into how to deal with this problem and introduce a unique kind of technology designed to take the grunt work out of alert analysis.

Research, Security Operations

Top 7 Best and Worst Ways to Avoid Alert Fatigue

So many alerts and most are false positives. Alert fatigue is real and it’s dangerous. It's dangerous because you will suffer attrition of highly skilled SOC analysts if they are unhappy. Yet the immediate risk is fear that the SOC team will miss “the big one.” A good SOC analyst is happy when they are hunting – not just monitoring consoles. Surveys indicate that staff has to monitor more and more consoles and are increasingly ignoring alerts.

So, in this real training event, we will share research into how to deal with this problem and introduce a unique kind of technology designed to take the grunt work out of alert analysis.

Research, Security Operations

More Data, More Problems: Applying the Right Automation to Propel Security Operations

In this session, Chris Calvert, one of the foremost designers of global security operations centers, will lead a spirited and informative discussion that will lift the hood on what is hype and what is truly transformative in automation for security operations.

Research, Security Operations

Designing an Effective SOC Part II- How to Build an Efficient & Effective SOC

Today’s SOC models provide two options: build a labor-intensive in-house SOC or outsource to an MSSP. In Part-1 of this two-part series Larry Ponemon shared how dissatisfied security professionals are with the inefficiencies found in both models. Now in Part II, Chris provides a practical guide for designing a new modern SOC model that combines humans and machines to deliver more efficiency and ROI.

Research, Security Operations

Designing an Effective SOC Part I – The Economics of Security Operations

Ponemon Insights - Despite significant investments in 2019, half of the security managers in the survey report that their SOC is ineffective at detecting attacks. What’s keeping us stuck? In Part One of this two-part series, Larry Ponemon joins Respond Software to discuss the most recent Ponemon Report findings, new insights into the economics and effectiveness of SOCs.