Adam Geller discusses his shift from Exabeam CEO back to product leadership at Zscaler, where he plans to use the company's vast data insights and security operations to drive growth. Geller emphasizes the importance of CXO-level visibility and robust customer adoption strategies.
The threat landscape has evolved for state and local government entities as well as higher education institutes. Mary Lou Prevost from Splunk and Bruce Johnson of TekStream discuss innovative public-private partnerships that boost institutional defense mechanisms.
Piotr Ciepiela, EMEIA cybersecurity leader at EY, discusses the challenges of securing OT systems and contrasts them with IT SOC environments. He emphasizes the need for specialized tools, dedicated personnel and strong collaboration with engineering teams to manage OT SOC operations.
The “Three Pillars” (people, process, and technology) management framework requires a delicate balance in order to achieve successful operations outcomes. Despite the ‘technology’ pillar dominating the conversation as of late, cybersecurity practitioners are the backbone of your organization's defense against...
Kevin Kin, global vice president of systems engineering at Palo Alto Networks, and Matt Shriner, global executive partner of threat management at IBM, outline the role of AI in the cybersecurity landscape, the evolution of threats, and collaborative solutions.
BlueVoyant's Cyber Defense Platform combines proactive and reactive security measures with internal and external capabilities. CEO Jim Rosenthal explains how this comprehensive approach allows clients to manage cyber risks effectively and achieve a desired state of cyber defense readiness.
The threat surface is ever-expanding, with multiple entry points available to threat actors. According to the latest report, the average time to detect and contain a breach is 277 days.
Setting up an internal SOC can be time-consuming, and lack of threat visibility due to siloed security and technologies across...
With the continual industrialized cyber-criminal operations and increased nation state sponsored cyber espionage activities, many organizations are struggling to keep up with attackers, and their security teams are often overwhelmed by the number of security alerts being generated by a multitude of security...
According to a recent SecOps and Automation report, 56% of large companies handle at least 1000 alerts per day. 99% said the alert volume created problems for their IT security teams and 93% said they could only address some alerts on the same day.
In this volatile landscape, threat management is an important...
In today's digital landscape, cyber threats are more advanced and persistent than ever before. To effectively combat these threats, its crucial to adopt a comprehensive framework that guides the entire process from threat detection to mitigation.
The MITRE ATT&CK Framework provides a structured approach to...
SOC teams have been clear for some time that additional operational capacity and expertise to detect and respond to today’s threats are needed.
MDR’s outsourced model of workload and network protection that can help intrusion analysis and investigation teams more rapidly and efficiently prevent, detect, and...
Since he joined Jindal Steel & Power as CISO about 18 months ago, Aditya Vardhan has set specific cybersecurity goals. Vardhan established a data classification model, set up a security operations center and unified different identity repositories.
Bryan Palma, CEO of Trellix, shares insights into the company's involvement in cybercrime takedowns and the integration of generative AI into the company's XDR platform. He discusses how Trellix Wise streamlines SOC processes and the company's focus on ransomware detection and data security.
Discover How MDR Enhances Security Maturity
Cyberthreats are becoming more sophisticated and aggressive, but not every organization has the resources to tackle these threats. You don’t have to fight alone.
Managed detection and response (MDR) services have become integral to modern security strategies. They...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.in, you agree to our use of cookies.