Fortinet: Protecting Against APTs and Application-based Attacks
The book includes insights from the following experts: Erlend Oftedal, Blank Oslo, Partner and CTO Mikhael Felker, The Honest Company, Director Information Security For all the attention data security has received in recent years...
Tenable: Economic, Operational and Strategic Benefits of Security Framework Adoption – EMEA Edition
The book includes insights from the following experts: Eric Bedell, MUFG, Chief Information Security Officer, The Framework Provides a Common Language for a Global Company >> Russ Kirby, Creditsafe, CISO, Adapt the Framework to the...
Tenable: Reducing Cyber Exposure from Cloud to Containers – EMEA Edition
The book includes insights from the following experts: Eric Bedell, MUFG, Chief Information Security Officer, Applying a Data-Centric Strategy in a Vast IT Ecosystem >> Antonio D’Argenio, Tech Data, Worldwide IT Security...
Steve Stonebraker: Security Automation Begins With Visibility
The key point for security is knowing what you have, and being able to monitor and log all activity related to those IT assets. More advanced tools can identify and track unusual activity and provide information about exactly what was happening in the network at the...
Slim Trabelsi: Correlating Security Data From Multiple Sources Requires Deep Learning Tools
The real challenge is how to make sense of huge amounts of threat intelligence data when much of it is redundant. The only way to do this is to apply deep machine learning to that data. Even with many security analysts, it’s impossible to process all the data, yet...
Sijmen Ruwhof: Automation Tools Need To Be Tuned To Risk Scenarios
Automation plays an essential role when processing data from multiple tools and sources. It enables systems to identify important data while eliminating redundant information much more quickly than humans. To be successful with security-automation tools, you...
Dr. Rebecca Wynn: Take The Time To Train Your Tools
Security automation speeds incident detection and response, and it leverages precious security personnel. However, implementing effective security automation is not as easy as simply buying and installing the right tools. Doing the extra work of building your own rule...
Don Welch: Security Automation Requires Different Skills
Analysts who have invested a lot of time in developing their skills sometimes resist tools that can do certain things better and faster. They need to recognize they can use these tools to become even more effective as analysts. Failing to automate security processes...
Bruce Philips: Security Automation Begins With A Process
Begin with a detection and response process, and then adopt the right tool that will help you automate the process. You can determine an appropriate level of security automation, but success comes down to understanding your capabilities, building your playbooks, and...
Brian Bobo: To Minimize Noise, You Need To Select The Right Tools
No matter how good the security is and how great the team is that manages it, they can never react as quickly as technology to malicious activity. One important criterion for any automated solution is whether the security team has the skills and time to tune it. If...