LogRhythm: A Roadmap to Security Operations Maturity
Effective security operations are the first line of defense when it comes to preventing cyber attacks. To accomplish this, organizations need mature and measurable programs that leverage people, process, and technology to rapidly detect and respond to sophisticated attacks. A model for Security Operations maturity will be outlined in this keynote. Public sector organizations can use this model as a basis to evaluate their current security operations maturity level and develop a roadmap to achieve the level that is appropriate in the light of their specific resources, budget, and risk tolerance.
Audience members will be introduced to concepts and tools that allow them to assess their organization's security operations level of maturity and outline a roadmap for improving that level.
IBM: Coffee Talk- How to Rock Your SOC
The experts share best practices in building a Security Operations Center .
Speakers: Alden Hutchinson, Associate Partner, IBM Security Intelligence
Cindy Compert, CTO Data Security & Privacy, IBM Security
Sean Updegrove, Associate Partner, IBM -Security Strategy, Risk and Compliance