Our security strategy is focused on delivering an effective cybersecurity architecture combining network, cloud, and endpoint solutions. Through our industry-leading Cisco Talos offering, we intend to protect against and provide security across the entire attack continuum - before, during, and after a cyberattack - and to help customers shorten the time between threat detection and response.Register now
|1.00PM - 1.50PMTime||Security and Visibility for the Modern Networks||Ross Traynor,
Irzal Sumargo Ramin,
Systems Engineer, Cybersecurity,
|Download PDF||Networks are ever more complex. As more users and devices are added to the network, it is harder to see what’s on the network, and it’s even harder to spot a threat.
This session shows you how you can get real-time situational awareness of all users, devices, and traffic on the network so you can effectively respond to threats.
|1.50PM - 2.40PMTime||Empowering Defenders with Cisco Threat Response||Lewis Tan,
|Download PDF||Security defenders are struggling with the orchestration of a mix of security products and that, by itself, may obfuscate rather than clarify the security landscape. Cisco Threat Response is the key pillar of our integrated security architecture, built to rapidly detect, investigate and remediate threats, thus empowering security analysts with effective weapons to defend their organizations.
In this demo, we will utilize an environment that models after many enterprise networks to show you how your own environments get compromised, how security breaches get detected, and how to respond with maximum effectiveness.
|2.40PM - 3.10PMTime||Break|
|3.10PM - 3.40PM Time||Gold sponsor presentation: Softnet|
|3.40PM - 4.10PMTime||From Chasing Alerts to Hunting Threats: What Makes an Effective SOC is Evolving||Nadhem Al-Fardan,
Security Technical Leader
|Whether you call it a SOC, a CSOC, a SIRC, a Cyber Defense Center, or something else, security operation centers have the same fundamental mission – to help organizations detect, analyze, respond to, report on, and prevent cyber security incidents. But what it takes to do that effectively has changed in this ever-evolving threat landscape and has put an even greater burden on analysts.
Most SOCs take a reactive approach - when an alert is triggered, they investigate. But today, SOCs must also take a automated and proactive approach, automating SOC tasks and engaging in investigation and threat-hunting, with the aim of breaking the cyber kill chain. Advances in technology, intelligence, and analytics used in concert are making this shift in approach possible, helping to focus limited available analyst effort to provide greater value.
Sorry, no results matched your search criteria(s). Please try again.