Our security strategy is focused on delivering an effective cybersecurity architecture combining network, cloud, and endpoint solutions. Through our industry-leading Cisco Talos offering, we intend to protect against and provide security across the entire attack continuum - before, during, and after a cyberattack - and to help customers shorten the time between threat detection and response.
|1.00PM - 1.50PMTime||Security and Visibility for the Modern Networks||Brian Cotaz,
Systems Engineer, Cybersecurity,
|Networks are ever more complex. As more users and devices are added to the network, it is harder to see what’s on the network, and it’s even harder to spot a threat.
This session shows you how you can get real-time situational awareness of all users, devices, and traffic on the network so you can effectively respond to threats.
|1.50PM - 2.40PMTime||Empowering Defenders with Cisco Threat Response||Lewis Tan,
|Security defenders are struggling with the orchestration of a mix of security products and that, by itself, may obfuscate rather than clarify the security landscape. Cisco Threat Response is the key pillar of our integrated security architecture, built to rapidly detect, investigate and remediate threats, thus empowering security analysts with effective weapons to defend their organizations.
In this demo, we will utilize an environment that models after many enterprise networks to show you how your own environments get compromised, how security breaches get detected, and how to respond with maximum effectiveness.
|2.40PM - 3.10PMTime||Break|
|3.10PM - 3.40PM Time||Secure by Design: Delivering Secure Digital Business Solutions||Andjo Capellan,
Cybersecurity Practice Lead,
Dimension Data Philippines
|3.40PM - 4.30PMTime||From Chasing Alerts to Hunting Threats: What Makes an Effective SOC is Evolving||Peter Baurichter,
Security Services Manager,
|Whether you call it a SOC, a CSOC, a SIRC, a Cyber Defense Center, or something else, security operation centers have the same fundamental mission – to help organizations detect, analyze, respond to, report on, and prevent cyber security incidents. But what it takes to do that effectively has changed in this ever-evolving threat landscape and has put an even greater burden on analysts.
Most SOCs take a reactive approach - when an alert is triggered, they investigate. But today, SOCs must also take a automated and proactive approach, automating SOC tasks and engaging in investigation and threat-hunting, with the aim of breaking the cyber kill chain. Advances in technology, intelligence, and analytics used in concert are making this shift in approach possible, helping to focus limited available analyst effort to provide greater value.
Sorry, no results matched your search criteria(s). Please try again.