Best Practices for Building a Security Technology Strategy
In the Security Operation Center (SOC) alone, organizations spend huge sums on technology to ingest and analyze data (i.e. network traffic, system logs, endpoint data, threat intel feeds, security event and identity/ asset management). The complexity of these systems and the volume of data being consumed can make it difficult to quickly realize value and strengthen defenses. Join Adam Zoller, Information Security Operations leader at a leading financial institution, for a real-world example of a SOC technology stack and strategies your organization can use when budgeting for 2018.
In this webinar, you will learn
- How to think about technology strategy for network defense
- Real world examples in host prevention and detection
- Strategies to measure success in a network defense organization
About Adam Zoller
Adam Zoller has over a decade of information security experience evaluating threats and delivering actionable intelligence to leadership and security teams. Prior to Synchrony Financial, he was the director of cyber intelligence at General Electric and the CIRT manager for Booz Allen Hamilton, where he defended the company’s information infrastructure as well as supported initiatives for a number of U.S. Government clients.