Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Online Event Today: Security Operations Summit

Security Operations Summit - Virtual Event

Security Operations Summit - Virtual Event

You’re invited to join us today (12/6) for SecurityWeek’s 2022 Security Operations Summit, an immersive online event that will offer insights and strategies to maximize the efficiency of enterprise security operations centers (SOCs).

The event will address common security operations challenges and demonstrate how efficient workflow and collaboration can lead to improved decision making throughout the threat detection, analysis and incident response processes.

Topics on the agenda include:

• Approaching Security With an Identity-First Mindset

• Top SOC Challenges in 2022

• The Atomized Network Evolution

• Learn and Build Agile Prepared Security Operations Teams

• Fireside Chat: Guillaume Ross, Head of Security, FleetDM

Advertisement. Scroll to continue reading.

• Deploying Passwordless Authentication with Okta

• Automation for People Who Are Too Busy to Automate

• Full virtual expo and technical resources and online networking

Register for Event


2022 Event Sponsors

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

Shaun Khalfan has joined payments giant PayPal as SVP, CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

Data Breaches

LastPass DevOp engineer's home computer hacked and implanted with keylogging malware as part of a sustained cyberattack that exfiltrated corporate data from the cloud...