Ask five security teams about the pieces in their Security Operations Center (SOC), and you might get five different responses. Add in the layer of “Managed SOC”, and it can be even harder to know what to expect.
Please join SecurityWeek and Rapid7’s Kimberlee Bachman for this on demand webcast as we discuss common questions about Managed SOCs, including:
- What should I look for?
- What should the staffing model be?
- What technology is important?
- How is Managed Detection and Response different from an MSSP?
Speaker
Kimberlee Bachman – Solutions Marketing Manager, Rapid7

As Solutions Marketing Manager at Rapid7, Kimberlee strives to find innovative solutions to customers’ biggest security problems. Armed with years of experience uncovering actionable insights from both qualitative and quantitative data – and driven by a passion for technology and understanding its impact on communities – she brings a unique approach to her position. Kimberlee’s worked at variously-sized organizations, including RSA, C Space, and Liberty Mutual, in various marketing roles, such as product marketing, social marketing, and market research. Kimberlee holds an MBA and M.A. from Boston College and a B.A. from Brandeis University, and is an advocate for more racial and gender diversity in STEM.

Written By
Mike Lennon
For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.
More from Mike Lennon
- Watch Now: Threat Detection and Incident Response Virtual Summit
- Registration Now Open: 2023 ICS Cybersecurity Conference | Atlanta
- NetRise Adds $8 Million in Funding to Grow XIoT Security Platform
- Virtual Event Today: Zero Trust Strategies Summit
- Virtual Event Tomorrow: Zero Trust Strategies Summit
- Watch: How to Build Resilience Against Emerging Cyber Threats
- Video: How to Build Resilience Against Emerging Cyber Threats
- Webinar Today: Understanding Hidden Third-Party Identity Access Risks
Latest News
- Industrial Giant ABB Confirms Ransomware Attack, Data Theft
- Organizations Worldwide Targeted in Rapidly Evolving Buhti Ransomware Operation
- Google Cloud Users Can Now Automate TLS Certificate Lifecycle
- Zyxel Firewalls Hacked by Mirai Botnet
- Watch Now: Threat Detection and Incident Response Virtual Summit
- NCC Group Releases Open Source Tools for Developers, Pentesters
- Memcyco Raises $10 Million in Seed Funding to Prevent Website Impersonation
- New Russia-Linked CosmicEnergy ICS Malware Could Disrupt Electric Grids

Click to comment