Vulnerability Vanguards: Using Data Driven Defense Models
Join us for an insightful roundtable session focused on advancing cybersecurity through the power of data-driven strategies. Industry-leading experts will discuss the latest methods for building resilient defense models, optimizing Security Operations Centers (SOCs), conducting comprehensive audits and reports, and sourcing top-tier threat intelligence. This session is designed to equip cybersecurity professionals with actionable insights and cutting-edge techniques to stay ahead of evolving threats.
Roundtable Topics & Presenters:
Topic: Global Insights on Data-Driven Defense
This session will be led by a seasoned global CISO with extensive experience in both manufacturing and technology sectors. The speaker will discuss the development and implementation of data-driven defense models, highlighting the importance of data analytics in identifying vulnerabilities and mitigating risks. Attendees will learn about the challenges and best practices for integrating data-driven approaches within diverse organizational contexts.
Topic: Managing a Cutting-Edge SOC
The head of a Security Operations Center (SOC) for a leading cybersecurity vendor will lead this session, focusing on the operational aspects of managing a SOC. The discussion will cover the latest tools and technologies used in SOCs, strategies for effective incident response, and the role of data in enhancing SOC capabilities. Participants will gain insights into optimizing SOC performance and ensuring rapid detection and response to security incidents.
Contributing Author of SOC 2 Report Guidelines and Cybersecurity Auditor RubinBrown
Topic: Auditing and Reporting: Standards and Best Practices
This session will be presented by a long-time contributing author of SOC 2 report guidelines and a cybersecurity auditor for a major accounting firm. The speaker will provide an overview of SOC 2 report guidelines, discussing the standards and best practices for auditing and reporting in the cybersecurity space. Attendees will learn how to prepare for audits, ensure compliance with industry standards, and use audit findings to improve their security posture. This year we will discuss Artificial Intelligence (AI) considerations.
Topic: Sourcing Elite Threat Intelligence
The final session will feature a senior leader from an Israeli intelligence firm who will share expertise on sourcing the best threat intelligence. The discussion will cover methods for gathering high-quality threat intelligence, evaluating intelligence sources, and integrating threat intelligence into defense strategies. Attendees will learn how to leverage threat intelligence to proactively defend against emerging threats and enhance their organization's overall security resilience.
Roundtable Host:
AJ Eads - Security Advisor Alliance:
The Security Advisor Alliance was founded in 2013 by a group of 35 dedicated information security leaders. The organization was built on a foundation of helping each other, growing the space and giving back to their working and living communities. Today the Alliance has over 400 members, on 3 continents.
The Security Advisor Alliance is led by an advisory board of CISOs and Senior Leaders at the most influential companies in the world and are committed in time and energy to the Alliance's mission of Aligning, Growing and Giving.