Vulnerability Vanguards: Using Data Driven Defense Models
The upcoming round table session, "Data Driven Defense Models, The Vulnerability Vanguards," will focus on leveraging data to enhance cybersecurity defenses. The session will feature expert speakers who will share insights on building robust defense models, managing Security Operations Centers (SOCs), auditing and reporting, and sourcing high-quality threat intelligence.
Roundtable Topics & Presenters:
Topic: Global Insights on Data-Driven Defense
This session will be led by a seasoned global CISO with extensive experience in both manufacturing and technology sectors. The speaker will discuss the development and implementation of data-driven defense models, highlighting the importance of data analytics in identifying vulnerabilities and mitigating risks. Attendees will learn about the challenges and best practices for integrating data-driven approaches within diverse organizational contexts.
Topic: Managing a Cutting-Edge SOC
The head of a Security Operations Center (SOC) for a leading cybersecurity vendor will lead this session, focusing on the operational aspects of managing a SOC. The discussion will cover the latest tools and technologies used in SOCs, strategies for effective incident response, and the role of data in enhancing SOC capabilities. Participants will gain insights into optimizing SOC performance and ensuring rapid detection and response to security incidents.
Topic: Auditing and Reporting: Standards and Best Practices
This session will be presented by a long-time author of SOC report guidelines and a cybersecurity auditor for a major accounting firm. The speaker will provide an overview of SOC report guidelines, discussing the standards and best practices for auditing and reporting in the cybersecurity space. Attendees will learn how to prepare for audits, ensure compliance with industry standards, and use audit findings to improve their security posture.
Topic: Sourcing Elite Threat Intelligence
The final session will feature a senior leader from an Israeli intelligence firm who will share expertise on sourcing the best threat intelligence. The discussion will cover methods for gathering high-quality threat intelligence, evaluating intelligence sources, and integrating threat intelligence into defense strategies. Attendees will learn how to leverage threat intelligence to proactively defend against emerging threats and enhance their organization's overall security resilience.