Agenda | October 25, 2023 | 10:30AM - 3:45PM EDT
Timeline (EDT) | Session Details |
---|---|
10:30AM | Welcome & Opening RemarksChris Crowley, Event Chair, SANS Institute |
10:40AM | Session One | Empowering Cyber Defense With Accurate Forensic EvidenceCollecting the right data to enable effective cyber defense is critical. If the right data isn’t collected in the first place then it’s impossible for defenders to come to reliable conclusions. And if the right data has been collected but it can’t be accessed quickly enough because of inefficient processes, the result is unacceptably slow threat response. Likewise, the effectiveness of security tools is dependent on the quality of the data available for for analysis. If there are gaps in that data, security tools will be blind to potential threats. In this session, we’ll look at the importance of capturing, analyzing and recording packet data as a core telemetry source, in particular:
|
11:20AM | Session Two |The Insider’s Guide to Automating Your SOC Security automation, orchestration and response (SOAR) can greatly enhance the productivity and effectiveness of a SOC. However, without the expertise of best practices, SecOps teams could find themselves adrift and unable to realize the full benefits of automation. In this session, we will share lessons learnt from deploying SOAR in hundreds of enterprises of all sizes, worldwide. You’ll better understand:
Michal Goldshtein, Director, Security Architecture and Research, Palo Alto Networks |
12:00PM | Session Three| Tales from the Trenches: How SOAR and AI Solve the People ProblemThe biggest issue facing enterprise security operations is the deficit of available, affordable, and experienced cyber security professionals. SOAR & SIEM are touted as the answer. In this session, Rakesh Nair, Devo VP of Engineering, walks through real-life (but anonymized) experiences from our featured customers, showing how AI-driven SOAR solves the experience and availability issues, maximizing analyst efficiency, reducing the burden of threat investigations and validation, through task and decision automation. Leveraging insights from customer deployments, this talk will include:
Rakesh Nair, VP Security Products, Devo Technology |
12:30PM | Break |
12:45PM | Session Four | Respond to Threats in Minutes, Not DaysAs cloud adoption rates continue to skyrocket, most security incidents involve the cloud. Yet organizations remain disproportionately rooted in legacy on-premises thinking and tools when it comes to detecting and responding to cloud-based threats. What organizations need for modern, fast and effective response is a seamless, cloud-based, end-to-end threat detection, investigation and response workflow. Join us to explore how to detect threats with confidence by storing and analyzing all your security telemetry at scale; how to get faster insights with context and depth of investigation to stay ahead of the latest breaches; and how to orchestrate tools, build automation, and collaborate with ease to respond in minutes.. Keith Manville, Security Operations Engineer, Google Cloud |
1:15PM | Session Five | Back from the Brink: Keeping your SIEM in the GameIn this session, we’ll review insights from the recent “Third Annual Report on the State of SIEM Detection Risk.” Based on a data-driven analysis of more than 4,000 rules across diverse SIEM platforms in production environments — including Splunk, Microsoft Sentinel, IBM QRadar, and Sumo Logic — the report provides some interesting benchmark data about typical data ingestion metrics, MITRE ATT&CK coverage, and rule health in enterprise SOCs. Jay Lillie, VP of Customer Success, CardinalOps |
1:45PM | Afternoon Kickoff |
1:55PM | Session Six| Why Packet Capture Matters in the Cloud. And How to Do It.As organizations move workloads to the Cloud, network and security teams are finding they don't have the same level of visibility that they are accustomed to having in on-premise environments. That lack of visibility compromises their ability to protect their cloud infrastructure from cyber attack and ensure that it operates efficiently. In this session, we'll talk briefly about why packet capture in the cloud is just as important as it is in on-premise environments. We'll demonstrate how scalable packet capture can be deployed in multi-cloud environments (using AWS and Azure). And finally we'll outline how it's possible to provide full visibility into activity across your Hybrid Cloud network from a single pane-of-glass. Michael Morris Director Technology Alliances, EndaceCary Wright, VP Product Management, Endace |
2:15PM | Session Seven | You Might Have a Breach - Now What’s Next?Solarstorm/Sunburst, Hafnium, Kaseya, MS Exchange vulnerabilities, Log4J…when news of a zero-day vulnerability or exploit hits the news, your team and your executives need assurance that the company is protected from any potential breach. In this Tech Talk, we will show you how to leverage automation to mount a rapid breach response against any 0-days including:
|
2:35PM | Break |
2:50PM | SOC Panel: People, Process, TechnologyOn this panel, Christopher Crowley will ask questions of our panelists on how to make sure SOAR is realizing the promise of automation. There’s a necessary convergence of vendor technology, organizational capability, staff readiness, a workstyle toward constant improvement, and a candid awareness that technology operations require constant attention and tuning. Your peers are challenged to do everything they can to keep up with changing defensive topography, adaptive threats, legacy environments, and staff / budget shortages. This panel provides insight on what Endace and Palo Alto Networks have seen their customers do to make the most of technology and resources. Moderator: Chris Crowley , Event Chair, SANS Institute Panelists:Michael Morris, Director of Technology Alliances, Endace Michal Goldshtein, Director, Security Architecture and Research, Palo Alto Networks |
3:35PM | Closing RemarksChris Crowley, Event Chair, SANS Institute |