Nov 2, 2021
114 Views
0 0

Live Webinar | The 5 Myths Hindering You From SOC Automation

Written by

Advanced SOC Operations / CSOC , Next-Generation Technologies & Secure Development , Security Information & Event Management (SIEM)
Agility and efficiency is often top of mind for every senior executive. However, according to IDG only 49% of security teams are looking for investments into automation, and shockingly, just 37% of security professionals (according to the ISC2 workforce study) have SOC automation on their radar. So what’s holding so many security professionals back from making their day-to-day jobs easier? Many of the common challenges can be overcome and embedding automation (no matter what your organisation’s size) is closer than you think.
During this session, Splunk’s Security Advisor, Robert Farnod, will share the top 5 challenges security professionals say are in their way, and how to overcome them. Join us and gain a fresh mindset on empowering your security team with automation, as well as:
6:30 AM EST
Unlimited Webinars + OnDemand Access
6:30 AM EST
Unlimited Webinars + OnDemand Access
Security Specialist Advisor, Splunk
Was added to your briefcase
Live Webinar | The 5 Myths Hindering You From SOC Automation
Live Webinar | The 5 Myths Hindering You From SOC Automation
Rob Farnod, Splunk Security Specialist Security is a CISO/SOC strategy advisor for EMEA, supporting the maturity journey of hundreds of SOCs. Rob has nine years experience in Financial Service Cyber Security roles, and was previously a customer of Splunk!
Sign in now
Need help registering?
Contact support
Complete your profile and stay up to date
Contact Support
Create an ISMG account now
Create an ISMG account now
Need help registering?
Contact support
Sign in now
Need help registering?
Contact support
Sign in now
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.

source

Article Categories:
Database Breaches

Comments are closed.