Featured
Stay ahead of the latest threats with intelligence-driven security operations
Kristen Cooper, Lead Security Operations Product Marketing Manager - Google Cloud
While many organizations have threat intelligence as part of their security operations program, most struggle to apply it effectively, and lack the required resources and expertise to keep up with the latest threat actors and TTPs. In this webinar, we’ll take a look at the new intelligence-driven approach in Google Chronicle Security Operations, and how it can deliver turnkey security outcomes with threat intelligence that’s personalized, relevant, and seamlessly embedded.
All episodes
-
Simplify End-to-End Threat Detection, Investigation and Response in the Cloud
Kristen Cooper, Lead Security Operations Product Marketing Manager - Google Cloud
As cloud adoption continues to grow, so too does the number of cloud-native security threats. However, cloud environments can present significant opportunities to improve security with the right tools and processes in place.
In our recent “State of Cloud Threat Detection and Response Survey", 71% of respondents said that “entire classes of threats are eliminated by migrating to the cloud” and 82% stated that “the cloud affords the ability to process more data, including on-prem data, which can improve detection across the board.” To reap these benefits, however, organizations need to understand that effectively securing the cloud involves more than “lifting and shifting” their existing security tools and processes. The cloud presents a different attack surface across various cloud services and data repositories, each with different attack tactics, potential misconfigurations and context.
Join us to learn:
- How TDIR in the cloud differs from traditional on-premises approaches
- How an end-to-end workflow can work for you
- What you should look for in a turnkey TDIR solution -
Reducing SecOps Complexity with SIEM Replacement
Greg Kushmerek - Principal Architect, Google Security Operations
Legacy security information and event management (SIEM) tools were built in the pre-cloud era. They often lack the speed and scale required for modern-day threats, but also rely on complex and toilsome processes from hard to find security experts.
As cloud adoption continues to evolve your attack surface, so should the tools that are protecting your organization.
Join us to learn:
- How threat detection, investigation and response (TDIR) has outgrown legacy SIEM tools
- What you should look for in modern SecOps tools
- What a SIEM replacement strategy can look like -
The Journey Toward SOC Modernization: Enterprise Strategy Group Session
Christopher Martin, Jon Oltsik, Distinguished Analyst and Fellow at Enterprise Strategy Group
Fresh-off-the-presses Enterprise Strategy Group (ESG) data illustrates that 88% of organizations plan to increase security operations spending over the next 12-18 months to achieve security operations center (SOC) modernization.
Organizations are pursuing this veritable SOC north star to improve threat intelligence, integration of asset management, and risk prioritization. So, how can your business similarly kick-start SOC modernization?
Join us on December 12th, 2023, at 11am EST for this custom talk with Jon Oltsik, ESG Distinguished Analyst and Fellow, and Google’s own Christopher Martin, wherein Oltsik and Martin share their SOC expertise and home in on:
• 6 trending SOC-focused objectives
• Key reasons to move from manual to automated, AI-assisted SOC processes
• Recent ESG research data on security spending priorities
• How Google supports MITRE ATT&CK Framework adoption for security operations
• And much more. -
The Role of Generative AI for Security Operations
Jon Oltsik, Enterprise Strategy Group and Anton Chuvakin, Google Cloud
Security operations are struggling. According to Enterprise Strategy Group (ESG), the primary challenges security teams are facing include spending too much time addressing high priority/emergency issues and not enough time on strategy and process improvement, along with monitoring security across a growing and changing attack surface.
In this webinar, Anton Chuvakin, Security Advisor at Office of the CISO, Google Cloud, and Jon Oltsik, Distinguished Analyst and Fellow, will explore how generative AI can help support your security operations. You will learn:
• Where & why security operations are struggling
• How GenAI can help
• Use cases for GenAI security
• Tips on how to get the most out of GenAI for your security operationsWatch the webinar now!
-
Smooth SIEM Surgery: Practical Tips for SIEM Migration Success in 2024
Anton Chuvakin - Security Advisor, Office of the CISO & Dave Herrald - Global Head of Security Adoption Engineering
Outdated SIEM systems continue to form the backbone of many security operations despite increasing vulnerabilities and the rise of more powerful alternatives. This presentation offers a practical approach to SIEM migration, addressing the top challenges and providing actionable takeaways for a successful transition.
Veteran security expert Anton Chuvakin will cover essential tips, including:
- Identifying the need for a new SIEM, understanding market options, and defining clear migration goals.
- Streamlining the process by focusing on essential log sources and detection content.
- Leveraging the migration as a catalyst to modernize security processes.
- Emphasizing thorough testing, training, phased approaches, and the benefits of expert help.Whether you're a seasoned practitioner or just beginning to consider a SIEM migration, this presentation will provide valuable insights and actionable strategies to ensure success in 2024.
-
Stay ahead of the latest threats with intelligence-driven security operations
Kristen Cooper, Lead Security Operations Product Marketing Manager - Google Cloud
While many organizations have threat intelligence as part of their security operations program, most struggle to apply it effectively, and lack the required resources and expertise to keep up with the latest threat actors and TTPs. In this webinar, we’ll take a look at the new intelligence-driven approach in Google Chronicle Security Operations, and how it can deliver turnkey security outcomes with threat intelligence that’s personalized, relevant, and seamlessly embedded.