Featured

Reducing SecOps Complexity with SIEM Replacement
Greg Kushmerek - Principal Architect, Google Security Operations
Legacy security information and event management (SIEM) tools were built in the pre-cloud era. They often lack the speed and scale required for modern-day threats, but also rely on complex and toilsome processes from hard to find security experts.
As cloud adoption continues to evolve your attack surface, so should the tools that are protecting your organization.
Join us to learn:
- How threat detection, investigation and response (TDIR) has outgrown legacy SIEM tools
- What you should look for in modern SecOps tools
- What a SIEM replacement strategy can look like
All episodes
-
How to 10X Your Security Operations Center with Autonomic Security Operations
Steve Meckl, Solutions Manager, Autonomic Security Operations - Google Cloud
Cloud has increased the reliance of businesses on technology and has put more intellectual property at risk. To protect our businesses and people in a digital-native world, security operations teams require a new operating model to adequately prevent, detect, and respond to adversaries at scale.
Your approach to modernizing the SOC needs to focus on developing adaptive, agile, and highly automated solutions to security problems rather than maintaining the status quo through the day-to-day operations of threat management.
During this webinar, we’ll discuss:
- Why does the SOC need to transform?
- What is Autonomic Security Operations?
- How does this impact people, process, technology, and influence?
- The path to achieving Autonomic Security Operations. -
Modernize Your SOC for the Future
Kristen Cooper, Lead Security Operations Product Marketing Manager - Google Cloud
Detecting, investigating, and responding to cyberthreats is the core function of the SOC, and the team never gets a break - attackers are carrying out more sophisticated attacks, the attack surface continues to expand, and talent shortages are the reality.
Join our upcoming webinar to see how Chronicle Security Operations has cracked the code on speed and scale, automation, and detection/investigation/response processes.
We’ll explore how you can:
- Eliminate security blindspots with cloud-native infrastructure.
- Get to “aha” faster with sub-second search, insights, and streamlined processes.
- Democratize security operations by leveraging threat intelligence, out-of-the-box detections, and playbooks. -
What you need to know: 2023 State of Cloud Threat Detection and Response
Google Cloud Security
Did you know that the cloud presents better security improvement opportunities than on-prem? We had a sneaking suspicion this was the case! But don’t just take our word for it, see what security leaders and SecOps practitioners had to say about that topic and more.
Google Cloud’s recent survey of 400 security leaders and security operations practitioners dug into the capabilities, procedures, and behaviors of protecting against, identifying, and remediating cloud-based threats.
Join us as we share the insights from this survey, including the main challenges and opportunities for SecOps teams as they transform to a cloud-first threat detection and response mindset.
We’ll cover key findings, including:
- Why the cloud offers superior detection and response opportunities than on-prem.
- How automation can solve short-term and long-term security challenges.
- What are the greatest threats to the cloud, like data leakage and cryptomining.
- Guidance on how to incorporate these lessons into your company’s current operations and considerations. -
Simplify End-to-End Threat Detection, Investigation and Response in the Cloud
Kristen Cooper, Lead Security Operations Product Marketing Manager - Google Cloud
As cloud adoption continues to grow, so too does the number of cloud-native security threats. However, cloud environments can present significant opportunities to improve security with the right tools and processes in place.
In our recent “State of Cloud Threat Detection and Response Survey", 71% of respondents said that “entire classes of threats are eliminated by migrating to the cloud” and 82% stated that “the cloud affords the ability to process more data, including on-prem data, which can improve detection across the board.” To reap these benefits, however, organizations need to understand that effectively securing the cloud involves more than “lifting and shifting” their existing security tools and processes. The cloud presents a different attack surface across various cloud services and data repositories, each with different attack tactics, potential misconfigurations and context.
Join us to learn:
- How TDIR in the cloud differs from traditional on-premises approaches
- How an end-to-end workflow can work for you
- What you should look for in a turnkey TDIR solution -
Reducing SecOps Complexity with SIEM Replacement
Greg Kushmerek - Principal Architect, Google Security Operations
Legacy security information and event management (SIEM) tools were built in the pre-cloud era. They often lack the speed and scale required for modern-day threats, but also rely on complex and toilsome processes from hard to find security experts.
As cloud adoption continues to evolve your attack surface, so should the tools that are protecting your organization.
Join us to learn:
- How threat detection, investigation and response (TDIR) has outgrown legacy SIEM tools
- What you should look for in modern SecOps tools
- What a SIEM replacement strategy can look like