Submit Search
Upload
SACON - Incident Response Automation & Orchestration (Amit Modi)
•
1 like
•
2,503 views
Priyanka Aash
Follow
SACON - Incident Response Automation & Orchestration (Amit Modi)
Read less
Read more
Technology
Slideshow view
Report
Share
Slideshow view
Report
Share
1 of 17
Download now
Download to read offline
Recommended
SACON - API Security (Suhas Desai)
SACON - API Security (Suhas Desai)
Priyanka Aash
SACON - Beyond corp (Arnab Chattopadhayay)
SACON - Beyond corp (Arnab Chattopadhayay)
Priyanka Aash
Sacon - Fresh Thinking IoT (Arnab Chattopadhayay)
Sacon - Fresh Thinking IoT (Arnab Chattopadhayay)
Priyanka Aash
Sacon - IoT Hackfest (Sri Chakradhar K)
Sacon - IoT Hackfest (Sri Chakradhar K)
Priyanka Aash
SACON - Automating SecOps (Murray Goldschmidt)
SACON - Automating SecOps (Murray Goldschmidt)
Priyanka Aash
SACON - Mobile App Security (Srinath Venkataramani)
SACON - Mobile App Security (Srinath Venkataramani)
Priyanka Aash
SACON - Threat hunting (Chandra Prakash)
SACON - Threat hunting (Chandra Prakash)
Priyanka Aash
SACON - Cloud Security Architecture (Moshe Ferber)
SACON - Cloud Security Architecture (Moshe Ferber)
Priyanka Aash
Recommended
SACON - API Security (Suhas Desai)
SACON - API Security (Suhas Desai)
Priyanka Aash
SACON - Beyond corp (Arnab Chattopadhayay)
SACON - Beyond corp (Arnab Chattopadhayay)
Priyanka Aash
Sacon - Fresh Thinking IoT (Arnab Chattopadhayay)
Sacon - Fresh Thinking IoT (Arnab Chattopadhayay)
Priyanka Aash
Sacon - IoT Hackfest (Sri Chakradhar K)
Sacon - IoT Hackfest (Sri Chakradhar K)
Priyanka Aash
SACON - Automating SecOps (Murray Goldschmidt)
SACON - Automating SecOps (Murray Goldschmidt)
Priyanka Aash
SACON - Mobile App Security (Srinath Venkataramani)
SACON - Mobile App Security (Srinath Venkataramani)
Priyanka Aash
SACON - Threat hunting (Chandra Prakash)
SACON - Threat hunting (Chandra Prakash)
Priyanka Aash
SACON - Cloud Security Architecture (Moshe Ferber)
SACON - Cloud Security Architecture (Moshe Ferber)
Priyanka Aash
SecOps Workshop (Gregory Pickett)
SecOps Workshop (Gregory Pickett)
Priyanka Aash
SACON - Security Architecture (Arnab Chattopadhayay)
SACON - Security Architecture (Arnab Chattopadhayay)
Priyanka Aash
(SACON) Wasim Halani - OSINT threat hunting
(SACON) Wasim Halani - OSINT threat hunting
Priyanka Aash
(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers...
(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers...
Priyanka Aash
The Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force Awakens
Bitglass
(SACON) Apoorv Raj Saxena - Hacking and Securing Kubernetes and Dockers in Cl...
(SACON) Apoorv Raj Saxena - Hacking and Securing Kubernetes and Dockers in Cl...
Priyanka Aash
SACON - Connected cars (Aditya Kakrania)
SACON - Connected cars (Aditya Kakrania)
Priyanka Aash
CASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the Cloud
Bitglass
(SACON) Wayne Tufek - chapter three - sabsa
(SACON) Wayne Tufek - chapter three - sabsa
Priyanka Aash
(SACON) Anand Tapikar - Attack vectors of Kubernetes infra. Are we on right ...
(SACON) Anand Tapikar - Attack vectors of Kubernetes infra. Are we on right ...
Priyanka Aash
Webinar Express: What is a CASB?
Webinar Express: What is a CASB?
Bitglass
(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...
(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...
Priyanka Aash
Cloud Access Security Broker (CASB)
Cloud Access Security Broker (CASB)
rkulandaivel
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security Menace
Bitglass
63 Requirements for CASB
63 Requirements for CASB
Kyle Watson
(SACON) Apurva Mankad - Implementing a Privacy Program in an SME Organization...
(SACON) Apurva Mankad - Implementing a Privacy Program in an SME Organization...
Priyanka Aash
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMX
NetworkCollaborators
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
Iftikhar Ali Iqbal
Zenith Live - Security Lab - Phantom
Zenith Live - Security Lab - Phantom
Zscaler
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Bitglass
SACON - Immutable architecture (Nilanjan De)
SACON - Immutable architecture (Nilanjan De)
Priyanka Aash
Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)
Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)
Priyanka Aash
More Related Content
What's hot
SecOps Workshop (Gregory Pickett)
SecOps Workshop (Gregory Pickett)
Priyanka Aash
SACON - Security Architecture (Arnab Chattopadhayay)
SACON - Security Architecture (Arnab Chattopadhayay)
Priyanka Aash
(SACON) Wasim Halani - OSINT threat hunting
(SACON) Wasim Halani - OSINT threat hunting
Priyanka Aash
(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers...
(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers...
Priyanka Aash
The Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force Awakens
Bitglass
(SACON) Apoorv Raj Saxena - Hacking and Securing Kubernetes and Dockers in Cl...
(SACON) Apoorv Raj Saxena - Hacking and Securing Kubernetes and Dockers in Cl...
Priyanka Aash
SACON - Connected cars (Aditya Kakrania)
SACON - Connected cars (Aditya Kakrania)
Priyanka Aash
CASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the Cloud
Bitglass
(SACON) Wayne Tufek - chapter three - sabsa
(SACON) Wayne Tufek - chapter three - sabsa
Priyanka Aash
(SACON) Anand Tapikar - Attack vectors of Kubernetes infra. Are we on right ...
(SACON) Anand Tapikar - Attack vectors of Kubernetes infra. Are we on right ...
Priyanka Aash
Webinar Express: What is a CASB?
Webinar Express: What is a CASB?
Bitglass
(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...
(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...
Priyanka Aash
Cloud Access Security Broker (CASB)
Cloud Access Security Broker (CASB)
rkulandaivel
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security Menace
Bitglass
63 Requirements for CASB
63 Requirements for CASB
Kyle Watson
(SACON) Apurva Mankad - Implementing a Privacy Program in an SME Organization...
(SACON) Apurva Mankad - Implementing a Privacy Program in an SME Organization...
Priyanka Aash
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMX
NetworkCollaborators
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
Iftikhar Ali Iqbal
Zenith Live - Security Lab - Phantom
Zenith Live - Security Lab - Phantom
Zscaler
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Bitglass
What's hot
(20)
SecOps Workshop (Gregory Pickett)
SecOps Workshop (Gregory Pickett)
SACON - Security Architecture (Arnab Chattopadhayay)
SACON - Security Architecture (Arnab Chattopadhayay)
(SACON) Wasim Halani - OSINT threat hunting
(SACON) Wasim Halani - OSINT threat hunting
(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers...
(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers...
The Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force Awakens
(SACON) Apoorv Raj Saxena - Hacking and Securing Kubernetes and Dockers in Cl...
(SACON) Apoorv Raj Saxena - Hacking and Securing Kubernetes and Dockers in Cl...
SACON - Connected cars (Aditya Kakrania)
SACON - Connected cars (Aditya Kakrania)
CASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the Cloud
(SACON) Wayne Tufek - chapter three - sabsa
(SACON) Wayne Tufek - chapter three - sabsa
(SACON) Anand Tapikar - Attack vectors of Kubernetes infra. Are we on right ...
(SACON) Anand Tapikar - Attack vectors of Kubernetes infra. Are we on right ...
Webinar Express: What is a CASB?
Webinar Express: What is a CASB?
(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...
(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...
Cloud Access Security Broker (CASB)
Cloud Access Security Broker (CASB)
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security Menace
63 Requirements for CASB
63 Requirements for CASB
(SACON) Apurva Mankad - Implementing a Privacy Program in an SME Organization...
(SACON) Apurva Mankad - Implementing a Privacy Program in an SME Organization...
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMX
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
Zenith Live - Security Lab - Phantom
Zenith Live - Security Lab - Phantom
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Viewers also liked
SACON - Immutable architecture (Nilanjan De)
SACON - Immutable architecture (Nilanjan De)
Priyanka Aash
Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)
Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)
Priyanka Aash
SACON - Devops-container (Richard Bussiere)
SACON - Devops-container (Richard Bussiere)
Priyanka Aash
Sacon Threat Modeling Overview (Abhishek Datta)
Sacon Threat Modeling Overview (Abhishek Datta)
Priyanka Aash
SACON - Deception Technology (Sahir Hidayatullah)
SACON - Deception Technology (Sahir Hidayatullah)
Priyanka Aash
SACON - Cyber Risk Assessment Using Bayesian Network (R Venkat)
SACON - Cyber Risk Assessment Using Bayesian Network (R Venkat)
Priyanka Aash
SACON - Enterprise Security Architecture (Bikash Barai)
SACON - Enterprise Security Architecture (Bikash Barai)
Priyanka Aash
SACON - Windows Forensic (Dr. Phil Polstra)
SACON - Windows Forensic (Dr. Phil Polstra)
Priyanka Aash
SACON - Threat Hunting Workshop (Shomiron Das Gupta)
SACON - Threat Hunting Workshop (Shomiron Das Gupta)
Priyanka Aash
End User Security Awareness Presentation
End User Security Awareness Presentation
Cristian Mihai
Viewers also liked
(10)
SACON - Immutable architecture (Nilanjan De)
SACON - Immutable architecture (Nilanjan De)
Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)
Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)
SACON - Devops-container (Richard Bussiere)
SACON - Devops-container (Richard Bussiere)
Sacon Threat Modeling Overview (Abhishek Datta)
Sacon Threat Modeling Overview (Abhishek Datta)
SACON - Deception Technology (Sahir Hidayatullah)
SACON - Deception Technology (Sahir Hidayatullah)
SACON - Cyber Risk Assessment Using Bayesian Network (R Venkat)
SACON - Cyber Risk Assessment Using Bayesian Network (R Venkat)
SACON - Enterprise Security Architecture (Bikash Barai)
SACON - Enterprise Security Architecture (Bikash Barai)
SACON - Windows Forensic (Dr. Phil Polstra)
SACON - Windows Forensic (Dr. Phil Polstra)
SACON - Threat Hunting Workshop (Shomiron Das Gupta)
SACON - Threat Hunting Workshop (Shomiron Das Gupta)
End User Security Awareness Presentation
End User Security Awareness Presentation
Similar to SACON - Incident Response Automation & Orchestration (Amit Modi)
Log Analytics for Distributed Microservices
Log Analytics for Distributed Microservices
Kai Wähner
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
NetworkCollaborators
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
Ulf Mattsson
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
IBM Security
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Angeloluca Barba
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
Shah Sheikh
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Enterprise Management Associates
Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2
Wen-Pai Lu
Sourcefire Webinar - NEW GENERATION IPS
Sourcefire Webinar - NEW GENERATION IPS
mmiznoni
ICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness Measurement
Aleksey Lukatskiy
Cybersecurity Series SEIM Log Analysis
Cybersecurity Series SEIM Log Analysis
Jim Kaplan CIA CFE
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PROIDEA
Securing Beyond the Cloud Generation
Securing Beyond the Cloud Generation
Forcepoint LLC
[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...
[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...
PROIDEA
Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptx
ControlCase
Chris neely the future of cyber security events 3
Chris neely the future of cyber security events 3
Redazione InnovaPuglia
Cisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response Services
NetworkCollaborators
The evolution of IT in a cloud world
The evolution of IT in a cloud world
Zscaler
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
Criminal IP
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
Case IQ
Similar to SACON - Incident Response Automation & Orchestration (Amit Modi)
(20)
Log Analytics for Distributed Microservices
Log Analytics for Distributed Microservices
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2
Sourcefire Webinar - NEW GENERATION IPS
Sourcefire Webinar - NEW GENERATION IPS
ICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness Measurement
Cybersecurity Series SEIM Log Analysis
Cybersecurity Series SEIM Log Analysis
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
Securing Beyond the Cloud Generation
Securing Beyond the Cloud Generation
[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...
[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...
Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptx
Chris neely the future of cyber security events 3
Chris neely the future of cyber security events 3
Cisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response Services
The evolution of IT in a cloud world
The evolution of IT in a cloud world
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
More from Priyanka Aash
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
Priyanka Aash
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
Priyanka Aash
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
Priyanka Aash
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
Priyanka Aash
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
Priyanka Aash
DPDP Act 2023.pdf
DPDP Act 2023.pdf
Priyanka Aash
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Priyanka Aash
Cyber Crisis Management.pdf
Cyber Crisis Management.pdf
Priyanka Aash
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
Priyanka Aash
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
Priyanka Aash
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
Priyanka Aash
Stories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
Priyanka Aash
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
Priyanka Aash
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Priyanka Aash
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Priyanka Aash
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Priyanka Aash
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Priyanka Aash
Cyber Security Governance
Cyber Security Governance
Priyanka Aash
Ethical Hacking
Ethical Hacking
Priyanka Aash
More from Priyanka Aash
(20)
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
DPDP Act 2023.pdf
DPDP Act 2023.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Crisis Management.pdf
Cyber Crisis Management.pdf
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
Stories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cyber Security Governance
Cyber Security Governance
Ethical Hacking
Ethical Hacking
Recently uploaded
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
Khushali Kathiriya
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
UiPathCommunity
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Angeliki Cooney
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
apidays
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
apidays
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
apidays
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
Zilliz
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
Christopher Logan Kennedy
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
Rustici Software
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Edi Saputra
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2
Elevate Developer Efficiency & build GenAI Application with Amazon Q
Elevate Developer Efficiency & build GenAI Application with Amazon Q
Bhuvaneswari Subramani
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Jeffrey Haguewood
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
The Digital Insurer
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
apidays
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
sammart93
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
danishmna97
Recently uploaded
(20)
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
Elevate Developer Efficiency & build GenAI Application with Amazon Q
Elevate Developer Efficiency & build GenAI Application with Amazon Q
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
SACON - Incident Response Automation & Orchestration (Amit Modi)
1.
© 2016 by
CYBERBIT │ CYBERBIT Proprietary1 Increase your SOC efficiency with SOC 3D Amit Modi Regional Sales Manager – India & SAARC +91-9920660605 Amit.modi@Cyberbit.com
2.
© 2016 by
CYBERBIT │ CYBERBIT Proprietary Visualizing NextGen CyberSecurity
3.
IT Infrastructure Security Application/DB Security Consulting & IT GRC Visualizing NextGen SoC 4.0 Security Controls
Policy & Audit RISK & Compliance Business Continuity Vulnerability Management Log Management Access & Identity Visibility & Compliance Security Analytics Data Protection & Control IT Change & End Point Monitoring & Management Incident Response Threat Intell. Feeds Forensic Data Capture Threat Detection App Sec CMDB Software Asset Management
4.
© 2017 by
CYBERBIT │ CYBERBIT Proprietary 4 Challenges • SIEM Generating Huge amount of Alerts • Incidents Getting Missed • Lack of Threat Visibility • Finding Lateral Impact • Learning from Past • Finding the RCA • Skills Shortage • Incident Based SLA Management • Incident Closures • Reporting • Technical • Business Context • Performance Based Expectations • Business Context to the Investigation • Adding Analytics • Bulletin Boards to the Team • Case Management • Automating Runbook • Threat Visibility & Spread • Avoid Over Detection & False Positive • Automate Similar Incidents • Prioritization Based on Business Impact • Incident Containment as a First Step • Surgical Response for Accurate Threat Eradication
5.
© 2017 by
CYBERBIT │ CYBERBIT Proprietary 5 Recommendation & Suggestions by SANS Analysis
6.
© 2017 by
CYBERBIT │ CYBERBIT Proprietary 6 Narrow Downing : Challenges & Expectations • SIEM Generating Huge amount of Alerts • Incidents Getting Missed • Lack of Threat Visibility • Finding Lateral Impact • Learning from Past • Finding the RCA • Skills Shortage • Incident Based SLA Management • Incident Closures • Reporting • Technical • Business Context • Performance Based (MSSP/Internal Team) • Business Context to the Investigation • Adding BigData Analytics • Bulletin Boards to the Team • Case Management • Automating Runbook • Threat Visibility & Spread • Avoid Over Detection & False Positive • Automate Similar Incidents • Prioritization Based on Business Impact • Incident Containment as a First Step • Surgical Response for Accurate Threat Eradication • Practicing the Crisis Situation • Matured Security Operation Center (SoC) • Identifying Unknown Threats • Incident Management • Incident Automation • Containment • Forensic Data for Accurate Eradication • Practicing Crisis Situation • Continuous Skills Improvement • Runbook Automation for Accuracy
7.
© 2016 by
CYBERBIT │ CYBERBIT Proprietary7 SOC 3D: Your Gateway to the Future
8.
© 2016 │
CYBERBIT Proprietary8 Provides more accurate and actionable high priority alerts by ingesting and analyzing SOC feeds and external feeds Your Single Pane of Glass for managing your entire security operations The only SOC management platform combining automation, orchestration and big-data security analytics for real-time investigation What Is SOC-3D
9.
© 2016 by
CYBERBIT │ CYBERBIT Proprietary9 ALERTS SIEM Ticketing Email CRM Helpdesk EDR UBA RESPONSE TOOLS IPS EDR WAF Active Directory NAC Memory Dump Threat Intel CMDB HR Systems GRC Compliance Vulnerability Assessment Enrichment Your SOC Hub SOC 3D Big-Data API’sAPI’s
10.
© 2016 by
CYBERBIT │ CYBERBIT Proprietary10 Security Analytics Visualize Anything. Investigate Freely. Explore raw data for forensics Real-time access via big-data platform Real-time visualization for faster insights
11.
© 2016 by
CYBERBIT │ CYBERBIT Proprietary11 SMART AUTOMATION Accelerate analyst work across the entire IR cycle AUTOMATE RESPONSE Automate SOC operator and analyst response tasks AUTOMATE DATA ENRICHMENT Get all relevant data for investigation AUTOMATE DECISION MAKING By automating data collection prior to response
12.
© 2016 by
CYBERBIT │ CYBERBIT Proprietary12 The Response Process: Traditional SOC Manual Preparation: 15 minutes New Malware Alert Run Memory Dump Utility Isolate Host Using NAC API Alert IT to Replace User Host Check Asset Criticality X Critical Proccess Check BISO Contact Alert CISO & BISO Collect Additional Raw Data X Send recommendations and Summary report Investigate Escalate to Tier 2 2 minutes 2 minutes 3 minutes 2 minutes 2 minutes 2 minutes 2 minutes
13.
© 2016 by
CYBERBIT │ CYBERBIT Proprietary13 Automated decision making Automated data enrichment Automated response The Response Process: With SOC-3D Automation New Malware Alert Run Memory Dump Utility Alert IT to Replace User Host X Critical Proccess Check BISO Contact Alert Ciso & BISO Collect Additional Raw Data (e.g. TI) X Send recommendations and Summary report Investigate Escalate to Tier 2 Isolate Host Using NAC API Check Asset Criticality Start Here
14.
© 2016 by
CYBERBIT │ CYBERBIT Proprietary14 Impact On TTR and TCO Average number of stages per incident 6 Average time saved by SOC 3D per stage 2 minutes Total time saved by SOC 3D per incident 12 minutes Number of daily incidents 100 Time saved by SOC 3D every day 20 hours TCO saving per day $2000 TCO saving per month $44,000
15.
© 2016 by
CYBERBIT │ CYBERBIT Proprietary15 With SOC-3D, Your SOC is EFFICIENT Faster to respond Reduces SOC team workload Measurable BUSINESS-DRIVEN Focuses on what matters the most Keeps executive level informed Engages the entire organization SOC USER-CENTRIC Reduces the expertise barrier Engages your team Increases analyst impact Simplifies complex investigations
16.
© 2016 by
CYBERBIT │ CYBERBIT Proprietary16 Deep Diving - SOC 3D
17.
© 2016 by
CYBERBIT │ CYBERBIT Proprietary17 Thank You!
Download now