When overseeing a security program it's tempting to focus on the firefight of the day. Once in a while security leaders would benefit from assessing the alignment of their team's daily activities with their overall security goals and strategies. Misalignment can lead to the adoption of suboptimal security strategies, not be choice, but by default.
Join us for a presentation by prolific security author Richard Bejtlich to hear him discuss the seven common security strategies he sees across security programs, derived from his time spent as a CISO at Mandiant and director of incident response at a fortune five company.
CISOs and SOC managers will enjoy better understanding their team's activities in the context of their overall strategy and learn how to balance various security strategies for a multilayered approach to reducing risk and defending their organization.
Corelight makes powerful network security monitoring (NSM) solutions that transform network traffic into rich logs, extracted files, and security insights, helping security teams achieve more effective incident response, threat hunting, and forensics. Corelight Sensors run on Zeek (formerly called 'Bro '), the open-source NSM tool used by thousands of organizations worldwide. Corelight's family of network sensors dramatically simplify the deployment and management of Zeek and expand its performance and capabilities. Corelight is based in San Francisco, California and its global customers include Fortune 500 companies, large government agencies, and major research universities.