Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Events » SANS Security Operations Center Summit and Training 2016

Refine your results by

SANS Security Operations Center Summit and Training 2016

5/16/16 8:00 am to 5/26/16 5:00 pm EST
DoubleTree by Hilton Washington DC-Crystal City
300 Army Navy Drive
Arlington, VA
United States
Contact: Lacee Santos
SANS Security Operations Center (SOC) Summit: As we see regularly in the news, the number of successful data breaches continues to increase. Adversaries seem to have the upper hand, as many organizations fail to effectively detect and quickly respond to these breaches. Over 80% of all breach victims learn of a compromise from third-party notifications, not from internal security teams, and are often caught by surprise. As a result, executives are demanding that their security teams provide enhanced security posturing, monitoring, and detection to stop these threats. All of this is driving the need for organizations to put in place more formal and aggressive security operations, including a more robust and well-organized focus on security infrastructure, pre-breach posturing, detection, and response to attacks, and a more proactive approach to hunting for breaches. Many organizations are looking to either set up or outsource a Security Operations Center (SOC) and formalize Computer Incident Response Teams (CIRTs) in order to accurately and effectively detect and respond to data breaches. The Opportunity: Cybersecurity in organizations is often a silo distributed across different internal business units. The IT help-desk/operations support group, log management team, pen testing team, and forensics and incident response team are often ad-hoc or under different management, and do not always talk or work together. Many organizations do not even have an advance warning group such as a cyber threat team. To make matters worse, in many organizations, incident response plans are not routinely tested with the entire security team. For security to work effectively, teams must be integrated across the entire organization, and they must work in concert when the detection team identifies a potential incident. Creating, developing, and formalizing a SOC provides a central command environment for all of the security teams to work together, share information and intelligence, and respond to breaches as a single effective group. SOC Summit: The SOC Summit brings together industry experts and peers to discuss ideas and solutions to facilitate effective security operations for any organization - from small businesses with limited IT security personnel to larger enterprises with a dedicated operations center. You'll learn from the best in the industry, and SANS' hands-on and participatory approach will enable you to immediately apply what you've learned and start implementing effective security solutions the first day you return to the office. Every organization faces the challenge of how to properly monitor and analyze security. At the SOC Summit, professionals and experts will share their experiences with building out organizations' security operations and increasing the effectiveness of security as a whole. Attendees will learn not only what mistakes to avoid in implementing and running a SOC, they'll also come to understand the processes and capabilities that other SOCs are using to help create more wins against a variety of threat groups. It is time that we do what the adversaries and threat groups have been doing for years: share information. A single organization or individual alone cannot figure out everything that needs to be done for effective security. You'll take away news ideas from the SOC Summit not only from the best minds in the business, but also from others who have faced similar challenges in increasing their enterprise's situational awareness and monitoring and responding to threats. You will learn to: - Take a more integrated approach to security using the tips and tricks presented at the Summit. - Integrate the SOC so that it works effectively with the IT help-desk, IT operations, and management - Automate detection and response inside your SOC - Reduce chaos and increase effectiveness during a crisis - Properly identify, train, challenge, and retain SOC personnel and operators - Discuss how policies need to reflect operations and reality - Build trust inside the organization - Operationalize your security processes, reporting, metrics, and policies - that is, what works and what doesn't - Evaluate the tools and capabilities needed to make cybersecurity work effectively Topics will include: - Continuous monitoring - Active defense - Security metrics - Critical security controls - Integrated security defenses - Proactive forensics - Enterprise network and host monitoring - Security reporting - Threat intelligence utilization and usefulness - Incident response team operations and management Who should attend? - Cybersecurity Professionals - Cybersecurity Engineers - Threat Analysts - Incident Responders - Chief Information Security Officers (CISO) - Chief Technology Officers (CTO) - Chief Information Officers (CIO) - Save 400 USD! Enter discount code "EarlyBird16" and pay for any 4-6 day course by March 9. http://www.sans.org/u/b2D
http://www.sans.org/u/b2D
Register for this Event

Related Articles

Brazilian Government Provides Extra $26 million for Rio 2016 Security

Call Center Fraud Increased 113% in 2016

2016 SIA Government Summit Unveils Agenda

Securing a Seat at the C-Suite in 2016: A Security 500 West Overview

Related Products

Security Operations Center Guidebook

Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Code

Security Leaders Discuss the Marquis Data Breach

Digital human mind

Should Organizations Block AI Browsers? Security Leaders Discuss

Calendar with pins

The Most Dangerous 6 Weeks of the Year

Padlock opened with computer keys

630M Passwords Stolen, FBI Reveals: What This Says About Credential Value

Top Cybersecurity Leaders

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing