Auditorium
Oct 03, 2018 10:00 AM - 10:30 AM(America/Chicago)
20181003T1000 20181003T1030 America/Chicago Overcoming security automation roadblocks

Security automation is on everyone's wish list. It’s no wonder, given the promise and hype surrounding machine learning, artificial intelligence and how they will solve security problems. Nevertheless, getting management buy-in for automation remains a challenge especially when it comes to the unattended orchestration of security tools for incident response. In this session, a former Incident Response and Security Operations expert will discuss common automation pitfalls and how to avoid them to implement a state-of-the-art incident response program. Based on real-word incident response and computer forensic case studies, the speaker will explain what operations should and should not be automated, where automation can be used as a force multiplier and how to avoid getting caught up in the automation frenzy that creates more, not less, work for the security operations team. Finally, he will present a set of best practices that attendees can use to assess their SOC orchestration and automation needs, develop an incident response program and integrate the required infrastructure to automate workflows and case management for remediating incidents.

Auditorium Borderless Cyber USA / Washington D.C. / 3-5 October 2018 jharnad@oasis-open.org
16 attendees saved this session

Security automation is on everyone's wish list. It’s no wonder, given the promise and hype surrounding machine learning, artificial intelligence and how they will solve security problems. Nevertheless, getting management buy-in for automation remains a challenge especially when it comes to the unattended orchestration of security tools for incident response.

In this session, a former Incident Response and Security Operations expert will discuss common automation pitfalls and how to avoid them to implement a state-of-the-art incident response program. Based on real-word incident response and computer forensic case studies, the speaker will explain what operations should and should not be automated, where automation can be used as a force multiplier and how to avoid getting caught up in the automation frenzy that creates more, not less, work for the security operations team.

Finally, he will present a set of best practices that attendees can use to assess their SOC orchestration and automation needs, develop an incident response program and integrate the required infrastructure to automate workflows and case management for remediating incidents.

Former Senior Incident Response Analyst for NTT Security, Computer Forensic Analyst for the Maine State Police Computer Crimes Unit, and Computer Forensics Task Force Officer for the U.S. Department of Homeland Security
Ms. Michelle Barry
Director Technology Security
,
AT&T
Attendees public profile is disabled.
Upcoming Sessions
577 visits