Security Operations and Security Architecture Leaders 


Demands on information security and IT risk practitioners keep going up. Facing a rapidly changing threat, risk and technology landscape, they are tasked with defending everything from legacy systems to emerging technologies. Technical professionals are called on to provide solid architectures and technical solutions to support new digital business objectives. The Security and Risk Summit provides you with the next steps to enable adaptable and scalable architectures and solutions for today’s rapidly changing IT and business environments.


This conference will help you:


  • Get clarity on the difference between what MSSPs promise, what they can deliver, and how your organization can get the best value out of an MSS relationship
  • Understand how to shorten the deployment cycle and transfer responsibility for managing a SIEM tool's platform by leveraging SaaS or hosted SIEM solution options
  • Get an actionable and pragmatic approach to developing security use cases for your SIEM
  • Understand what service performance metrics are valuable to receive from an MSSP and how to define service customization requirements
  • Understand the vendor landscape for VAPT and best practices for VAPT engagement
  • Learn how to create security monitoring use cases, and get a starting list of use cases for your SIEM deployment
  • Understand if you can rely on automation, where to outsource & delegate and if SOAR tools can really automate your SOC
  • Learn what you should add to your incident response plan to better cover incidents of compromised credentials, insider threats, and ransomware
  • Get insights on future threat trends and response options
  • Hear about the latest trends in network-based advanced threat detection, including new techniques for anomaly detection and will learn about the key vendors in the market


Back to top

Relevant sessions covered at the conference:
  • What's My Managed Security Services Provider Actually Doing?
  • Magic Quadrant for Security Information and Event Management
  • How to Get Started Creating Security Use Cases for Your SIEM
  • How To Select an MSSP
  • Best Practices of Engaging a Vulnerability Assessment and Penetration Testing Consulting Player in India
  • Creating Security Monitoring Use Cases With the MITRE ATT&CK Framework
  • Further Evolution of Modern SOC: Automation, Delegation, Analytics
  • Three Scenarios You Should Add to Your Incident Response Plan
  • Learning from the State of the Threat Landscape
  • The Role of Network Traffic Analysis in Today’s Threat Environment
  • Incident Response Scenario for Phishing Attacks


Back to top

Sign up for information on the agenda, announcements and more! 

Thank You, Please add the domain to your safe sender list to ensure receipt of future email.
Thanks for the subscription.
Error occurred in submitting the form. Please try again!
Error occurred in submitting the form. Please try again!
Thank You, Please check your inbox to confirm your subscription and add the domain to your safe sender list to ensure receipt of future email.

Join fellow Security Operations and Security Architecture Leaders at this year's conference.