We’ve got your security operations and services needs covered

Take a look at the type of research you can expect at Gartner Security & Risk Management Summit 2023 in National Harbor, MD.

Get the tools you need to cover the people, processes, technologies and services to identify and manage vulnerabilities and to monitor, detect and respond to cybersecurity threats and incidents.

A sample of recommended sessions include:

  • Charting the Future of Cloud-Native Security Operations
  • Outlook for Security Operations 2022
  • What Does the Future Hold for SecOps?
  • Best Practices to Operationalize Threat Intelligence (TI)
  • Anticipate How AI Will Change How You Build Security Products
  • Threat Hunting Starter Kit: The Tools and People Required to Start Hunting on Your Own
  • The Future of MDR: Where Next?
  • Emerging Technologies in Security and Risk Management
  • What Is “XDR” and Why Should I Care?
  • Hyperautomation in Security: Why TSPs Need to Explore and Invest in This Area

How to Build and Operate a Modern Security Operations Center

As you seek to improve operational performance in the area of threat detection and response, adopting an ad hoc method of operations will show its limitations. Security and risk management technical professionals can use this guide to learn how to build and operate a more formal security operations center.

This guidance framework on how to build a security operations center (SOC) is laid out for security and risk management technical professionals to follow each step in order. From the Plan phase, through Design, Implement, Operationalize and Report, each step builds on the previous one and includes the dependencies for project completion.

Key findings

  • An SOC will lose its ability to perform over time unless it has a built-in growth plan that keeps its people, process and technology aligned with the ever-changing threat landscape.
  • A modern SOC must include detection capabilities that, instead of relying solely on alerts, can leverage advanced analytics across a large and wide range of telemetry to detect threats.
  • A modern SOC must include capabilities to analyze data to detect attacks, rather than just rely on alerts from reporting technologies.
  • Using service providers with maturity in security operations and tools integrations can be a fast path to a better performing SOC with mature capabilities.
  • It isn’t possible to build an SOC solely based on automation, and those who try are disappointed.

Security operations, cybersecurity, privacy, risk management and more are covered in depth at this year’s virtual conference. View Pricing

Stay informed with Gartner

Get conference email updates.
Contact Information

All fields are required.

  • Step 2 of 2