We’ve got your security operations needs covered

Explore the conference agenda built on the latest Gartner security operations research

We’ve built a comprehensive agenda that will help you and your organization optimize processes and functions, along with related governance structures and activities.

Get the tools you need to cover the people, processes, technologies and services needed to identify and manage vulnerabilities, and to monitor, detect and respond to cybersecurity threats and incidents.

A sample of recommended sessions includes:

  • MSSP and SMB Enterprises: Top 3 Vendor Requirements to Unlock Opportunities in Underserved Markets
  • Outlook for Security Monitoring and Operations 2021
  • Security Operations Approaches for a DevOps-y, Cloud-Native World
  • How to Establish and Efficiently Operate a Modern SOC
  • How and Where to Get Started With Automation in Security Operations
  • Here Come the XDR Disruptors: What Is Next in Extended Detection and Response
  • Selecting Security Monitoring Approaches by Using the Mitre Attack Framework

Tips for Selecting the Right Tools for Your Security Operations Center

Security operations centers (SOCs) are like snowflakes, no two are alike. Many have yet to achieve their desired maturity level and target operating model. For those that have achieved their ideal maturity level, they still must react to changes, such as more hostile threat landscapes, digital business initiatives, and mergers and acquisitions. These factors will influence the current and future technology investments required for the SOC.

Key challenges

  • SOC owners struggle to make the right technology investments, and unfortunately chase the latest and greatest technologies that may dilute, rather than enhance, the efficacy of the SOC.
  • Looking to peers with SOCs or trying to benchmark against others in their vertical is of limited use. Each SOC is constructed to meet its own organization’s nuances, and current and target maturity level.
  • Artificial-intelligence- and machine-learning-powered technologies, or any that promise to fully automate your SOC, are not going to magically transform an SOC from low maturity to high maturity overnight. Your SOC needs trained staff and fine-tuned workflows to use and operate tools that support its goals and capabilities.

Cybersecurity, privacy, risk management and more are covered in depth at this year’s virtual conference. View Pricing

Stay informed with Gartner

Get conference email updates.
Contact Information

All fields are required.

  • Step 2 of 2