Security Operations Summit
InfoSec Conference Summary
The description was submitted by the Conference Organizer. We sometimes edit it to enhance the listing.
Security Operations is responsible for protecting an organization’s information systems through proactive design and configuration, ongoing monitoring of system state, detection of unintended actions or undesirable state, and minimizing of damage from unwanted effects. A security operations program (usually embodied in the form of a Security Operations Center or SOC) succeeds when it intervenes in an adversary’s efforts to impact the availability, confidentiality, and integrity of the organization’s information assets. Too often, SOCs fail to interrupt adversary efforts because they are not able to effectively align SOC functions with one another, the IT operations, and the organization’s business needs.
The Security Operations Summit brings together prominent security practitioners for two days of in-depth talks and panel discussions around building, operating, and maturing a successful security operations program. Speakers will share their latest strategies and methods for achieving impactful operational functions, including network monitoring, incident response, threat intelligence, forensics, self-assessment, and the command center.