Our first online session, "The IR Landscape: Four Trends for Optimal Preparedness," dissects proactive strategies adopted by organizations to enhance Incident Response (IR) preparedness. Explore the latest trends in agile IR plan updates, advanced threat detection, automated response protocols, and securing SaaS platforms for a resilient cybersecurity posture.

In the second session, " How to protect your organization from OT-related threats," we discuss the security challenges posed by OT devices and how to develop a strategy to protect your organization from OT-related threats, to help prioritize OT security to protect critical operations.

Concluding the series with "Journey to the Modern SOC," gain insights into the challenges and trends in contemporary Security Operations Centres (SOC). Understand the complexities of handling diverse security data from network, endpoint, identity, and cloud sources. Learn strategies to overcome manual analysis challenges, triage alerts effectively, and reduce dwell times, ensuring a seamless transition to the Modern SOC.

Join us for a deep dive into strategic cybersecurity insights, equipping you with actionable knowledge to navigate the evolving threat landscape effectively.

Speakers

Jeff Hamm

Consulting Partner

Critical Incident Response Lead UK/EU

Samrat Chaudhuri

Global Head of OT and IoT Security

Europe

Prakash Bellundagi

Consulting Partner - Cyber Defense UK/EU

Agenda

The IR Landscape: Four Trends for Optimal Preparedness

In the dynamic realm of Incident Response (IR), organizations across all industries are actively adopting four key efforts to enhance preparedness. This presentation will dissect these proactive strategies that are becoming the mainstay of IR teams. We'll cover the latest in updating IR plans with agility, advancing threat detection, embracing automated response protocols, and expanding security to cover the complexities of SaaS platforms. This session aims to provide IR professionals with actionable insights into building and enhancing a resilient, future-proof cybersecurity posture.

Speaker: Jeff Hamm, Consulting Partner – Critical Incident Response Lead UK/EU

How to protect your organization from OT-related threats

Enterprises must prioritize OT security to protect critical operations, keep up with expanding regulatory requirements and uphold trust in the industry. OT security tends to lag IT security in terms of maturity. OT environments often have many legacy devices with a lack of visibility into security compliance, vulnerability identification and network segmentation. Elevating OT security has become a business imperative. We discuss the security challenges posed by OT devices and how to develop a strategy to protect your organization from OT-related threats.

Speaker: Samrat Chaudhuri, Global Head of OT and IoT Security at Wipro

Journey to the Modern SOC

Today’s expanded enterprise attack surface generates much more security data, that is both more complex and siloed, than only a few years ago. Network, endpoint, identity, and cloud data remain in separate systems. Endpoint telemetry is locked in an endpoint detection and response (EDR) system, cloud data is in a separate cloud security tool, and more—with only a subset of logs but a flood of alerts going to the SIEM. As a result, SOC analysts must manually analyze data to triage alerts and take effective action. Alerts overload analysts, so threats are missed, and dwell times remain long. This session aims to provide Cyber Defense professionals about current SOC/SIEM challenges, industry trend and journey to the Modern SOC.

Speaker: Prakash Bellundagi, Consulting Partner - Cyber Defense UK/EU

State of Cybersecurity Report 2024

An AI World Emerges Disrupting Yet Strengthening Cyber Resilience
The 6th edition of Wipro’s State of Cybersecurity Report offers an in-depth examination of how security professionals are grappling with a disruptive, AI-driven threat landscape. You’ll get insights on the latest best practices across the cybersecurity space, plus a spotlight on nation-state attacks and the trend toward cost optimized cyber technology and services funding, how to align cybersecurity objectives with business goals, and more. Request your copy today.

KONTAKTIEREN SIE UNS