Experts Corner Webcast: What Does It Take To Operationalize A SOAR?

What-Does-It-Take-To-Soar.jpg

The primary goal with this webcast discussion is to highlight the value of a SOAR (security orchestration automation and response) platform/model in order to help companies figure out how best to operationalize it as part of their security management programs.

The key point here is “operationalize” … who should be involved, what do they need in place in order to succeed (tech/process/people, both within and outside of the platform), and what can they expect from an operational benefit perspective.

We expect each of the expert panelists to work together as a group toward this goal of helping companies succeed with SOAR.

Watch or Listen to This Episode To Learn:

  • What is SOAR: components, inputs, outputs, actions, benefits

  • How does it work: we’ll attempt to paint a visual picture of the operational architecture of the platform within an environment

  • Roles and responsibilities: Who would use the platform / who are the other stakeholders beyond the “users"

  • What are some common use cases: what can be orchestrated / automated combined with a view into what playbooks are as well

  • Dependencies and/or pre-requisites: what’s required to make it work

  • Lessons learned: we’ll discuss some real-world cases (anonymously) where organizations have succeeded in implementing and extracting value from a SOAR platform


This video qualifies for 1 CPE. Learn more.

Offical+ISC2+CPE+credits+Submitter+V2.jpg

Watch The Video


On The Go? Have A Podcast...



Expert Panelists
(in alphabetical order)

Tim-Condello.png

Tim Condello

Senior Customer Success Manager

Siemplify

Heather-Hixon.png

Heather Hixon

Senior Solutions
Architect

DFLabs

Lior-Kolnik.png

Lior Kolnik

Head of Security
Research

Demisto

 
 
Ken-Westin.png

Ken Westin

Staff Security Strategist

Splunk (Phantom)

Fred-Wilmot.png

Fred Wilmot

VP, Security Engineering

Devo

 

Moderator

 

Sean Martin, CISSP

Editor-in-Chief
ITSPmagazine