In a digital world where threats have grown exponentially in terms of sophistication as well as scale, it is more critical than ever before to protect the organization's intellectual property as well as customer data through more secured means.
Preparing for known attacks is tough. But how do organizations build and prepare controls for the security risks they are not even aware about?
For large organizations with high security requirements, its a clear imperative to develop a plan of action for identifying and mitigating security incidents. Such a plan includes creating a centralized, structured and coordinated center: The Security Operations Center (SOC).
For setting up a SOC, some of the critical challenges include finding the right security experts in-house and their partners who could correlate events at various levels; integrating the SOC into the rest of your organization with clearly defined processes for security incidents and crisis management; and lastly, futuristic technologies equipped to meet the security challenges of today, including advanced analytical capabilities and managed services.
Such a well-defined, well-functioning SOC can enable cybersecurity personnel to respond swiftly in detecting threats, as well as in securing and enabling the business against the threat actions.
Today's SOC requires more specialist skillsets and integrated cyber threat capabilities to accomplish greater effectiveness against threat actors.
Key Takeaways
- How to strike a proper balance between the right skillsets, processes and technology for SOC?
- What are the metrics to measure success of your SOC?
- What are the key steps to build an integrated security defence?
- How to utilize and build threat intelligence?
1500 | Introduction & Welcome |
Boudhayan Chakrabarty, Product Lead, Security Intelligence, Threat & Compliance, IBM | |
1515 | ROCK Your SOC with Watson for Cyber Security - Vijay Dheap, Program Director - Cognitive, Cloud, Analytics, IBM Security Carlos Aguilera, Senior Security Architect, IBM Security |
1550 | Q&A |
Moderated by Boudhayan Chakrabarty, Product Lead, Security Intelligence, Threat & Compliance, IBM | |
1600 | Vote of Thanks |

Product Lead, Security Intelligence, Threat & Compliance, IBM

Senior Security Architect, IBM Security

Program Director - Cognitive, Cloud, Analytics, IBM Security
