- This event has passed so registration is closed.
Overview
Today’s security and IT teams are struggling to keep up. The digital landscape is constantly changing and between disparate, unintegrated systems and repetitive, manual processes, security teams are having a difficult time getting ahead. There are too many alerts, not enough time to investigate them all, and staff are on the verge of burnout.
Security orchestration and automation (SOAR) tools introduce ways for security teams to streamline and improve their everyday processes. But, is your organization ready for automation?
Join a panel of experts for an engaging discussion where you’ll learn:
- Key considerations that should be in place before implementing automation
- When is the right time to add automation (and when it isn’t)
- Which common security tasks are ideal to automate
- How to prepare your organization for SOAR
Moderator
Mikhael Felker – Director of Information Security & Risk Management, Farmers Insurance
Mikhael is Director of Information Security & Risk Management for Farmers Insurance. He is also an Advisor for Safe-T Executive Advisory Committee. In the past decade he has taken on number of information security roles including engineering, teaching, writing, research and management. His sector experience includes insurance, defense, healthcare, nonprofit/education and technology/Internet, seeing first-hand the variance in information security culture and program maturity. Felker received his M.S. in information security policy and management from Carnegie Mellon University and B.S. in computer science from UCLA. He has over 50+ publications and has been a speaker for RSAC, CSA, ISSA, ISACA, ISC2 and OWASP events.
Speaker/s
Scott King – Senior Director, Advisory Services, Rapid7
Scott has over 20 years of professional work experience in the IT and cybersecurity fields. He started his career as a network and systems engineer in the midst of the Silicon Valley dot com boom of the 90’s. In 2001, Scott moved into an information assurance role supporting the Department of Defense, which kick started his career as a cybersecurity professional. Scott has worked for the DoD, state governments, large technology companies, mid-size manufacturing companies, and the spent significant time in the energy industry. Scott brings a unique mixture of hands-on experience in incident response, penetration testing, forensics, operations, architecture, engineering, and executive leadership as a former Chief Information Security Officer (CISO) to the Rapid7 Advisory team.
See Scott King‘s full profile.
Michael Wylie – Director of Cybersecurity Services, Richey May Technology Solutions
Michael Wylie, MBA, CISSP is the Director of Cybersecurity Services at Richey May Technology Solutions. In his role, Michael is responsible for delivering information assurance by means of vulnerability assessments, cloud security, penetration tests, risk management, and training. He has developed and taught numerous courses for the U.S. Department of Defense, Moorpark College, California State Universities, and clients around the country. Michael holds credentials from certifying bodies such as ISC2, Cisco, VMware, GIAC, Dell, EC-Council, CompTIA, and more. During client security testing, Michael has identified and responsibly disclosed four zero-day vulnerabilities in major tax software in 2018.
See Michael Wylie‘s full profile.
Jason Winder – Managing Director, Aerstone Labs
Jason Winder has more than 20 years of experience in the information security field. He founded Aerstone in 2003, a boutique cybersecurity consultancy and service-disabled veteran-owned small business that is one of just five NSA-certified vulnerability assessors in the world. Aerstone’s customers include some of the country’s largest organizations and institutions in the federal, military, commercial, and intelligence sectors. Jason has an undergraduate degree in Economics from Drew University, and holds dual Master’s degrees from the Katz Graduate School of Business at the University of Pittsburgh, in Business Administration and International Business. His private interests include languages, golf, travel, writing, and cooking.
Recent On-Demand Web Conferences
ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.